"No.","Time","Source","Destination","Protocol","Length","Info" "1","0.000000","172.30.1.205","172.30.1.104","TCP","74","40496 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903226 TSecr=0 WS=128" "2","0.000404","172.30.1.104","172.30.1.205","TCP","66","135 > 40496 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3","0.000424","172.30.1.205","172.30.1.104","TCP","54","40496 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4","0.000873","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5","0.001869","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6","0.001886","172.30.1.205","172.30.1.104","TCP","54","40496 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7","0.004282","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8","0.004773","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9","0.004781","172.30.1.205","172.30.1.104","TCP","54","40496 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10","0.006672","172.30.1.205","172.30.1.104","TCP","54","40496 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11","0.006806","172.30.1.205","172.30.1.104","TCP","74","33134 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903233 TSecr=0 WS=128" "12","0.006953","172.30.1.104","172.30.1.205","TCP","54","135 > 40496 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13","0.007101","172.30.1.104","172.30.1.205","TCP","66","49671 > 33134 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14","0.007111","172.30.1.205","172.30.1.104","TCP","54","33134 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15","0.007460","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16","0.007623","172.30.1.104","172.30.1.205","TCP","54","135 > 40496 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17","0.007631","172.30.1.205","172.30.1.104","TCP","54","40496 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18","0.007826","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19","0.007835","172.30.1.205","172.30.1.104","TCP","54","33134 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20","0.010078","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21","0.027097","172.30.1.104","172.30.1.205","TCP","54","49671 > 33134 [ACK] Seq=61 Ack=201 Win=2150400 Len=0" "22","0.027314","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23","0.027327","172.30.1.205","172.30.1.104","TCP","54","33134 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24","0.029035","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25","0.035353","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26","0.035367","172.30.1.205","172.30.1.104","TCP","54","33134 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27","0.036491","172.30.1.205","172.30.1.104","TCP","74","40500 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903262 TSecr=0 WS=128" "28","0.036815","172.30.1.104","172.30.1.205","TCP","66","135 > 40500 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29","0.036826","172.30.1.205","172.30.1.104","TCP","54","40500 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30","0.037279","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31","0.037595","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32","0.037604","172.30.1.205","172.30.1.104","TCP","54","40500 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33","0.040167","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34","0.040595","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35","0.040602","172.30.1.205","172.30.1.104","TCP","54","40500 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36","0.042452","172.30.1.205","172.30.1.104","TCP","54","40500 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37","0.042595","172.30.1.205","172.30.1.104","TCP","74","33138 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903269 TSecr=0 WS=128" "38","0.042722","172.30.1.104","172.30.1.205","TCP","54","135 > 40500 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39","0.042840","172.30.1.104","172.30.1.205","TCP","54","135 > 40500 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40","0.042848","172.30.1.205","172.30.1.104","TCP","54","40500 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41","0.042944","172.30.1.104","172.30.1.205","TCP","66","49671 > 33138 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42","0.042953","172.30.1.205","172.30.1.104","TCP","54","33138 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43","0.043294","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44","0.043611","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45","0.043620","172.30.1.205","172.30.1.104","TCP","54","33138 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46","0.045530","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47","0.045905","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48","0.045911","172.30.1.205","172.30.1.104","TCP","54","33138 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49","0.047249","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50","0.049411","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51","0.049421","172.30.1.205","172.30.1.104","TCP","54","33138 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52","0.050404","172.30.1.205","172.30.1.104","TCP","74","40504 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903276 TSecr=0 WS=128" "53","0.050729","172.30.1.104","172.30.1.205","TCP","66","135 > 40504 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54","0.050740","172.30.1.205","172.30.1.104","TCP","54","40504 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55","0.051088","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56","0.051396","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57","0.051404","172.30.1.205","172.30.1.104","TCP","54","40504 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "58","0.053620","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "59","0.054051","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "60","0.054058","172.30.1.205","172.30.1.104","TCP","54","40504 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "61","0.055864","172.30.1.205","172.30.1.104","TCP","54","40504 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "62","0.055981","172.30.1.205","172.30.1.104","TCP","74","33142 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903282 TSecr=0 WS=128" "63","0.056161","172.30.1.104","172.30.1.205","TCP","54","135 > 40504 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "64","0.056196","172.30.1.104","172.30.1.205","TCP","54","135 > 40504 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "65","0.056203","172.30.1.205","172.30.1.104","TCP","54","40504 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "66","0.056303","172.30.1.104","172.30.1.205","TCP","66","49671 > 33142 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "67","0.056312","172.30.1.205","172.30.1.104","TCP","54","33142 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "68","0.056657","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "69","0.056947","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "70","0.056956","172.30.1.205","172.30.1.104","TCP","54","33142 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "71","0.058825","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "72","0.061218","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "73","0.061226","172.30.1.205","172.30.1.104","TCP","54","33142 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "74","0.062592","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "75","0.064787","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "76","0.064802","172.30.1.205","172.30.1.104","TCP","54","33142 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "77","0.065847","172.30.1.205","172.30.1.104","TCP","74","40508 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903292 TSecr=0 WS=128" "78","0.066143","172.30.1.104","172.30.1.205","TCP","66","135 > 40508 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "79","0.066157","172.30.1.205","172.30.1.104","TCP","54","40508 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "80","0.066528","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "81","0.066826","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "82","0.066837","172.30.1.205","172.30.1.104","TCP","54","40508 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "83","0.069069","172.30.1.205","172.30.1.104","TCP","54","33134 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "84","0.069121","172.30.1.205","172.30.1.104","TCP","54","33138 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "85","0.069159","172.30.1.205","172.30.1.104","TCP","54","33142 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "86","0.069394","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "87","0.069537","172.30.1.104","172.30.1.205","TCP","54","49671 > 33134 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "88","0.069550","172.30.1.104","172.30.1.205","TCP","54","49671 > 33138 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "89","0.069553","172.30.1.104","172.30.1.205","TCP","54","49671 > 33142 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "90","0.069561","172.30.1.104","172.30.1.205","TCP","54","49671 > 33134 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "91","0.069569","172.30.1.205","172.30.1.104","TCP","54","33134 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "92","0.069576","172.30.1.104","172.30.1.205","TCP","54","49671 > 33138 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "93","0.069578","172.30.1.205","172.30.1.104","TCP","54","33138 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "94","0.069651","172.30.1.104","172.30.1.205","TCP","54","49671 > 33142 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "95","0.069653","172.30.1.205","172.30.1.104","TCP","54","33142 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "96","0.069857","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "97","0.069862","172.30.1.205","172.30.1.104","TCP","54","40508 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "98","0.071792","172.30.1.205","172.30.1.104","TCP","54","40508 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "99","0.071921","172.30.1.205","172.30.1.104","TCP","74","33146 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903298 TSecr=0 WS=128" "100","0.072064","172.30.1.104","172.30.1.205","TCP","54","135 > 40508 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "101","0.072101","172.30.1.104","172.30.1.205","TCP","54","135 > 40508 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "102","0.072106","172.30.1.205","172.30.1.104","TCP","54","40508 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "103","0.072218","172.30.1.104","172.30.1.205","TCP","66","49671 > 33146 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "104","0.072227","172.30.1.205","172.30.1.104","TCP","54","33146 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "105","0.072582","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "106","0.072892","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "107","0.072901","172.30.1.205","172.30.1.104","TCP","54","33146 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "108","0.074772","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "109","0.075167","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "110","0.075173","172.30.1.205","172.30.1.104","TCP","54","33146 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "111","0.076538","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "112","0.078653","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "113","0.078667","172.30.1.205","172.30.1.104","TCP","54","33146 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "114","0.079700","172.30.1.205","172.30.1.104","TCP","74","40512 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903306 TSecr=0 WS=128" "115","0.080003","172.30.1.104","172.30.1.205","TCP","66","135 > 40512 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "116","0.080015","172.30.1.205","172.30.1.104","TCP","54","40512 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "117","0.080371","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "118","0.080792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "119","0.080802","172.30.1.205","172.30.1.104","TCP","54","40512 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "120","0.082998","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "121","0.083415","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "122","0.083422","172.30.1.205","172.30.1.104","TCP","54","40512 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "123","0.085255","172.30.1.205","172.30.1.104","TCP","54","40512 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "124","0.085369","172.30.1.205","172.30.1.104","TCP","74","33150 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903311 TSecr=0 WS=128" "125","0.085586","172.30.1.104","172.30.1.205","TCP","54","135 > 40512 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "126","0.085754","172.30.1.104","172.30.1.205","TCP","54","135 > 40512 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "127","0.085760","172.30.1.205","172.30.1.104","TCP","54","40512 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "128","0.085765","172.30.1.104","172.30.1.205","TCP","66","49671 > 33150 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "129","0.085774","172.30.1.205","172.30.1.104","TCP","54","33150 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "130","0.086123","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "131","0.086412","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "132","0.086421","172.30.1.205","172.30.1.104","TCP","54","33150 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "133","0.088294","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "134","0.088726","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "135","0.088733","172.30.1.205","172.30.1.104","TCP","54","33150 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "136","0.090099","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "137","0.092157","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "138","0.092166","172.30.1.205","172.30.1.104","TCP","54","33150 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "139","0.093116","172.30.1.205","172.30.1.104","TCP","74","40516 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903319 TSecr=0 WS=128" "140","0.093416","172.30.1.104","172.30.1.205","TCP","66","135 > 40516 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "141","0.093426","172.30.1.205","172.30.1.104","TCP","54","40516 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "142","0.093779","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "143","0.094090","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "144","0.094100","172.30.1.205","172.30.1.104","TCP","54","40516 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "145","0.096259","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "146","0.096699","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "147","0.096706","172.30.1.205","172.30.1.104","TCP","54","40516 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "148","0.098517","172.30.1.205","172.30.1.104","TCP","54","40516 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "149","0.098630","172.30.1.205","172.30.1.104","TCP","74","33154 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903325 TSecr=0 WS=128" "150","0.098855","172.30.1.104","172.30.1.205","TCP","54","135 > 40516 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "151","0.098865","172.30.1.104","172.30.1.205","TCP","54","135 > 40516 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "152","0.098870","172.30.1.205","172.30.1.104","TCP","54","40516 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "153","0.098960","172.30.1.104","172.30.1.205","TCP","66","49671 > 33154 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "154","0.098968","172.30.1.205","172.30.1.104","TCP","54","33154 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "155","0.099310","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "156","0.099670","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "157","0.099678","172.30.1.205","172.30.1.104","TCP","54","33154 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "158","0.101573","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "159","0.101938","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "160","0.101945","172.30.1.205","172.30.1.104","TCP","54","33154 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "161","0.103285","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "162","0.105375","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "163","0.105384","172.30.1.205","172.30.1.104","TCP","54","33154 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "164","0.106327","172.30.1.205","172.30.1.104","TCP","74","40520 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903332 TSecr=0 WS=128" "165","0.106655","172.30.1.104","172.30.1.205","TCP","66","135 > 40520 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "166","0.106666","172.30.1.205","172.30.1.104","TCP","54","40520 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "167","0.107015","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "168","0.107307","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "169","0.107316","172.30.1.205","172.30.1.104","TCP","54","40520 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "170","0.109512","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "171","0.109934","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "172","0.109943","172.30.1.205","172.30.1.104","TCP","54","40520 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "173","0.111808","172.30.1.205","172.30.1.104","TCP","54","40520 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "174","0.111924","172.30.1.205","172.30.1.104","TCP","74","33158 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903338 TSecr=0 WS=128" "175","0.112117","172.30.1.104","172.30.1.205","TCP","54","135 > 40520 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "176","0.112177","172.30.1.104","172.30.1.205","TCP","54","135 > 40520 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "177","0.112182","172.30.1.205","172.30.1.104","TCP","54","40520 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "178","0.112281","172.30.1.104","172.30.1.205","TCP","66","49671 > 33158 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "179","0.112290","172.30.1.205","172.30.1.104","TCP","54","33158 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "180","0.112643","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "181","0.112935","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "182","0.112944","172.30.1.205","172.30.1.104","TCP","54","33158 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "183","0.114805","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "184","0.115223","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "185","0.115229","172.30.1.205","172.30.1.104","TCP","54","33158 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "186","0.116564","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "187","0.118895","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "188","0.118905","172.30.1.205","172.30.1.104","TCP","54","33158 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "189","0.119831","172.30.1.205","172.30.1.104","TCP","74","40524 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903346 TSecr=0 WS=128" "190","0.120155","172.30.1.104","172.30.1.205","TCP","66","135 > 40524 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "191","0.120166","172.30.1.205","172.30.1.104","TCP","54","40524 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "192","0.120510","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "193","0.120875","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "194","0.120885","172.30.1.205","172.30.1.104","TCP","54","40524 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "195","0.123050","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "196","0.123531","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "197","0.123541","172.30.1.205","172.30.1.104","TCP","54","40524 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "198","0.125440","172.30.1.205","172.30.1.104","TCP","54","40524 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "199","0.125563","172.30.1.205","172.30.1.104","TCP","74","33162 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903351 TSecr=0 WS=128" "200","0.125821","172.30.1.104","172.30.1.205","TCP","54","135 > 40524 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "201","0.125854","172.30.1.104","172.30.1.205","TCP","54","135 > 40524 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "202","0.125861","172.30.1.205","172.30.1.104","TCP","54","40524 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "203","0.125974","172.30.1.104","172.30.1.205","TCP","66","49671 > 33162 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "204","0.125982","172.30.1.205","172.30.1.104","TCP","54","33162 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "205","0.126333","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "206","0.126629","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "207","0.126641","172.30.1.205","172.30.1.104","TCP","54","33162 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "208","0.128511","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "209","0.128922","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "210","0.128930","172.30.1.205","172.30.1.104","TCP","54","33162 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "211","0.130307","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "212","0.132533","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "213","0.132543","172.30.1.205","172.30.1.104","TCP","54","33162 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "214","0.133502","172.30.1.205","172.30.1.104","TCP","74","40528 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903359 TSecr=0 WS=128" "215","0.133828","172.30.1.104","172.30.1.205","TCP","66","135 > 40528 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "216","0.133839","172.30.1.205","172.30.1.104","TCP","54","40528 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "217","0.134185","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "218","0.134537","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "219","0.134548","172.30.1.205","172.30.1.104","TCP","54","40528 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "220","0.136746","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "221","0.137187","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "222","0.137195","172.30.1.205","172.30.1.104","TCP","54","40528 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "223","0.139182","172.30.1.205","172.30.1.104","TCP","54","40528 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "224","0.139294","172.30.1.205","172.30.1.104","TCP","74","33166 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903365 TSecr=0 WS=128" "225","0.139619","172.30.1.104","172.30.1.205","TCP","54","135 > 40528 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "226","0.139627","172.30.1.104","172.30.1.205","TCP","54","135 > 40528 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "227","0.139633","172.30.1.205","172.30.1.104","TCP","54","40528 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "228","0.139762","172.30.1.104","172.30.1.205","TCP","66","49671 > 33166 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "229","0.139771","172.30.1.205","172.30.1.104","TCP","54","33166 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "230","0.140131","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "231","0.140419","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "232","0.140428","172.30.1.205","172.30.1.104","TCP","54","33166 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "233","0.142339","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "234","0.142767","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "235","0.142774","172.30.1.205","172.30.1.104","TCP","54","33166 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "236","0.144108","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "237","0.146343","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "238","0.146354","172.30.1.205","172.30.1.104","TCP","54","33166 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "239","0.147310","172.30.1.205","172.30.1.104","TCP","74","40532 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903373 TSecr=0 WS=128" "240","0.147625","172.30.1.104","172.30.1.205","TCP","66","135 > 40532 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "241","0.147643","172.30.1.205","172.30.1.104","TCP","54","40532 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "242","0.147997","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "243","0.148314","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "244","0.148323","172.30.1.205","172.30.1.104","TCP","54","40532 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "245","0.150565","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "246","0.150995","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "247","0.151002","172.30.1.205","172.30.1.104","TCP","54","40532 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "248","0.152818","172.30.1.205","172.30.1.104","TCP","54","40532 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "249","0.152925","172.30.1.205","172.30.1.104","TCP","74","33170 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903379 TSecr=0 WS=128" "250","0.153074","172.30.1.104","172.30.1.205","TCP","54","135 > 40532 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "251","0.153119","172.30.1.104","172.30.1.205","TCP","54","135 > 40532 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "252","0.153125","172.30.1.205","172.30.1.104","TCP","54","40532 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "253","0.153266","172.30.1.104","172.30.1.205","TCP","66","49671 > 33170 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "254","0.153278","172.30.1.205","172.30.1.104","TCP","54","33170 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "255","0.153645","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "256","0.153973","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "257","0.153983","172.30.1.205","172.30.1.104","TCP","54","33170 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "258","0.155889","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "259","0.156263","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "260","0.156270","172.30.1.205","172.30.1.104","TCP","54","33170 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "261","0.157657","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "262","0.159852","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "263","0.159862","172.30.1.205","172.30.1.104","TCP","54","33170 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "264","0.160809","172.30.1.205","172.30.1.104","TCP","74","40536 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903387 TSecr=0 WS=128" "265","0.161119","172.30.1.104","172.30.1.205","TCP","66","135 > 40536 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "266","0.161129","172.30.1.205","172.30.1.104","TCP","54","40536 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "267","0.161491","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "268","0.161769","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "269","0.161778","172.30.1.205","172.30.1.104","TCP","54","40536 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "270","0.163963","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "271","0.164859","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "272","0.164866","172.30.1.205","172.30.1.104","TCP","54","40536 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "273","0.166690","172.30.1.205","172.30.1.104","TCP","54","40536 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "274","0.166800","172.30.1.205","172.30.1.104","TCP","74","33174 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903393 TSecr=0 WS=128" "275","0.166945","172.30.1.104","172.30.1.205","TCP","54","135 > 40536 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "276","0.167007","172.30.1.104","172.30.1.205","TCP","54","135 > 40536 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "277","0.167013","172.30.1.205","172.30.1.104","TCP","54","40536 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "278","0.167112","172.30.1.104","172.30.1.205","TCP","66","49671 > 33174 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "279","0.167121","172.30.1.205","172.30.1.104","TCP","54","33174 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "280","0.167462","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "281","0.167904","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "282","0.167913","172.30.1.205","172.30.1.104","TCP","54","33174 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "283","0.169796","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "284","0.170663","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "285","0.170669","172.30.1.205","172.30.1.104","TCP","54","33174 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "286","0.172028","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "287","0.174168","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "288","0.174178","172.30.1.205","172.30.1.104","TCP","54","33174 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "289","0.175127","172.30.1.205","172.30.1.104","TCP","74","40540 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903401 TSecr=0 WS=128" "290","0.175482","172.30.1.104","172.30.1.205","TCP","66","135 > 40540 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "291","0.175493","172.30.1.205","172.30.1.104","TCP","54","40540 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "292","0.175837","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "293","0.176137","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "294","0.176146","172.30.1.205","172.30.1.104","TCP","54","40540 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "295","0.178336","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "296","0.178856","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "297","0.178863","172.30.1.205","172.30.1.104","TCP","54","40540 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "298","0.180646","172.30.1.205","172.30.1.104","TCP","54","40540 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "299","0.180757","172.30.1.205","172.30.1.104","TCP","74","33178 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903407 TSecr=0 WS=128" "300","0.180938","172.30.1.104","172.30.1.205","TCP","54","135 > 40540 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "301","0.180995","172.30.1.104","172.30.1.205","TCP","54","135 > 40540 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "302","0.181001","172.30.1.205","172.30.1.104","TCP","54","40540 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "303","0.181111","172.30.1.104","172.30.1.205","TCP","66","49671 > 33178 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "304","0.181120","172.30.1.205","172.30.1.104","TCP","54","33178 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "305","0.181494","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "306","0.181798","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "307","0.181807","172.30.1.205","172.30.1.104","TCP","54","33178 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "308","0.183645","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "309","0.184045","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "310","0.184051","172.30.1.205","172.30.1.104","TCP","54","33178 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "311","0.185415","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "312","0.187500","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "313","0.187510","172.30.1.205","172.30.1.104","TCP","54","33178 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "314","0.188434","172.30.1.205","172.30.1.104","TCP","74","40544 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903414 TSecr=0 WS=128" "315","0.188792","172.30.1.104","172.30.1.205","TCP","66","135 > 40544 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "316","0.188803","172.30.1.205","172.30.1.104","TCP","54","40544 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "317","0.189157","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "318","0.189463","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "319","0.189473","172.30.1.205","172.30.1.104","TCP","54","40544 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "320","0.191628","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "321","0.192044","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "322","0.192051","172.30.1.205","172.30.1.104","TCP","54","40544 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "323","0.193862","172.30.1.205","172.30.1.104","TCP","54","40544 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "324","0.193971","172.30.1.205","172.30.1.104","TCP","74","33182 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903420 TSecr=0 WS=128" "325","0.194226","172.30.1.104","172.30.1.205","TCP","54","135 > 40544 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "326","0.194323","172.30.1.104","172.30.1.205","TCP","66","49671 > 33182 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "327","0.194332","172.30.1.205","172.30.1.104","TCP","54","33182 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "328","0.194675","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "329","0.195648","172.30.1.104","172.30.1.205","TCP","54","135 > 40544 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "330","0.195654","172.30.1.205","172.30.1.104","TCP","54","40544 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "331","0.195784","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "332","0.195792","172.30.1.205","172.30.1.104","TCP","54","33182 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "333","0.197664","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "334","0.198104","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "335","0.198110","172.30.1.205","172.30.1.104","TCP","54","33182 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "336","0.199442","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "337","0.201598","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "338","0.201608","172.30.1.205","172.30.1.104","TCP","54","33182 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "339","0.202540","172.30.1.205","172.30.1.104","TCP","74","40548 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903428 TSecr=0 WS=128" "340","0.202868","172.30.1.104","172.30.1.205","TCP","66","135 > 40548 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "341","0.202879","172.30.1.205","172.30.1.104","TCP","54","40548 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "342","0.203226","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "343","0.203489","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "344","0.203498","172.30.1.205","172.30.1.104","TCP","54","40548 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "345","0.205721","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "346","0.206116","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "347","0.206123","172.30.1.205","172.30.1.104","TCP","54","40548 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "348","0.207913","172.30.1.205","172.30.1.104","TCP","54","40548 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "349","0.208025","172.30.1.205","172.30.1.104","TCP","74","33186 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903434 TSecr=0 WS=128" "350","0.208194","172.30.1.104","172.30.1.205","TCP","54","135 > 40548 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "351","0.208267","172.30.1.104","172.30.1.205","TCP","54","135 > 40548 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "352","0.208277","172.30.1.205","172.30.1.104","TCP","54","40548 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "353","0.208336","172.30.1.104","172.30.1.205","TCP","66","49671 > 33186 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "354","0.208349","172.30.1.205","172.30.1.104","TCP","54","33186 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "355","0.208746","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "356","0.209084","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "357","0.209095","172.30.1.205","172.30.1.104","TCP","54","33186 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "358","0.210978","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "359","0.211330","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "360","0.211337","172.30.1.205","172.30.1.104","TCP","54","33186 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "361","0.212675","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "362","0.214701","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "363","0.214710","172.30.1.205","172.30.1.104","TCP","54","33186 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "364","0.215632","172.30.1.205","172.30.1.104","TCP","74","40552 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903442 TSecr=0 WS=128" "365","0.215924","172.30.1.104","172.30.1.205","TCP","66","135 > 40552 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "366","0.215935","172.30.1.205","172.30.1.104","TCP","54","40552 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "367","0.216285","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "368","0.216536","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "369","0.216546","172.30.1.205","172.30.1.104","TCP","54","40552 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "370","0.218727","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "371","0.219082","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "372","0.219089","172.30.1.205","172.30.1.104","TCP","54","40552 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "373","0.220902","172.30.1.205","172.30.1.104","TCP","54","40552 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "374","0.221019","172.30.1.205","172.30.1.104","TCP","74","33190 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903447 TSecr=0 WS=128" "375","0.221161","172.30.1.104","172.30.1.205","TCP","54","135 > 40552 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "376","0.221200","172.30.1.104","172.30.1.205","TCP","54","135 > 40552 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "377","0.221205","172.30.1.205","172.30.1.104","TCP","54","40552 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "378","0.221307","172.30.1.104","172.30.1.205","TCP","66","49671 > 33190 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "379","0.221315","172.30.1.205","172.30.1.104","TCP","54","33190 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "380","0.221667","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "381","0.221951","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "382","0.221961","172.30.1.205","172.30.1.104","TCP","54","33190 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "383","0.223814","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "384","0.224255","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "385","0.224262","172.30.1.205","172.30.1.104","TCP","54","33190 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "386","0.225630","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "387","0.227746","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "388","0.227758","172.30.1.205","172.30.1.104","TCP","54","33190 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "389","0.228694","172.30.1.205","172.30.1.104","TCP","74","40556 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903455 TSecr=0 WS=128" "390","0.228972","172.30.1.104","172.30.1.205","TCP","66","135 > 40556 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "391","0.228984","172.30.1.205","172.30.1.104","TCP","54","40556 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "392","0.229332","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "393","0.229946","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "394","0.229957","172.30.1.205","172.30.1.104","TCP","54","40556 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "395","0.232191","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "396","0.232573","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "397","0.232579","172.30.1.205","172.30.1.104","TCP","54","40556 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "398","0.233432","172.30.1.205","172.30.1.104","TCP","54","33150 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "399","0.233492","172.30.1.205","172.30.1.104","TCP","54","33154 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "400","0.233528","172.30.1.205","172.30.1.104","TCP","54","33158 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "401","0.233570","172.30.1.205","172.30.1.104","TCP","54","33162 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "402","0.233594","172.30.1.205","172.30.1.104","TCP","54","33166 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "403","0.233621","172.30.1.205","172.30.1.104","TCP","54","33170 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "404","0.233644","172.30.1.205","172.30.1.104","TCP","54","33174 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "405","0.233671","172.30.1.205","172.30.1.104","TCP","54","33178 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "406","0.233693","172.30.1.205","172.30.1.104","TCP","54","33182 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "407","0.233715","172.30.1.205","172.30.1.104","TCP","54","33186 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "408","0.233737","172.30.1.205","172.30.1.104","TCP","54","33190 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "409","0.233802","172.30.1.205","172.30.1.104","TCP","54","33146 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "410","0.234172","172.30.1.104","172.30.1.205","TCP","54","49671 > 33150 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "411","0.234181","172.30.1.104","172.30.1.205","TCP","54","49671 > 33150 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "412","0.234187","172.30.1.205","172.30.1.104","TCP","54","33150 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "413","0.234193","172.30.1.104","172.30.1.205","TCP","54","49671 > 33154 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "414","0.234197","172.30.1.104","172.30.1.205","TCP","54","49671 > 33154 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "415","0.234199","172.30.1.205","172.30.1.104","TCP","54","33154 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "416","0.234201","172.30.1.104","172.30.1.205","TCP","54","49671 > 33158 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "417","0.234204","172.30.1.104","172.30.1.205","TCP","54","49671 > 33162 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "418","0.234206","172.30.1.104","172.30.1.205","TCP","54","49671 > 33166 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "419","0.234209","172.30.1.104","172.30.1.205","TCP","54","49671 > 33158 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "420","0.234211","172.30.1.205","172.30.1.104","TCP","54","33158 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "421","0.234212","172.30.1.104","172.30.1.205","TCP","54","49671 > 33162 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "422","0.234214","172.30.1.205","172.30.1.104","TCP","54","33162 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "423","0.234215","172.30.1.104","172.30.1.205","TCP","54","49671 > 33166 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "424","0.234217","172.30.1.205","172.30.1.104","TCP","54","33166 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "425","0.234218","172.30.1.104","172.30.1.205","TCP","54","49671 > 33170 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "426","0.234220","172.30.1.104","172.30.1.205","TCP","54","49671 > 33174 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "427","0.234223","172.30.1.104","172.30.1.205","TCP","54","49671 > 33178 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "428","0.234544","172.30.1.104","172.30.1.205","TCP","54","49671 > 33182 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "429","0.234551","172.30.1.104","172.30.1.205","TCP","54","49671 > 33170 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "430","0.234555","172.30.1.205","172.30.1.104","TCP","54","33170 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "431","0.234562","172.30.1.104","172.30.1.205","TCP","54","49671 > 33182 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "432","0.234564","172.30.1.205","172.30.1.104","TCP","54","33182 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "433","0.234566","172.30.1.104","172.30.1.205","TCP","54","49671 > 33174 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "434","0.234567","172.30.1.205","172.30.1.104","TCP","54","33174 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "435","0.234572","172.30.1.104","172.30.1.205","TCP","54","49671 > 33178 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "436","0.234573","172.30.1.205","172.30.1.104","TCP","54","33178 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "437","0.234574","172.30.1.104","172.30.1.205","TCP","54","49671 > 33186 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "438","0.234578","172.30.1.104","172.30.1.205","TCP","54","49671 > 33190 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "439","0.234580","172.30.1.104","172.30.1.205","TCP","54","49671 > 33146 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "440","0.234582","172.30.1.104","172.30.1.205","TCP","54","49671 > 33146 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "441","0.234584","172.30.1.205","172.30.1.104","TCP","54","33146 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "442","0.234586","172.30.1.104","172.30.1.205","TCP","54","49671 > 33186 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "443","0.234588","172.30.1.205","172.30.1.104","TCP","54","33186 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "444","0.234589","172.30.1.104","172.30.1.205","TCP","54","49671 > 33190 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "445","0.234591","172.30.1.205","172.30.1.104","TCP","54","33190 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "446","0.235277","172.30.1.205","172.30.1.104","TCP","54","40556 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "447","0.235387","172.30.1.205","172.30.1.104","TCP","74","33194 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903461 TSecr=0 WS=128" "448","0.235503","172.30.1.104","172.30.1.205","TCP","54","135 > 40556 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "449","0.235538","172.30.1.104","172.30.1.205","TCP","54","135 > 40556 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "450","0.235543","172.30.1.205","172.30.1.104","TCP","54","40556 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "451","0.235645","172.30.1.104","172.30.1.205","TCP","66","49671 > 33194 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "452","0.235654","172.30.1.205","172.30.1.104","TCP","54","33194 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "453","0.236002","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "454","0.236275","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "455","0.236284","172.30.1.205","172.30.1.104","TCP","54","33194 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "456","0.238188","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "457","0.238597","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "458","0.238604","172.30.1.205","172.30.1.104","TCP","54","33194 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "459","0.239945","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "460","0.242076","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "461","0.242088","172.30.1.205","172.30.1.104","TCP","54","33194 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "462","0.243039","172.30.1.205","172.30.1.104","TCP","74","40560 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903469 TSecr=0 WS=128" "463","0.243323","172.30.1.104","172.30.1.205","TCP","66","135 > 40560 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "464","0.243333","172.30.1.205","172.30.1.104","TCP","54","40560 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "465","0.243679","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "466","0.244000","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "467","0.244011","172.30.1.205","172.30.1.104","TCP","54","40560 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "468","0.246247","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "469","0.246626","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "470","0.246633","172.30.1.205","172.30.1.104","TCP","54","40560 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "471","0.248436","172.30.1.205","172.30.1.104","TCP","54","40560 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "472","0.248547","172.30.1.205","172.30.1.104","TCP","74","33198 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903474 TSecr=0 WS=128" "473","0.248677","172.30.1.104","172.30.1.205","TCP","54","135 > 40560 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "474","0.248702","172.30.1.104","172.30.1.205","TCP","54","135 > 40560 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "475","0.248707","172.30.1.205","172.30.1.104","TCP","54","40560 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "476","0.248791","172.30.1.104","172.30.1.205","TCP","66","49671 > 33198 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "477","0.248801","172.30.1.205","172.30.1.104","TCP","54","33198 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "478","0.249157","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "479","0.249814","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "480","0.249823","172.30.1.205","172.30.1.104","TCP","54","33198 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "481","0.251671","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "482","0.252123","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "483","0.252127","172.30.1.205","172.30.1.104","TCP","54","33198 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "484","0.253507","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "485","0.255822","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "486","0.255834","172.30.1.205","172.30.1.104","TCP","54","33198 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "487","0.256959","172.30.1.205","172.30.1.104","TCP","74","40564 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903483 TSecr=0 WS=128" "488","0.257373","172.30.1.104","172.30.1.205","TCP","66","135 > 40564 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "489","0.257387","172.30.1.205","172.30.1.104","TCP","54","40564 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "490","0.257756","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "491","0.258051","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "492","0.258060","172.30.1.205","172.30.1.104","TCP","54","40564 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "493","0.260256","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "494","0.260698","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "495","0.260706","172.30.1.205","172.30.1.104","TCP","54","40564 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "496","0.262543","172.30.1.205","172.30.1.104","TCP","54","40564 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "497","0.262658","172.30.1.205","172.30.1.104","TCP","74","33202 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903489 TSecr=0 WS=128" "498","0.262855","172.30.1.104","172.30.1.205","TCP","54","135 > 40564 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "499","0.262864","172.30.1.104","172.30.1.205","TCP","54","135 > 40564 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "500","0.262870","172.30.1.205","172.30.1.104","TCP","54","40564 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "501","0.262966","172.30.1.104","172.30.1.205","TCP","66","49671 > 33202 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "502","0.262981","172.30.1.205","172.30.1.104","TCP","54","33202 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "503","0.263369","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "504","0.263659","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "505","0.263668","172.30.1.205","172.30.1.104","TCP","54","33202 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "506","0.265593","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "507","0.266026","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "508","0.266034","172.30.1.205","172.30.1.104","TCP","54","33202 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "509","0.267446","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "510","0.271225","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "511","0.271237","172.30.1.205","172.30.1.104","TCP","54","33202 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "512","0.272213","172.30.1.205","172.30.1.104","TCP","74","40568 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903498 TSecr=0 WS=128" "513","0.272502","172.30.1.104","172.30.1.205","TCP","66","135 > 40568 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "514","0.272513","172.30.1.205","172.30.1.104","TCP","54","40568 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "515","0.272886","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "516","0.273162","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "517","0.273171","172.30.1.205","172.30.1.104","TCP","54","40568 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "518","0.275350","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "519","0.275729","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "520","0.275736","172.30.1.205","172.30.1.104","TCP","54","40568 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "521","0.277550","172.30.1.205","172.30.1.104","TCP","54","40568 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "522","0.277660","172.30.1.205","172.30.1.104","TCP","74","33206 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903504 TSecr=0 WS=128" "523","0.277794","172.30.1.104","172.30.1.205","TCP","54","135 > 40568 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "524","0.277829","172.30.1.104","172.30.1.205","TCP","54","135 > 40568 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "525","0.277835","172.30.1.205","172.30.1.104","TCP","54","40568 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "526","0.277925","172.30.1.104","172.30.1.205","TCP","66","49671 > 33206 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "527","0.277933","172.30.1.205","172.30.1.104","TCP","54","33206 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "528","0.278275","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "529","0.278543","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "530","0.278552","172.30.1.205","172.30.1.104","TCP","54","33206 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "531","0.280398","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "532","0.280905","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "533","0.280913","172.30.1.205","172.30.1.104","TCP","54","33206 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "534","0.282281","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "535","0.284348","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "536","0.284360","172.30.1.205","172.30.1.104","TCP","54","33206 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "537","0.285353","172.30.1.205","172.30.1.104","TCP","74","40572 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903511 TSecr=0 WS=128" "538","0.285667","172.30.1.104","172.30.1.205","TCP","66","135 > 40572 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "539","0.285678","172.30.1.205","172.30.1.104","TCP","54","40572 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "540","0.286024","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "541","0.286306","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "542","0.286315","172.30.1.205","172.30.1.104","TCP","54","40572 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "543","0.288478","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "544","0.288909","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "545","0.288916","172.30.1.205","172.30.1.104","TCP","54","40572 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "546","0.290723","172.30.1.205","172.30.1.104","TCP","54","40572 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "547","0.290839","172.30.1.205","172.30.1.104","TCP","74","33210 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903517 TSecr=0 WS=128" "548","0.291013","172.30.1.104","172.30.1.205","TCP","54","135 > 40572 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "549","0.291023","172.30.1.104","172.30.1.205","TCP","54","135 > 40572 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "550","0.291028","172.30.1.205","172.30.1.104","TCP","54","40572 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "551","0.291187","172.30.1.104","172.30.1.205","TCP","66","49671 > 33210 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "552","0.291196","172.30.1.205","172.30.1.104","TCP","54","33210 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "553","0.291538","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "554","0.291839","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "555","0.291848","172.30.1.205","172.30.1.104","TCP","54","33210 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "556","0.293747","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "557","0.294105","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "558","0.294111","172.30.1.205","172.30.1.104","TCP","54","33210 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "559","0.295446","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "560","0.297564","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "561","0.297574","172.30.1.205","172.30.1.104","TCP","54","33210 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "562","0.298510","172.30.1.205","172.30.1.104","TCP","74","40576 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903524 TSecr=0 WS=128" "563","0.298796","172.30.1.104","172.30.1.205","TCP","66","135 > 40576 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "564","0.298806","172.30.1.205","172.30.1.104","TCP","54","40576 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "565","0.299151","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "566","0.299455","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "567","0.299464","172.30.1.205","172.30.1.104","TCP","54","40576 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "568","0.301659","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "569","0.302065","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "570","0.302072","172.30.1.205","172.30.1.104","TCP","54","40576 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "571","0.303873","172.30.1.205","172.30.1.104","TCP","54","40576 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "572","0.303984","172.30.1.205","172.30.1.104","TCP","74","33214 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903530 TSecr=0 WS=128" "573","0.304193","172.30.1.104","172.30.1.205","TCP","54","135 > 40576 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "574","0.304201","172.30.1.104","172.30.1.205","TCP","54","135 > 40576 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "575","0.304207","172.30.1.205","172.30.1.104","TCP","54","40576 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "576","0.305772","172.30.1.104","172.30.1.205","TCP","66","49671 > 33214 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "577","0.305782","172.30.1.205","172.30.1.104","TCP","54","33214 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "578","0.306133","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "579","0.306405","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "580","0.306414","172.30.1.205","172.30.1.104","TCP","54","33214 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "581","0.308283","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "582","0.308634","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "583","0.308640","172.30.1.205","172.30.1.104","TCP","54","33214 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "584","0.309999","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "585","0.312051","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "586","0.312062","172.30.1.205","172.30.1.104","TCP","54","33214 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "587","0.313024","172.30.1.205","172.30.1.104","TCP","74","40580 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903539 TSecr=0 WS=128" "588","0.313321","172.30.1.104","172.30.1.205","TCP","66","135 > 40580 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "589","0.313337","172.30.1.205","172.30.1.104","TCP","54","40580 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "590","0.313741","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "591","0.314021","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "592","0.314031","172.30.1.205","172.30.1.104","TCP","54","40580 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "593","0.316246","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "594","0.316671","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "595","0.316678","172.30.1.205","172.30.1.104","TCP","54","40580 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "596","0.318508","172.30.1.205","172.30.1.104","TCP","54","40580 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "597","0.318623","172.30.1.205","172.30.1.104","TCP","74","33218 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903545 TSecr=0 WS=128" "598","0.318825","172.30.1.104","172.30.1.205","TCP","54","135 > 40580 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "599","0.318835","172.30.1.104","172.30.1.205","TCP","54","135 > 40580 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "600","0.318840","172.30.1.205","172.30.1.104","TCP","54","40580 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "601","0.318918","172.30.1.104","172.30.1.205","TCP","66","49671 > 33218 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "602","0.318927","172.30.1.205","172.30.1.104","TCP","54","33218 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "603","0.319271","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "604","0.319617","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "605","0.319626","172.30.1.205","172.30.1.104","TCP","54","33218 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "606","0.321541","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "607","0.321867","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "608","0.321872","172.30.1.205","172.30.1.104","TCP","54","33218 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "609","0.323221","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "610","0.325267","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "611","0.325277","172.30.1.205","172.30.1.104","TCP","54","33218 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "612","0.326226","172.30.1.205","172.30.1.104","TCP","74","40584 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903552 TSecr=0 WS=128" "613","0.326513","172.30.1.104","172.30.1.205","TCP","66","135 > 40584 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "614","0.326527","172.30.1.205","172.30.1.104","TCP","54","40584 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "615","0.326889","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "616","0.327304","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "617","0.327314","172.30.1.205","172.30.1.104","TCP","54","40584 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "618","0.329532","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "619","0.329898","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "620","0.329905","172.30.1.205","172.30.1.104","TCP","54","40584 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "621","0.331703","172.30.1.205","172.30.1.104","TCP","54","40584 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "622","0.331815","172.30.1.205","172.30.1.104","TCP","74","33222 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903558 TSecr=0 WS=128" "623","0.331969","172.30.1.104","172.30.1.205","TCP","54","135 > 40584 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "624","0.331999","172.30.1.104","172.30.1.205","TCP","54","135 > 40584 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "625","0.332004","172.30.1.205","172.30.1.104","TCP","54","40584 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "626","0.332122","172.30.1.104","172.30.1.205","TCP","66","49671 > 33222 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "627","0.332130","172.30.1.205","172.30.1.104","TCP","54","33222 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "628","0.332472","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "629","0.332731","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "630","0.332742","172.30.1.205","172.30.1.104","TCP","54","33222 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "631","0.334621","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "632","0.335019","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "633","0.335026","172.30.1.205","172.30.1.104","TCP","54","33222 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "634","0.336385","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "635","0.338834","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "636","0.338841","172.30.1.205","172.30.1.104","TCP","54","33222 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "637","0.339781","172.30.1.205","172.30.1.104","TCP","74","40588 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903566 TSecr=0 WS=128" "638","0.340114","172.30.1.104","172.30.1.205","TCP","66","135 > 40588 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "639","0.340125","172.30.1.205","172.30.1.104","TCP","54","40588 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "640","0.340469","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "641","0.340748","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "642","0.340757","172.30.1.205","172.30.1.104","TCP","54","40588 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "643","0.342932","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "644","0.343303","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "645","0.343310","172.30.1.205","172.30.1.104","TCP","54","40588 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "646","0.345123","172.30.1.205","172.30.1.104","TCP","54","40588 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "647","0.345233","172.30.1.205","172.30.1.104","TCP","74","33226 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903571 TSecr=0 WS=128" "648","0.345370","172.30.1.104","172.30.1.205","TCP","54","135 > 40588 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "649","0.345408","172.30.1.104","172.30.1.205","TCP","54","135 > 40588 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "650","0.345414","172.30.1.205","172.30.1.104","TCP","54","40588 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "651","0.345511","172.30.1.104","172.30.1.205","TCP","66","49671 > 33226 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "652","0.345520","172.30.1.205","172.30.1.104","TCP","54","33226 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "653","0.345865","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "654","0.346117","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "655","0.346126","172.30.1.205","172.30.1.104","TCP","54","33226 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "656","0.347975","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "657","0.348313","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "658","0.348319","172.30.1.205","172.30.1.104","TCP","54","33226 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "659","0.349700","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "660","0.351690","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "661","0.351699","172.30.1.205","172.30.1.104","TCP","54","33226 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "662","0.352639","172.30.1.205","172.30.1.104","TCP","74","40592 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903579 TSecr=0 WS=128" "663","0.352916","172.30.1.104","172.30.1.205","TCP","66","135 > 40592 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "664","0.352930","172.30.1.205","172.30.1.104","TCP","54","40592 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "665","0.353318","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "666","0.353656","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "667","0.353665","172.30.1.205","172.30.1.104","TCP","54","40592 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "668","0.355847","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "669","0.356198","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "670","0.356205","172.30.1.205","172.30.1.104","TCP","54","40592 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "671","0.358031","172.30.1.205","172.30.1.104","TCP","54","40592 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "672","0.358143","172.30.1.205","172.30.1.104","TCP","74","33230 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903584 TSecr=0 WS=128" "673","0.358295","172.30.1.104","172.30.1.205","TCP","54","135 > 40592 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "674","0.358312","172.30.1.104","172.30.1.205","TCP","54","135 > 40592 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "675","0.358318","172.30.1.205","172.30.1.104","TCP","54","40592 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "676","0.358424","172.30.1.104","172.30.1.205","TCP","66","49671 > 33230 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "677","0.358433","172.30.1.205","172.30.1.104","TCP","54","33230 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "678","0.358804","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "679","0.359069","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "680","0.359078","172.30.1.205","172.30.1.104","TCP","54","33230 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "681","0.360948","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "682","0.361335","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "683","0.361342","172.30.1.205","172.30.1.104","TCP","54","33230 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "684","0.362667","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "685","0.364738","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "686","0.364751","172.30.1.205","172.30.1.104","TCP","54","33230 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "687","0.365766","172.30.1.205","172.30.1.104","TCP","74","40596 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903592 TSecr=0 WS=128" "688","0.366100","172.30.1.104","172.30.1.205","TCP","66","135 > 40596 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "689","0.366112","172.30.1.205","172.30.1.104","TCP","54","40596 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "690","0.366465","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "691","0.366762","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "692","0.366774","172.30.1.205","172.30.1.104","TCP","54","40596 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "693","0.368995","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "694","0.369374","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "695","0.369381","172.30.1.205","172.30.1.104","TCP","54","40596 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "696","0.371187","172.30.1.205","172.30.1.104","TCP","54","40596 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "697","0.371300","172.30.1.205","172.30.1.104","TCP","74","33234 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903597 TSecr=0 WS=128" "698","0.371427","172.30.1.104","172.30.1.205","TCP","54","135 > 40596 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "699","0.371459","172.30.1.104","172.30.1.205","TCP","54","135 > 40596 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "700","0.371465","172.30.1.205","172.30.1.104","TCP","54","40596 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "701","0.371576","172.30.1.104","172.30.1.205","TCP","66","49671 > 33234 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "702","0.371585","172.30.1.205","172.30.1.104","TCP","54","33234 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "703","0.371931","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "704","0.372198","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "705","0.372207","172.30.1.205","172.30.1.104","TCP","54","33234 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "706","0.374126","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "707","0.374473","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "708","0.374480","172.30.1.205","172.30.1.104","TCP","54","33234 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "709","0.375833","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "710","0.378025","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "711","0.378035","172.30.1.205","172.30.1.104","TCP","54","33234 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "712","0.378983","172.30.1.205","172.30.1.104","TCP","74","40600 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903605 TSecr=0 WS=128" "713","0.379276","172.30.1.104","172.30.1.205","TCP","66","135 > 40600 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "714","0.379287","172.30.1.205","172.30.1.104","TCP","54","40600 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "715","0.379633","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "716","0.379923","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "717","0.379932","172.30.1.205","172.30.1.104","TCP","54","40600 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "718","0.382130","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "719","0.383157","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "720","0.383164","172.30.1.205","172.30.1.104","TCP","54","40600 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "721","0.384985","172.30.1.205","172.30.1.104","TCP","54","40600 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "722","0.385095","172.30.1.205","172.30.1.104","TCP","74","33238 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903611 TSecr=0 WS=128" "723","0.385228","172.30.1.104","172.30.1.205","TCP","54","135 > 40600 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "724","0.385250","172.30.1.104","172.30.1.205","TCP","54","135 > 40600 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "725","0.385256","172.30.1.205","172.30.1.104","TCP","54","40600 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "726","0.385366","172.30.1.104","172.30.1.205","TCP","66","49671 > 33238 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "727","0.385374","172.30.1.205","172.30.1.104","TCP","54","33238 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "728","0.385733","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "729","0.386286","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "730","0.386295","172.30.1.205","172.30.1.104","TCP","54","33238 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "731","0.388133","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "732","0.389635","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "733","0.389643","172.30.1.205","172.30.1.104","TCP","54","33238 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "734","0.390993","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "735","0.393201","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "736","0.393212","172.30.1.205","172.30.1.104","TCP","54","33238 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "737","0.394153","172.30.1.205","172.30.1.104","TCP","74","40604 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903620 TSecr=0 WS=128" "738","0.394436","172.30.1.104","172.30.1.205","TCP","66","135 > 40604 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "739","0.394447","172.30.1.205","172.30.1.104","TCP","54","40604 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "740","0.394798","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "741","0.395098","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "742","0.395110","172.30.1.205","172.30.1.104","TCP","54","40604 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "743","0.397344","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "744","0.397735","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "745","0.397742","172.30.1.205","172.30.1.104","TCP","54","40604 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "746","0.398575","172.30.1.205","172.30.1.104","TCP","54","33198 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "747","0.398624","172.30.1.205","172.30.1.104","TCP","54","33202 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "748","0.398662","172.30.1.205","172.30.1.104","TCP","54","33206 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "749","0.398698","172.30.1.205","172.30.1.104","TCP","54","33210 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "750","0.398736","172.30.1.205","172.30.1.104","TCP","54","33214 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "751","0.398767","172.30.1.205","172.30.1.104","TCP","54","33218 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "752","0.398794","172.30.1.205","172.30.1.104","TCP","54","33222 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "753","0.398825","172.30.1.205","172.30.1.104","TCP","54","33226 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "754","0.398849","172.30.1.205","172.30.1.104","TCP","54","33230 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "755","0.398877","172.30.1.205","172.30.1.104","TCP","54","33234 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "756","0.398907","172.30.1.205","172.30.1.104","TCP","54","33238 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "757","0.398972","172.30.1.205","172.30.1.104","TCP","54","33194 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "758","0.399030","172.30.1.104","172.30.1.205","TCP","54","49671 > 33198 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "759","0.399040","172.30.1.104","172.30.1.205","TCP","54","49671 > 33198 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "760","0.399046","172.30.1.205","172.30.1.104","TCP","54","33198 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "761","0.399052","172.30.1.104","172.30.1.205","TCP","54","49671 > 33202 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "762","0.399060","172.30.1.104","172.30.1.205","TCP","54","49671 > 33202 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "763","0.399063","172.30.1.205","172.30.1.104","TCP","54","33202 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "764","0.399150","172.30.1.104","172.30.1.205","TCP","54","49671 > 33206 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "765","0.399167","172.30.1.104","172.30.1.205","TCP","54","49671 > 33210 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "766","0.399195","172.30.1.104","172.30.1.205","TCP","54","49671 > 33214 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "767","0.399259","172.30.1.104","172.30.1.205","TCP","54","49671 > 33218 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "768","0.399403","172.30.1.104","172.30.1.205","TCP","54","49671 > 33222 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "769","0.399409","172.30.1.104","172.30.1.205","TCP","54","49671 > 33226 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "770","0.399412","172.30.1.104","172.30.1.205","TCP","54","49671 > 33230 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "771","0.399414","172.30.1.104","172.30.1.205","TCP","54","49671 > 33234 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "772","0.399417","172.30.1.104","172.30.1.205","TCP","54","49671 > 33238 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "773","0.399419","172.30.1.104","172.30.1.205","TCP","54","49671 > 33238 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "774","0.399424","172.30.1.205","172.30.1.104","TCP","54","33238 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "775","0.399431","172.30.1.104","172.30.1.205","TCP","54","49671 > 33234 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "776","0.399433","172.30.1.205","172.30.1.104","TCP","54","33234 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "777","0.399589","172.30.1.104","172.30.1.205","TCP","54","49671 > 33230 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "778","0.399594","172.30.1.205","172.30.1.104","TCP","54","33230 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "779","0.399600","172.30.1.104","172.30.1.205","TCP","54","49671 > 33226 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "780","0.399602","172.30.1.205","172.30.1.104","TCP","54","33226 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "781","0.399603","172.30.1.104","172.30.1.205","TCP","54","49671 > 33222 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "782","0.399606","172.30.1.205","172.30.1.104","TCP","54","33222 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "783","0.399611","172.30.1.104","172.30.1.205","TCP","54","49671 > 33218 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "784","0.399613","172.30.1.205","172.30.1.104","TCP","54","33218 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "785","0.399614","172.30.1.104","172.30.1.205","TCP","54","49671 > 33206 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "786","0.399616","172.30.1.205","172.30.1.104","TCP","54","33206 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "787","0.399617","172.30.1.104","172.30.1.205","TCP","54","49671 > 33210 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "788","0.399619","172.30.1.205","172.30.1.104","TCP","54","33210 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "789","0.399620","172.30.1.104","172.30.1.205","TCP","54","49671 > 33214 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "790","0.399621","172.30.1.205","172.30.1.104","TCP","54","33214 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "791","0.399705","172.30.1.104","172.30.1.205","TCP","54","49671 > 33194 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "792","0.399823","172.30.1.104","172.30.1.205","TCP","54","49671 > 33194 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "793","0.399827","172.30.1.205","172.30.1.104","TCP","54","33194 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "794","0.400474","172.30.1.205","172.30.1.104","TCP","54","40604 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "795","0.400585","172.30.1.205","172.30.1.104","TCP","74","33242 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903627 TSecr=0 WS=128" "796","0.400689","172.30.1.104","172.30.1.205","TCP","54","135 > 40604 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "797","0.400710","172.30.1.104","172.30.1.205","TCP","54","135 > 40604 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "798","0.400715","172.30.1.205","172.30.1.104","TCP","54","40604 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "799","0.400839","172.30.1.104","172.30.1.205","TCP","66","49671 > 33242 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "800","0.400848","172.30.1.205","172.30.1.104","TCP","54","33242 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "801","0.401215","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "802","0.401494","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "803","0.401501","172.30.1.205","172.30.1.104","TCP","54","33242 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "804","0.403375","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "805","0.403795","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "806","0.403801","172.30.1.205","172.30.1.104","TCP","54","33242 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "807","0.405198","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "808","0.410067","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "809","0.410078","172.30.1.205","172.30.1.104","TCP","54","33242 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "810","0.411073","172.30.1.205","172.30.1.104","TCP","74","40608 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903637 TSecr=0 WS=128" "811","0.411387","172.30.1.104","172.30.1.205","TCP","66","135 > 40608 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "812","0.411398","172.30.1.205","172.30.1.104","TCP","54","40608 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "813","0.411753","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "814","0.412047","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "815","0.412056","172.30.1.205","172.30.1.104","TCP","54","40608 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "816","0.414265","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "817","0.414676","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "818","0.414683","172.30.1.205","172.30.1.104","TCP","54","40608 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "819","0.416495","172.30.1.205","172.30.1.104","TCP","54","40608 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "820","0.416612","172.30.1.205","172.30.1.104","TCP","74","33246 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903643 TSecr=0 WS=128" "821","0.416730","172.30.1.104","172.30.1.205","TCP","54","135 > 40608 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "822","0.416756","172.30.1.104","172.30.1.205","TCP","54","135 > 40608 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "823","0.416762","172.30.1.205","172.30.1.104","TCP","54","40608 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "824","0.416891","172.30.1.104","172.30.1.205","TCP","66","49671 > 33246 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "825","0.416900","172.30.1.205","172.30.1.104","TCP","54","33246 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "826","0.417243","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "827","0.417519","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "828","0.417529","172.30.1.205","172.30.1.104","TCP","54","33246 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "829","0.419414","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "830","0.419838","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "831","0.419845","172.30.1.205","172.30.1.104","TCP","54","33246 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "832","0.421235","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "833","0.423384","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "834","0.423394","172.30.1.205","172.30.1.104","TCP","54","33246 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "835","0.424341","172.30.1.205","172.30.1.104","TCP","74","40612 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903650 TSecr=0 WS=128" "836","0.424643","172.30.1.104","172.30.1.205","TCP","66","135 > 40612 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "837","0.424655","172.30.1.205","172.30.1.104","TCP","54","40612 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "838","0.425046","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "839","0.425304","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "840","0.425314","172.30.1.205","172.30.1.104","TCP","54","40612 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "841","0.427494","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "842","0.427839","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "843","0.427846","172.30.1.205","172.30.1.104","TCP","54","40612 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "844","0.429668","172.30.1.205","172.30.1.104","TCP","54","40612 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "845","0.429779","172.30.1.205","172.30.1.104","TCP","74","33250 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903656 TSecr=0 WS=128" "846","0.429972","172.30.1.104","172.30.1.205","TCP","54","135 > 40612 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "847","0.429981","172.30.1.104","172.30.1.205","TCP","54","135 > 40612 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "848","0.429986","172.30.1.205","172.30.1.104","TCP","54","40612 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "849","0.430086","172.30.1.104","172.30.1.205","TCP","66","49671 > 33250 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "850","0.430094","172.30.1.205","172.30.1.104","TCP","54","33250 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "851","0.430437","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "852","0.430688","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "853","0.430697","172.30.1.205","172.30.1.104","TCP","54","33250 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "854","0.432564","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "855","0.432958","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "856","0.432965","172.30.1.205","172.30.1.104","TCP","54","33250 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "857","0.434317","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "858","0.436392","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "859","0.436407","172.30.1.205","172.30.1.104","TCP","54","33250 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "860","0.437455","172.30.1.205","172.30.1.104","TCP","74","40616 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903663 TSecr=0 WS=128" "861","0.437738","172.30.1.104","172.30.1.205","TCP","66","135 > 40616 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "862","0.437751","172.30.1.205","172.30.1.104","TCP","54","40616 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "863","0.438117","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "864","0.438395","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "865","0.438410","172.30.1.205","172.30.1.104","TCP","54","40616 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "866","0.440602","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "867","0.441073","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "868","0.441081","172.30.1.205","172.30.1.104","TCP","54","40616 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "869","0.442912","172.30.1.205","172.30.1.104","TCP","54","40616 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "870","0.443030","172.30.1.205","172.30.1.104","TCP","74","33254 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903669 TSecr=0 WS=128" "871","0.443194","172.30.1.104","172.30.1.205","TCP","54","135 > 40616 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "872","0.443244","172.30.1.104","172.30.1.205","TCP","54","135 > 40616 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "873","0.443251","172.30.1.205","172.30.1.104","TCP","54","40616 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "874","0.443352","172.30.1.104","172.30.1.205","TCP","66","49671 > 33254 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "875","0.443362","172.30.1.205","172.30.1.104","TCP","54","33254 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "876","0.443743","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "877","0.444016","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "878","0.444026","172.30.1.205","172.30.1.104","TCP","54","33254 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "879","0.445935","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "880","0.446316","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "881","0.446323","172.30.1.205","172.30.1.104","TCP","54","33254 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "882","0.447662","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "883","0.449861","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "884","0.449871","172.30.1.205","172.30.1.104","TCP","54","33254 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "885","0.450814","172.30.1.205","172.30.1.104","TCP","74","40620 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903677 TSecr=0 WS=128" "886","0.451096","172.30.1.104","172.30.1.205","TCP","66","135 > 40620 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "887","0.451118","172.30.1.205","172.30.1.104","TCP","54","40620 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "888","0.451461","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "889","0.451775","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "890","0.451784","172.30.1.205","172.30.1.104","TCP","54","40620 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "891","0.453976","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "892","0.454360","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "893","0.454366","172.30.1.205","172.30.1.104","TCP","54","40620 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "894","0.456176","172.30.1.205","172.30.1.104","TCP","54","40620 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "895","0.456288","172.30.1.205","172.30.1.104","TCP","74","33258 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903682 TSecr=0 WS=128" "896","0.456520","172.30.1.104","172.30.1.205","TCP","54","135 > 40620 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "897","0.456528","172.30.1.104","172.30.1.205","TCP","54","135 > 40620 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "898","0.456534","172.30.1.205","172.30.1.104","TCP","54","40620 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "899","0.456578","172.30.1.104","172.30.1.205","TCP","66","49671 > 33258 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "900","0.456590","172.30.1.205","172.30.1.104","TCP","54","33258 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "901","0.456975","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "902","0.457239","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "903","0.457247","172.30.1.205","172.30.1.104","TCP","54","33258 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "904","0.459096","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "905","0.459491","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "906","0.459497","172.30.1.205","172.30.1.104","TCP","54","33258 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "907","0.460863","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "908","0.462875","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "909","0.462885","172.30.1.205","172.30.1.104","TCP","54","33258 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "910","0.463802","172.30.1.205","172.30.1.104","TCP","74","40624 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903690 TSecr=0 WS=128" "911","0.464062","172.30.1.104","172.30.1.205","TCP","66","135 > 40624 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "912","0.464072","172.30.1.205","172.30.1.104","TCP","54","40624 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "913","0.464415","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "914","0.464785","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "915","0.464794","172.30.1.205","172.30.1.104","TCP","54","40624 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "916","0.466973","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "917","0.467396","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "918","0.467403","172.30.1.205","172.30.1.104","TCP","54","40624 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "919","0.469228","172.30.1.205","172.30.1.104","TCP","54","40624 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "920","0.469337","172.30.1.205","172.30.1.104","TCP","74","33262 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903695 TSecr=0 WS=128" "921","0.469485","172.30.1.104","172.30.1.205","TCP","54","135 > 40624 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "922","0.469494","172.30.1.104","172.30.1.205","TCP","54","135 > 40624 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "923","0.469499","172.30.1.205","172.30.1.104","TCP","54","40624 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "924","0.469598","172.30.1.104","172.30.1.205","TCP","66","49671 > 33262 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "925","0.469607","172.30.1.205","172.30.1.104","TCP","54","33262 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "926","0.469948","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "927","0.470201","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "928","0.470210","172.30.1.205","172.30.1.104","TCP","54","33262 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "929","0.472108","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "930","0.472455","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "931","0.472461","172.30.1.205","172.30.1.104","TCP","54","33262 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "932","0.473879","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "933","0.476876","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "934","0.476885","172.30.1.205","172.30.1.104","TCP","54","33262 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "935","0.477860","172.30.1.205","172.30.1.104","TCP","74","40628 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903704 TSecr=0 WS=128" "936","0.478181","172.30.1.104","172.30.1.205","TCP","66","135 > 40628 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "937","0.478191","172.30.1.205","172.30.1.104","TCP","54","40628 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "938","0.478532","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "939","0.478807","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "940","0.478816","172.30.1.205","172.30.1.104","TCP","54","40628 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "941","0.481028","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "942","0.481458","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "943","0.481466","172.30.1.205","172.30.1.104","TCP","54","40628 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "944","0.483278","172.30.1.205","172.30.1.104","TCP","54","40628 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "945","0.483390","172.30.1.205","172.30.1.104","TCP","74","33266 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903709 TSecr=0 WS=128" "946","0.483620","172.30.1.104","172.30.1.205","TCP","54","135 > 40628 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "947","0.483629","172.30.1.104","172.30.1.205","TCP","54","135 > 40628 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "948","0.483634","172.30.1.205","172.30.1.104","TCP","54","40628 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "949","0.483765","172.30.1.104","172.30.1.205","TCP","66","49671 > 33266 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "950","0.483778","172.30.1.205","172.30.1.104","TCP","54","33266 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "951","0.484133","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "952","0.484426","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "953","0.484436","172.30.1.205","172.30.1.104","TCP","54","33266 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "954","0.486344","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "955","0.486715","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "956","0.486721","172.30.1.205","172.30.1.104","TCP","54","33266 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "957","0.488069","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "958","0.490232","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "959","0.490241","172.30.1.205","172.30.1.104","TCP","54","33266 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "960","0.491206","172.30.1.205","172.30.1.104","TCP","74","40632 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903717 TSecr=0 WS=128" "961","0.491488","172.30.1.104","172.30.1.205","TCP","66","135 > 40632 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "962","0.491499","172.30.1.205","172.30.1.104","TCP","54","40632 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "963","0.491845","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "964","0.492112","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "965","0.492120","172.30.1.205","172.30.1.104","TCP","54","40632 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "966","0.494327","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "967","0.494737","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "968","0.494744","172.30.1.205","172.30.1.104","TCP","54","40632 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "969","0.496546","172.30.1.205","172.30.1.104","TCP","54","40632 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "970","0.496658","172.30.1.205","172.30.1.104","TCP","74","33270 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903723 TSecr=0 WS=128" "971","0.496825","172.30.1.104","172.30.1.205","TCP","54","135 > 40632 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "972","0.496874","172.30.1.104","172.30.1.205","TCP","54","135 > 40632 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "973","0.496881","172.30.1.205","172.30.1.104","TCP","54","40632 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "974","0.496963","172.30.1.104","172.30.1.205","TCP","66","49671 > 33270 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "975","0.496971","172.30.1.205","172.30.1.104","TCP","54","33270 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "976","0.497319","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "977","0.497581","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "978","0.497590","172.30.1.205","172.30.1.104","TCP","54","33270 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "979","0.499488","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "980","0.499853","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "981","0.499860","172.30.1.205","172.30.1.104","TCP","54","33270 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "982","0.501239","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "983","0.504245","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "984","0.504257","172.30.1.205","172.30.1.104","TCP","54","33270 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "985","0.505263","172.30.1.205","172.30.1.104","TCP","74","40636 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903731 TSecr=0 WS=128" "986","0.505568","172.30.1.104","172.30.1.205","TCP","66","135 > 40636 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "987","0.505580","172.30.1.205","172.30.1.104","TCP","54","40636 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "988","0.505930","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "989","0.506246","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "990","0.506255","172.30.1.205","172.30.1.104","TCP","54","40636 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "991","0.508426","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "992","0.508933","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "993","0.508940","172.30.1.205","172.30.1.104","TCP","54","40636 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "994","0.510753","172.30.1.205","172.30.1.104","TCP","54","40636 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "995","0.510865","172.30.1.205","172.30.1.104","TCP","74","33274 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903737 TSecr=0 WS=128" "996","0.511055","172.30.1.104","172.30.1.205","TCP","54","135 > 40636 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "997","0.511064","172.30.1.104","172.30.1.205","TCP","54","135 > 40636 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "998","0.511070","172.30.1.205","172.30.1.104","TCP","54","40636 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "999","0.511146","172.30.1.104","172.30.1.205","TCP","66","49671 > 33274 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1000","0.511155","172.30.1.205","172.30.1.104","TCP","54","33274 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1001","0.511496","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1002","0.511830","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1003","0.511840","172.30.1.205","172.30.1.104","TCP","54","33274 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1004","0.513746","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1005","0.514147","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1006","0.514153","172.30.1.205","172.30.1.104","TCP","54","33274 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1007","0.515475","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1008","0.518371","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1009","0.518380","172.30.1.205","172.30.1.104","TCP","54","33274 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1010","0.519318","172.30.1.205","172.30.1.104","TCP","74","40640 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903745 TSecr=0 WS=128" "1011","0.519625","172.30.1.104","172.30.1.205","TCP","66","135 > 40640 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1012","0.519636","172.30.1.205","172.30.1.104","TCP","54","40640 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1013","0.519976","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1014","0.520255","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1015","0.520263","172.30.1.205","172.30.1.104","TCP","54","40640 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1016","0.522447","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1017","0.522822","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1018","0.522828","172.30.1.205","172.30.1.104","TCP","54","40640 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1019","0.524620","172.30.1.205","172.30.1.104","TCP","54","40640 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1020","0.524728","172.30.1.205","172.30.1.104","TCP","74","33278 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903751 TSecr=0 WS=128" "1021","0.524893","172.30.1.104","172.30.1.205","TCP","54","135 > 40640 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1022","0.524902","172.30.1.104","172.30.1.205","TCP","54","135 > 40640 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1023","0.524907","172.30.1.205","172.30.1.104","TCP","54","40640 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1024","0.525028","172.30.1.104","172.30.1.205","TCP","66","49671 > 33278 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1025","0.525036","172.30.1.205","172.30.1.104","TCP","54","33278 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1026","0.525388","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1027","0.525662","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1028","0.525671","172.30.1.205","172.30.1.104","TCP","54","33278 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1029","0.527523","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1030","0.527962","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1031","0.527969","172.30.1.205","172.30.1.104","TCP","54","33278 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1032","0.529323","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1033","0.531870","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1034","0.531881","172.30.1.205","172.30.1.104","TCP","54","33278 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1035","0.532831","172.30.1.205","172.30.1.104","TCP","74","40644 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903759 TSecr=0 WS=128" "1036","0.533090","172.30.1.104","172.30.1.205","TCP","66","135 > 40644 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1037","0.533101","172.30.1.205","172.30.1.104","TCP","54","40644 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1038","0.533456","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1039","0.533702","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1040","0.533711","172.30.1.205","172.30.1.104","TCP","54","40644 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1041","0.535872","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1042","0.536234","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1043","0.536241","172.30.1.205","172.30.1.104","TCP","54","40644 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1044","0.538048","172.30.1.205","172.30.1.104","TCP","54","40644 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1045","0.538157","172.30.1.205","172.30.1.104","TCP","74","33282 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903764 TSecr=0 WS=128" "1046","0.538282","172.30.1.104","172.30.1.205","TCP","54","135 > 40644 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1047","0.538312","172.30.1.104","172.30.1.205","TCP","54","135 > 40644 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1048","0.538318","172.30.1.205","172.30.1.104","TCP","54","40644 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1049","0.538435","172.30.1.104","172.30.1.205","TCP","66","49671 > 33282 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1050","0.538443","172.30.1.205","172.30.1.104","TCP","54","33282 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1051","0.538793","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1052","0.539063","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1053","0.539072","172.30.1.205","172.30.1.104","TCP","54","33282 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1054","0.540959","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1055","0.541325","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1056","0.541330","172.30.1.205","172.30.1.104","TCP","54","33282 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1057","0.542650","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1058","0.544787","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1059","0.544796","172.30.1.205","172.30.1.104","TCP","54","33282 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1060","0.545727","172.30.1.205","172.30.1.104","TCP","74","40648 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903772 TSecr=0 WS=128" "1061","0.546013","172.30.1.104","172.30.1.205","TCP","66","135 > 40648 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1062","0.546023","172.30.1.205","172.30.1.104","TCP","54","40648 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1063","0.546365","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1064","0.546653","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1065","0.546665","172.30.1.205","172.30.1.104","TCP","54","40648 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1066","0.548839","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1067","0.549196","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1068","0.549203","172.30.1.205","172.30.1.104","TCP","54","40648 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1069","0.550988","172.30.1.205","172.30.1.104","TCP","54","40648 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1070","0.551097","172.30.1.205","172.30.1.104","TCP","74","33286 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903777 TSecr=0 WS=128" "1071","0.551292","172.30.1.104","172.30.1.205","TCP","54","135 > 40648 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1072","0.551301","172.30.1.104","172.30.1.205","TCP","54","135 > 40648 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1073","0.551306","172.30.1.205","172.30.1.104","TCP","54","40648 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1074","0.551389","172.30.1.104","172.30.1.205","TCP","66","49671 > 33286 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1075","0.551398","172.30.1.205","172.30.1.104","TCP","54","33286 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1076","0.551734","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1077","0.552024","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1078","0.552032","172.30.1.205","172.30.1.104","TCP","54","33286 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1079","0.553908","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1080","0.554279","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1081","0.554285","172.30.1.205","172.30.1.104","TCP","54","33286 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1082","0.555606","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1083","0.558494","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1084","0.558504","172.30.1.205","172.30.1.104","TCP","54","33286 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1085","0.559435","172.30.1.205","172.30.1.104","TCP","74","40652 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903785 TSecr=0 WS=128" "1086","0.559724","172.30.1.104","172.30.1.205","TCP","66","135 > 40652 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1087","0.559734","172.30.1.205","172.30.1.104","TCP","54","40652 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1088","0.560088","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1089","0.560380","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1090","0.560388","172.30.1.205","172.30.1.104","TCP","54","40652 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1091","0.562574","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1092","0.563032","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1093","0.563038","172.30.1.205","172.30.1.104","TCP","54","40652 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1094","0.563867","172.30.1.205","172.30.1.104","TCP","54","33246 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1095","0.563916","172.30.1.205","172.30.1.104","TCP","54","33250 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1096","0.563947","172.30.1.205","172.30.1.104","TCP","54","33254 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1097","0.563975","172.30.1.205","172.30.1.104","TCP","54","33258 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1098","0.564006","172.30.1.205","172.30.1.104","TCP","54","33262 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1099","0.564040","172.30.1.205","172.30.1.104","TCP","54","33266 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1100","0.564071","172.30.1.205","172.30.1.104","TCP","54","33270 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1101","0.564112","172.30.1.205","172.30.1.104","TCP","54","33274 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1102","0.564138","172.30.1.205","172.30.1.104","TCP","54","33278 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1103","0.564164","172.30.1.205","172.30.1.104","TCP","54","33282 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1104","0.564189","172.30.1.205","172.30.1.104","TCP","54","33286 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1105","0.564254","172.30.1.205","172.30.1.104","TCP","54","33242 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1106","0.564577","172.30.1.104","172.30.1.205","TCP","54","49671 > 33246 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1107","0.564679","172.30.1.104","172.30.1.205","TCP","54","49671 > 33250 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1108","0.564696","172.30.1.104","172.30.1.205","TCP","54","49671 > 33254 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1109","0.564717","172.30.1.104","172.30.1.205","TCP","54","49671 > 33258 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1110","0.564737","172.30.1.104","172.30.1.205","TCP","54","49671 > 33262 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1111","0.564829","172.30.1.104","172.30.1.205","TCP","54","49671 > 33266 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1112","0.564862","172.30.1.104","172.30.1.205","TCP","54","49671 > 33270 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1113","0.564885","172.30.1.104","172.30.1.205","TCP","54","49671 > 33274 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1114","0.564905","172.30.1.104","172.30.1.205","TCP","54","49671 > 33278 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1115","0.564946","172.30.1.104","172.30.1.205","TCP","54","49671 > 33282 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1116","0.564979","172.30.1.104","172.30.1.205","TCP","54","49671 > 33286 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1117","0.565003","172.30.1.104","172.30.1.205","TCP","54","49671 > 33242 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1118","0.565035","172.30.1.104","172.30.1.205","TCP","54","49671 > 33242 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1119","0.565042","172.30.1.205","172.30.1.104","TCP","54","33242 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1120","0.565057","172.30.1.104","172.30.1.205","TCP","54","49671 > 33286 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1121","0.565059","172.30.1.205","172.30.1.104","TCP","54","33286 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1122","0.565110","172.30.1.104","172.30.1.205","TCP","54","49671 > 33282 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1123","0.565113","172.30.1.205","172.30.1.104","TCP","54","33282 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1124","0.565129","172.30.1.104","172.30.1.205","TCP","54","49671 > 33278 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1125","0.565131","172.30.1.205","172.30.1.104","TCP","54","33278 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1126","0.565190","172.30.1.104","172.30.1.205","TCP","54","49671 > 33274 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1127","0.565193","172.30.1.205","172.30.1.104","TCP","54","33274 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1128","0.565209","172.30.1.104","172.30.1.205","TCP","54","49671 > 33270 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1129","0.565212","172.30.1.205","172.30.1.104","TCP","54","33270 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1130","0.565279","172.30.1.104","172.30.1.205","TCP","54","49671 > 33266 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1131","0.565283","172.30.1.205","172.30.1.104","TCP","54","33266 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1132","0.565305","172.30.1.104","172.30.1.205","TCP","54","49671 > 33262 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1133","0.565308","172.30.1.205","172.30.1.104","TCP","54","33262 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1134","0.565332","172.30.1.104","172.30.1.205","TCP","54","49671 > 33258 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1135","0.565335","172.30.1.205","172.30.1.104","TCP","54","33258 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1136","0.565353","172.30.1.104","172.30.1.205","TCP","54","49671 > 33246 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1137","0.565356","172.30.1.205","172.30.1.104","TCP","54","33246 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1138","0.565377","172.30.1.104","172.30.1.205","TCP","54","49671 > 33250 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1139","0.565381","172.30.1.205","172.30.1.104","TCP","54","33250 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1140","0.565798","172.30.1.205","172.30.1.104","TCP","54","40652 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1141","0.565815","172.30.1.104","172.30.1.205","TCP","54","49671 > 33254 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1142","0.565820","172.30.1.205","172.30.1.104","TCP","54","33254 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1143","0.565926","172.30.1.205","172.30.1.104","TCP","74","33290 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903792 TSecr=0 WS=128" "1144","0.566136","172.30.1.104","172.30.1.205","TCP","54","135 > 40652 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1145","0.566183","172.30.1.104","172.30.1.205","TCP","54","135 > 40652 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1146","0.566188","172.30.1.205","172.30.1.104","TCP","54","40652 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1147","0.566288","172.30.1.104","172.30.1.205","TCP","66","49671 > 33290 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1148","0.566296","172.30.1.205","172.30.1.104","TCP","54","33290 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1149","0.566641","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1150","0.567399","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1151","0.567414","172.30.1.205","172.30.1.104","TCP","54","33290 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1152","0.569400","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1153","0.569819","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1154","0.569826","172.30.1.205","172.30.1.104","TCP","54","33290 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1155","0.571192","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1156","0.573420","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1157","0.573432","172.30.1.205","172.30.1.104","TCP","54","33290 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1158","0.574396","172.30.1.205","172.30.1.104","TCP","74","40656 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903800 TSecr=0 WS=128" "1159","0.574696","172.30.1.104","172.30.1.205","TCP","66","135 > 40656 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1160","0.574709","172.30.1.205","172.30.1.104","TCP","54","40656 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1161","0.575079","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1162","0.575373","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1163","0.575383","172.30.1.205","172.30.1.104","TCP","54","40656 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1164","0.577592","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1165","0.578017","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1166","0.578026","172.30.1.205","172.30.1.104","TCP","54","40656 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1167","0.579898","172.30.1.205","172.30.1.104","TCP","54","40656 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1168","0.580016","172.30.1.205","172.30.1.104","TCP","74","33294 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903806 TSecr=0 WS=128" "1169","0.580162","172.30.1.104","172.30.1.205","TCP","54","135 > 40656 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1170","0.580174","172.30.1.104","172.30.1.205","TCP","54","135 > 40656 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1171","0.580180","172.30.1.205","172.30.1.104","TCP","54","40656 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1172","0.580308","172.30.1.104","172.30.1.205","TCP","66","49671 > 33294 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1173","0.580317","172.30.1.205","172.30.1.104","TCP","54","33294 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1174","0.580662","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1175","0.580965","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1176","0.580974","172.30.1.205","172.30.1.104","TCP","54","33294 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1177","0.582854","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1178","0.583212","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1179","0.583218","172.30.1.205","172.30.1.104","TCP","54","33294 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1180","0.584556","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1181","0.587555","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1182","0.587564","172.30.1.205","172.30.1.104","TCP","54","33294 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1183","0.588517","172.30.1.205","172.30.1.104","TCP","74","40660 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903814 TSecr=0 WS=128" "1184","0.588859","172.30.1.104","172.30.1.205","TCP","66","135 > 40660 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1185","0.588871","172.30.1.205","172.30.1.104","TCP","54","40660 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1186","0.589227","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1187","0.589627","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1188","0.589636","172.30.1.205","172.30.1.104","TCP","54","40660 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1189","0.591792","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1190","0.592187","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1191","0.592193","172.30.1.205","172.30.1.104","TCP","54","40660 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1192","0.594061","172.30.1.205","172.30.1.104","TCP","54","40660 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1193","0.594169","172.30.1.205","172.30.1.104","TCP","74","33298 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903820 TSecr=0 WS=128" "1194","0.594319","172.30.1.104","172.30.1.205","TCP","54","135 > 40660 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1195","0.594379","172.30.1.104","172.30.1.205","TCP","54","135 > 40660 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1196","0.594384","172.30.1.205","172.30.1.104","TCP","54","40660 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1197","0.594457","172.30.1.104","172.30.1.205","TCP","66","49671 > 33298 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1198","0.594465","172.30.1.205","172.30.1.104","TCP","54","33298 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1199","0.594809","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1200","0.595102","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1201","0.595109","172.30.1.205","172.30.1.104","TCP","54","33298 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1202","0.596969","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1203","0.597337","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1204","0.597343","172.30.1.205","172.30.1.104","TCP","54","33298 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1205","0.598672","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1206","0.600850","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1207","0.600860","172.30.1.205","172.30.1.104","TCP","54","33298 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1208","0.601835","172.30.1.205","172.30.1.104","TCP","74","40664 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903828 TSecr=0 WS=128" "1209","0.602121","172.30.1.104","172.30.1.205","TCP","66","135 > 40664 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1210","0.602131","172.30.1.205","172.30.1.104","TCP","54","40664 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1211","0.602473","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1212","0.602753","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1213","0.602761","172.30.1.205","172.30.1.104","TCP","54","40664 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1214","0.604953","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1215","0.605381","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1216","0.605388","172.30.1.205","172.30.1.104","TCP","54","40664 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1217","0.607175","172.30.1.205","172.30.1.104","TCP","54","40664 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1218","0.607285","172.30.1.205","172.30.1.104","TCP","74","33302 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903833 TSecr=0 WS=128" "1219","0.607455","172.30.1.104","172.30.1.205","TCP","54","135 > 40664 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1220","0.607464","172.30.1.104","172.30.1.205","TCP","54","135 > 40664 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1221","0.607469","172.30.1.205","172.30.1.104","TCP","54","40664 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1222","0.607669","172.30.1.104","172.30.1.205","TCP","66","49671 > 33302 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1223","0.607677","172.30.1.205","172.30.1.104","TCP","54","33302 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1224","0.608027","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1225","0.608335","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1226","0.608343","172.30.1.205","172.30.1.104","TCP","54","33302 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1227","0.610222","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1228","0.610569","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1229","0.610576","172.30.1.205","172.30.1.104","TCP","54","33302 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1230","0.611900","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1231","0.614070","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1232","0.614079","172.30.1.205","172.30.1.104","TCP","54","33302 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1233","0.615020","172.30.1.205","172.30.1.104","TCP","74","40668 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903841 TSecr=0 WS=128" "1234","0.615313","172.30.1.104","172.30.1.205","TCP","66","135 > 40668 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1235","0.615324","172.30.1.205","172.30.1.104","TCP","54","40668 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1236","0.615665","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1237","0.615954","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1238","0.615963","172.30.1.205","172.30.1.104","TCP","54","40668 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1239","0.618143","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1240","0.618512","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1241","0.618519","172.30.1.205","172.30.1.104","TCP","54","40668 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1242","0.620309","172.30.1.205","172.30.1.104","TCP","54","40668 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1243","0.620417","172.30.1.205","172.30.1.104","TCP","74","33306 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903846 TSecr=0 WS=128" "1244","0.620582","172.30.1.104","172.30.1.205","TCP","54","135 > 40668 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1245","0.620591","172.30.1.104","172.30.1.205","TCP","54","135 > 40668 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1246","0.620596","172.30.1.205","172.30.1.104","TCP","54","40668 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1247","0.620672","172.30.1.104","172.30.1.205","TCP","66","49671 > 33306 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1248","0.620680","172.30.1.205","172.30.1.104","TCP","54","33306 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1249","0.621047","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1250","0.621370","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1251","0.621379","172.30.1.205","172.30.1.104","TCP","54","33306 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1252","0.623225","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1253","0.623589","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1254","0.623595","172.30.1.205","172.30.1.104","TCP","54","33306 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1255","0.624949","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1256","0.627167","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1257","0.627178","172.30.1.205","172.30.1.104","TCP","54","33306 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1258","0.628121","172.30.1.205","172.30.1.104","TCP","74","40672 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903854 TSecr=0 WS=128" "1259","0.628413","172.30.1.104","172.30.1.205","TCP","66","135 > 40672 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1260","0.628424","172.30.1.205","172.30.1.104","TCP","54","40672 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1261","0.628765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1262","0.629035","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1263","0.629044","172.30.1.205","172.30.1.104","TCP","54","40672 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1264","0.631196","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1265","0.631668","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1266","0.631676","172.30.1.205","172.30.1.104","TCP","54","40672 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1267","0.633509","172.30.1.205","172.30.1.104","TCP","54","40672 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1268","0.633617","172.30.1.205","172.30.1.104","TCP","74","33310 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903860 TSecr=0 WS=128" "1269","0.633737","172.30.1.104","172.30.1.205","TCP","54","135 > 40672 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1270","0.633777","172.30.1.104","172.30.1.205","TCP","54","135 > 40672 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1271","0.633782","172.30.1.205","172.30.1.104","TCP","54","40672 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1272","0.633897","172.30.1.104","172.30.1.205","TCP","66","49671 > 33310 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1273","0.633906","172.30.1.205","172.30.1.104","TCP","54","33310 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1274","0.634245","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1275","0.634561","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1276","0.634570","172.30.1.205","172.30.1.104","TCP","54","33310 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1277","0.636445","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1278","0.636829","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1279","0.636838","172.30.1.205","172.30.1.104","TCP","54","33310 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1280","0.638251","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1281","0.640325","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1282","0.640336","172.30.1.205","172.30.1.104","TCP","54","33310 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1283","0.641315","172.30.1.205","172.30.1.104","TCP","74","40676 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903867 TSecr=0 WS=128" "1284","0.641628","172.30.1.104","172.30.1.205","TCP","66","135 > 40676 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1285","0.641640","172.30.1.205","172.30.1.104","TCP","54","40676 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1286","0.641991","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1287","0.642334","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1288","0.642343","172.30.1.205","172.30.1.104","TCP","54","40676 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1289","0.644557","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1290","0.644985","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1291","0.644993","172.30.1.205","172.30.1.104","TCP","54","40676 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1292","0.646809","172.30.1.205","172.30.1.104","TCP","54","40676 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1293","0.646922","172.30.1.205","172.30.1.104","TCP","74","33314 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903873 TSecr=0 WS=128" "1294","0.647101","172.30.1.104","172.30.1.205","TCP","54","135 > 40676 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1295","0.647176","172.30.1.104","172.30.1.205","TCP","54","135 > 40676 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1296","0.647181","172.30.1.205","172.30.1.104","TCP","54","40676 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1297","0.647279","172.30.1.104","172.30.1.205","TCP","66","49671 > 33314 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1298","0.647289","172.30.1.205","172.30.1.104","TCP","54","33314 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1299","0.647634","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1300","0.647936","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1301","0.647945","172.30.1.205","172.30.1.104","TCP","54","33314 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1302","0.649868","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1303","0.650281","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1304","0.650287","172.30.1.205","172.30.1.104","TCP","54","33314 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1305","0.651633","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1306","0.654040","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1307","0.654050","172.30.1.205","172.30.1.104","TCP","54","33314 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1308","0.654997","172.30.1.205","172.30.1.104","TCP","74","40680 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903881 TSecr=0 WS=128" "1309","0.655364","172.30.1.104","172.30.1.205","TCP","66","135 > 40680 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1310","0.655377","172.30.1.205","172.30.1.104","TCP","54","40680 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1311","0.655735","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1312","0.656025","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1313","0.656034","172.30.1.205","172.30.1.104","TCP","54","40680 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1314","0.658242","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1315","0.658635","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1316","0.658641","172.30.1.205","172.30.1.104","TCP","54","40680 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1317","0.660443","172.30.1.205","172.30.1.104","TCP","54","40680 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1318","0.660554","172.30.1.205","172.30.1.104","TCP","74","33318 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903886 TSecr=0 WS=128" "1319","0.660717","172.30.1.104","172.30.1.205","TCP","54","135 > 40680 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1320","0.660758","172.30.1.104","172.30.1.205","TCP","54","135 > 40680 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1321","0.660764","172.30.1.205","172.30.1.104","TCP","54","40680 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1322","0.660876","172.30.1.104","172.30.1.205","TCP","66","49671 > 33318 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1323","0.660886","172.30.1.205","172.30.1.104","TCP","54","33318 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1324","0.661239","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1325","0.661538","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1326","0.661547","172.30.1.205","172.30.1.104","TCP","54","33318 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1327","0.663389","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1328","0.663808","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1329","0.663815","172.30.1.205","172.30.1.104","TCP","54","33318 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1330","0.665229","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1331","0.668554","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1332","0.668569","172.30.1.205","172.30.1.104","TCP","54","33318 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1333","0.669616","172.30.1.205","172.30.1.104","TCP","74","40684 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903896 TSecr=0 WS=128" "1334","0.669921","172.30.1.104","172.30.1.205","TCP","66","135 > 40684 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1335","0.669932","172.30.1.205","172.30.1.104","TCP","54","40684 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1336","0.670289","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1337","0.670608","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1338","0.670621","172.30.1.205","172.30.1.104","TCP","54","40684 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1339","0.672890","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1340","0.673316","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1341","0.673323","172.30.1.205","172.30.1.104","TCP","54","40684 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1342","0.675134","172.30.1.205","172.30.1.104","TCP","54","40684 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1343","0.675251","172.30.1.205","172.30.1.104","TCP","74","33322 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903901 TSecr=0 WS=128" "1344","0.675417","172.30.1.104","172.30.1.205","TCP","54","135 > 40684 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1345","0.675442","172.30.1.104","172.30.1.205","TCP","54","135 > 40684 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1346","0.675448","172.30.1.205","172.30.1.104","TCP","54","40684 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1347","0.675550","172.30.1.104","172.30.1.205","TCP","66","49671 > 33322 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1348","0.675559","172.30.1.205","172.30.1.104","TCP","54","33322 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1349","0.675902","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1350","0.676208","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1351","0.676217","172.30.1.205","172.30.1.104","TCP","54","33322 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1352","0.678113","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1353","0.678500","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1354","0.678505","172.30.1.205","172.30.1.104","TCP","54","33322 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1355","0.679842","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1356","0.682423","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1357","0.682435","172.30.1.205","172.30.1.104","TCP","54","33322 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1358","0.683402","172.30.1.205","172.30.1.104","TCP","74","40688 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903909 TSecr=0 WS=128" "1359","0.683750","172.30.1.104","172.30.1.205","TCP","66","135 > 40688 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1360","0.683760","172.30.1.205","172.30.1.104","TCP","54","40688 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1361","0.684110","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1362","0.684414","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1363","0.684425","172.30.1.205","172.30.1.104","TCP","54","40688 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1364","0.686649","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1365","0.687061","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1366","0.687068","172.30.1.205","172.30.1.104","TCP","54","40688 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1367","0.688891","172.30.1.205","172.30.1.104","TCP","54","40688 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1368","0.689001","172.30.1.205","172.30.1.104","TCP","74","33326 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903915 TSecr=0 WS=128" "1369","0.689164","172.30.1.104","172.30.1.205","TCP","54","135 > 40688 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1370","0.689188","172.30.1.104","172.30.1.205","TCP","54","135 > 40688 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1371","0.689194","172.30.1.205","172.30.1.104","TCP","54","40688 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1372","0.689327","172.30.1.104","172.30.1.205","TCP","66","49671 > 33326 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1373","0.689336","172.30.1.205","172.30.1.104","TCP","54","33326 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1374","0.689679","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1375","0.689969","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1376","0.689977","172.30.1.205","172.30.1.104","TCP","54","33326 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1377","0.691818","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1378","0.692177","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1379","0.692181","172.30.1.205","172.30.1.104","TCP","54","33326 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1380","0.693549","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1381","0.696816","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1382","0.696829","172.30.1.205","172.30.1.104","TCP","54","33326 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1383","0.697809","172.30.1.205","172.30.1.104","TCP","74","40692 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903924 TSecr=0 WS=128" "1384","0.698119","172.30.1.104","172.30.1.205","TCP","66","135 > 40692 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1385","0.698133","172.30.1.205","172.30.1.104","TCP","54","40692 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1386","0.698497","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1387","0.698807","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1388","0.698819","172.30.1.205","172.30.1.104","TCP","54","40692 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1389","0.701065","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1390","0.701484","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1391","0.701491","172.30.1.205","172.30.1.104","TCP","54","40692 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1392","0.703281","172.30.1.205","172.30.1.104","TCP","54","40692 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1393","0.703391","172.30.1.205","172.30.1.104","TCP","74","33330 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903929 TSecr=0 WS=128" "1394","0.703591","172.30.1.104","172.30.1.205","TCP","54","135 > 40692 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1395","0.703639","172.30.1.104","172.30.1.205","TCP","54","135 > 40692 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1396","0.703644","172.30.1.205","172.30.1.104","TCP","54","40692 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1397","0.703766","172.30.1.104","172.30.1.205","TCP","66","49671 > 33330 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1398","0.703774","172.30.1.205","172.30.1.104","TCP","54","33330 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1399","0.704134","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1400","0.704479","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1401","0.704488","172.30.1.205","172.30.1.104","TCP","54","33330 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1402","0.706364","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1403","0.706834","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1404","0.706840","172.30.1.205","172.30.1.104","TCP","54","33330 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1405","0.708194","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1406","0.710316","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1407","0.710326","172.30.1.205","172.30.1.104","TCP","54","33330 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1408","0.711253","172.30.1.205","172.30.1.104","TCP","74","40696 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903937 TSecr=0 WS=128" "1409","0.711574","172.30.1.104","172.30.1.205","TCP","66","135 > 40696 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1410","0.711588","172.30.1.205","172.30.1.104","TCP","54","40696 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1411","0.711930","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1412","0.712245","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1413","0.712254","172.30.1.205","172.30.1.104","TCP","54","40696 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1414","0.714435","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1415","0.714838","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1416","0.714845","172.30.1.205","172.30.1.104","TCP","54","40696 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1417","0.716642","172.30.1.205","172.30.1.104","TCP","54","40696 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1418","0.716754","172.30.1.205","172.30.1.104","TCP","74","33334 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903943 TSecr=0 WS=128" "1419","0.716968","172.30.1.104","172.30.1.205","TCP","54","135 > 40696 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1420","0.716994","172.30.1.104","172.30.1.205","TCP","54","135 > 40696 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1421","0.717000","172.30.1.205","172.30.1.104","TCP","54","40696 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1422","0.717121","172.30.1.104","172.30.1.205","TCP","66","49671 > 33334 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1423","0.717129","172.30.1.205","172.30.1.104","TCP","54","33334 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1424","0.717474","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1425","0.717818","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1426","0.717826","172.30.1.205","172.30.1.104","TCP","54","33334 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1427","0.719652","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1428","0.722192","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1429","0.722197","172.30.1.205","172.30.1.104","TCP","54","33334 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1430","0.723539","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1431","0.725893","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1432","0.725903","172.30.1.205","172.30.1.104","TCP","54","33334 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1433","0.726859","172.30.1.205","172.30.1.104","TCP","74","40700 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903953 TSecr=0 WS=128" "1434","0.727236","172.30.1.104","172.30.1.205","TCP","66","135 > 40700 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1435","0.727247","172.30.1.205","172.30.1.104","TCP","54","40700 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1436","0.727595","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1437","0.727953","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1438","0.727962","172.30.1.205","172.30.1.104","TCP","54","40700 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1439","0.730140","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1440","0.730568","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1441","0.730575","172.30.1.205","172.30.1.104","TCP","54","40700 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1442","0.731405","172.30.1.205","172.30.1.104","TCP","54","33294 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1443","0.731451","172.30.1.205","172.30.1.104","TCP","54","33298 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1444","0.731482","172.30.1.205","172.30.1.104","TCP","54","33302 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1445","0.731512","172.30.1.205","172.30.1.104","TCP","54","33306 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1446","0.731540","172.30.1.205","172.30.1.104","TCP","54","33310 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1447","0.731565","172.30.1.205","172.30.1.104","TCP","54","33314 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1448","0.731593","172.30.1.205","172.30.1.104","TCP","54","33318 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1449","0.731621","172.30.1.205","172.30.1.104","TCP","54","33322 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1450","0.731647","172.30.1.205","172.30.1.104","TCP","54","33326 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1451","0.731669","172.30.1.205","172.30.1.104","TCP","54","33330 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1452","0.731694","172.30.1.205","172.30.1.104","TCP","54","33334 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1453","0.731764","172.30.1.205","172.30.1.104","TCP","54","33290 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1454","0.731896","172.30.1.104","172.30.1.205","TCP","54","49671 > 33294 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1455","0.731927","172.30.1.104","172.30.1.205","TCP","54","49671 > 33298 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1456","0.731957","172.30.1.104","172.30.1.205","TCP","54","49671 > 33302 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1457","0.731992","172.30.1.104","172.30.1.205","TCP","54","49671 > 33306 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1458","0.732117","172.30.1.104","172.30.1.205","TCP","54","49671 > 33306 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1459","0.732125","172.30.1.205","172.30.1.104","TCP","54","33306 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1460","0.732148","172.30.1.104","172.30.1.205","TCP","54","49671 > 33294 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1461","0.732151","172.30.1.205","172.30.1.104","TCP","54","33294 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1462","0.732183","172.30.1.104","172.30.1.205","TCP","54","49671 > 33298 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1463","0.732186","172.30.1.205","172.30.1.104","TCP","54","33298 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1464","0.732213","172.30.1.104","172.30.1.205","TCP","54","49671 > 33302 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1465","0.732219","172.30.1.205","172.30.1.104","TCP","54","33302 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1466","0.732347","172.30.1.104","172.30.1.205","TCP","54","49671 > 33310 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1467","0.732378","172.30.1.104","172.30.1.205","TCP","54","49671 > 33314 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1468","0.732408","172.30.1.104","172.30.1.205","TCP","54","49671 > 33318 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1469","0.732439","172.30.1.104","172.30.1.205","TCP","54","49671 > 33322 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1470","0.732468","172.30.1.104","172.30.1.205","TCP","54","49671 > 33326 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1471","0.732580","172.30.1.104","172.30.1.205","TCP","54","49671 > 33330 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1472","0.732609","172.30.1.104","172.30.1.205","TCP","54","49671 > 33334 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1473","0.732641","172.30.1.104","172.30.1.205","TCP","54","49671 > 33290 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1474","0.732670","172.30.1.104","172.30.1.205","TCP","54","49671 > 33290 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1475","0.732675","172.30.1.205","172.30.1.104","TCP","54","33290 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1476","0.732708","172.30.1.104","172.30.1.205","TCP","54","49671 > 33334 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1477","0.732712","172.30.1.205","172.30.1.104","TCP","54","33334 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1478","0.732740","172.30.1.104","172.30.1.205","TCP","54","49671 > 33330 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1479","0.732743","172.30.1.205","172.30.1.104","TCP","54","33330 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1480","0.732771","172.30.1.104","172.30.1.205","TCP","54","49671 > 33326 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1481","0.732787","172.30.1.205","172.30.1.104","TCP","54","33326 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1482","0.732802","172.30.1.104","172.30.1.205","TCP","54","49671 > 33322 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1483","0.732805","172.30.1.205","172.30.1.104","TCP","54","33322 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1484","0.732833","172.30.1.104","172.30.1.205","TCP","54","49671 > 33310 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1485","0.732837","172.30.1.205","172.30.1.104","TCP","54","33310 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1486","0.732864","172.30.1.104","172.30.1.205","TCP","54","49671 > 33314 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1487","0.732867","172.30.1.205","172.30.1.104","TCP","54","33314 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1488","0.732894","172.30.1.104","172.30.1.205","TCP","54","49671 > 33318 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1489","0.732898","172.30.1.205","172.30.1.104","TCP","54","33318 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1490","0.733363","172.30.1.205","172.30.1.104","TCP","54","40700 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1491","0.733471","172.30.1.205","172.30.1.104","TCP","74","33338 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903959 TSecr=0 WS=128" "1492","0.733653","172.30.1.104","172.30.1.205","TCP","54","135 > 40700 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1493","0.733679","172.30.1.104","172.30.1.205","TCP","54","135 > 40700 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1494","0.733684","172.30.1.205","172.30.1.104","TCP","54","40700 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1495","0.733790","172.30.1.104","172.30.1.205","TCP","66","49671 > 33338 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1496","0.733799","172.30.1.205","172.30.1.104","TCP","54","33338 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1497","0.734144","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1498","0.734470","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1499","0.734478","172.30.1.205","172.30.1.104","TCP","54","33338 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1500","0.736356","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1501","0.736768","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1502","0.736784","172.30.1.205","172.30.1.104","TCP","54","33338 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1503","0.738140","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1504","0.740668","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1505","0.740678","172.30.1.205","172.30.1.104","TCP","54","33338 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1506","0.741646","172.30.1.205","172.30.1.104","TCP","74","40704 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903968 TSecr=0 WS=128" "1507","0.741980","172.30.1.104","172.30.1.205","TCP","66","135 > 40704 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1508","0.741991","172.30.1.205","172.30.1.104","TCP","54","40704 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1509","0.742340","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1510","0.742665","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1511","0.742674","172.30.1.205","172.30.1.104","TCP","54","40704 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1512","0.744855","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1513","0.745347","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1514","0.745353","172.30.1.205","172.30.1.104","TCP","54","40704 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1515","0.747139","172.30.1.205","172.30.1.104","TCP","54","40704 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1516","0.747249","172.30.1.205","172.30.1.104","TCP","74","33342 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903973 TSecr=0 WS=128" "1517","0.747442","172.30.1.104","172.30.1.205","TCP","54","135 > 40704 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1518","0.747471","172.30.1.104","172.30.1.205","TCP","54","135 > 40704 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1519","0.747477","172.30.1.205","172.30.1.104","TCP","54","40704 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1520","0.747584","172.30.1.104","172.30.1.205","TCP","66","49671 > 33342 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1521","0.747593","172.30.1.205","172.30.1.104","TCP","54","33342 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1522","0.747932","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1523","0.748288","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1524","0.748297","172.30.1.205","172.30.1.104","TCP","54","33342 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1525","0.750170","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1526","0.751728","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1527","0.751734","172.30.1.205","172.30.1.104","TCP","54","33342 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1528","0.753097","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1529","0.755357","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1530","0.755368","172.30.1.205","172.30.1.104","TCP","54","33342 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1531","0.756348","172.30.1.205","172.30.1.104","TCP","74","40708 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903982 TSecr=0 WS=128" "1532","0.756678","172.30.1.104","172.30.1.205","TCP","66","135 > 40708 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1533","0.756689","172.30.1.205","172.30.1.104","TCP","54","40708 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1534","0.757062","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1535","0.757392","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1536","0.757401","172.30.1.205","172.30.1.104","TCP","54","40708 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1537","0.759593","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1538","0.760022","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1539","0.760029","172.30.1.205","172.30.1.104","TCP","54","40708 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1540","0.761855","172.30.1.205","172.30.1.104","TCP","54","40708 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1541","0.761979","172.30.1.205","172.30.1.104","TCP","74","33346 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903988 TSecr=0 WS=128" "1542","0.762146","172.30.1.104","172.30.1.205","TCP","54","135 > 40708 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1543","0.762203","172.30.1.104","172.30.1.205","TCP","54","135 > 40708 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1544","0.762213","172.30.1.205","172.30.1.104","TCP","54","40708 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1545","0.762320","172.30.1.104","172.30.1.205","TCP","66","49671 > 33346 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1546","0.762330","172.30.1.205","172.30.1.104","TCP","54","33346 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1547","0.762721","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1548","0.763084","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1549","0.763098","172.30.1.205","172.30.1.104","TCP","54","33346 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1550","0.765105","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1551","0.765524","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1552","0.765531","172.30.1.205","172.30.1.104","TCP","54","33346 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1553","0.766915","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1554","0.769106","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1555","0.769118","172.30.1.205","172.30.1.104","TCP","54","33346 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1556","0.770123","172.30.1.205","172.30.1.104","TCP","74","40712 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499903996 TSecr=0 WS=128" "1557","0.770434","172.30.1.104","172.30.1.205","TCP","66","135 > 40712 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1558","0.770445","172.30.1.205","172.30.1.104","TCP","54","40712 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1559","0.770795","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1560","0.771121","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1561","0.771130","172.30.1.205","172.30.1.104","TCP","54","40712 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1562","0.773346","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1563","0.773767","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1564","0.773775","172.30.1.205","172.30.1.104","TCP","54","40712 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1565","0.775579","172.30.1.205","172.30.1.104","TCP","54","40712 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1566","0.775692","172.30.1.205","172.30.1.104","TCP","74","33350 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904002 TSecr=0 WS=128" "1567","0.775885","172.30.1.104","172.30.1.205","TCP","54","135 > 40712 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1568","0.775911","172.30.1.104","172.30.1.205","TCP","54","135 > 40712 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1569","0.775919","172.30.1.205","172.30.1.104","TCP","54","40712 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1570","0.776020","172.30.1.104","172.30.1.205","TCP","66","49671 > 33350 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1571","0.776035","172.30.1.205","172.30.1.104","TCP","54","33350 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1572","0.776403","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1573","0.776726","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1574","0.776735","172.30.1.205","172.30.1.104","TCP","54","33350 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1575","0.778639","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1576","0.779043","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1577","0.779050","172.30.1.205","172.30.1.104","TCP","54","33350 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1578","0.780404","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1579","0.782495","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1580","0.782505","172.30.1.205","172.30.1.104","TCP","54","33350 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1581","0.783471","172.30.1.205","172.30.1.104","TCP","74","40716 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904009 TSecr=0 WS=128" "1582","0.783811","172.30.1.104","172.30.1.205","TCP","66","135 > 40716 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1583","0.783822","172.30.1.205","172.30.1.104","TCP","54","40716 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1584","0.784177","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1585","0.784511","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1586","0.784522","172.30.1.205","172.30.1.104","TCP","54","40716 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1587","0.786733","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1588","0.787147","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1589","0.787154","172.30.1.205","172.30.1.104","TCP","54","40716 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1590","0.788986","172.30.1.205","172.30.1.104","TCP","54","40716 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1591","0.789098","172.30.1.205","172.30.1.104","TCP","74","33354 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904015 TSecr=0 WS=128" "1592","0.789276","172.30.1.104","172.30.1.205","TCP","54","135 > 40716 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1593","0.789288","172.30.1.104","172.30.1.205","TCP","54","135 > 40716 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1594","0.789294","172.30.1.205","172.30.1.104","TCP","54","40716 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1595","0.789367","172.30.1.104","172.30.1.205","TCP","66","49671 > 33354 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1596","0.789376","172.30.1.205","172.30.1.104","TCP","54","33354 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1597","0.789721","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1598","0.791216","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1599","0.791224","172.30.1.205","172.30.1.104","TCP","54","33354 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1600","0.793104","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1601","0.794340","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1602","0.794348","172.30.1.205","172.30.1.104","TCP","54","33354 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1603","0.795713","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1604","0.797937","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1605","0.797949","172.30.1.205","172.30.1.104","TCP","54","33354 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1606","0.798940","172.30.1.205","172.30.1.104","TCP","74","40720 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904025 TSecr=0 WS=128" "1607","0.799262","172.30.1.104","172.30.1.205","TCP","66","135 > 40720 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1608","0.799274","172.30.1.205","172.30.1.104","TCP","54","40720 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1609","0.799620","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1610","0.799926","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1611","0.799935","172.30.1.205","172.30.1.104","TCP","54","40720 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1612","0.802140","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1613","0.802547","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1614","0.802554","172.30.1.205","172.30.1.104","TCP","54","40720 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1615","0.804373","172.30.1.205","172.30.1.104","TCP","54","40720 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1616","0.804489","172.30.1.205","172.30.1.104","TCP","74","33358 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904030 TSecr=0 WS=128" "1617","0.804743","172.30.1.104","172.30.1.205","TCP","54","135 > 40720 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1618","0.804753","172.30.1.104","172.30.1.205","TCP","54","135 > 40720 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1619","0.804759","172.30.1.205","172.30.1.104","TCP","54","40720 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1620","0.804794","172.30.1.104","172.30.1.205","TCP","66","49671 > 33358 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1621","0.804804","172.30.1.205","172.30.1.104","TCP","54","33358 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1622","0.805157","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1623","0.806145","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1624","0.806154","172.30.1.205","172.30.1.104","TCP","54","33358 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1625","0.808033","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1626","0.808471","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1627","0.808477","172.30.1.205","172.30.1.104","TCP","54","33358 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1628","0.809848","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1629","0.812070","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1630","0.812080","172.30.1.205","172.30.1.104","TCP","54","33358 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1631","0.813037","172.30.1.205","172.30.1.104","TCP","74","40724 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904039 TSecr=0 WS=128" "1632","0.813328","172.30.1.104","172.30.1.205","TCP","66","135 > 40724 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1633","0.813339","172.30.1.205","172.30.1.104","TCP","54","40724 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1634","0.813698","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1635","0.814001","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1636","0.814010","172.30.1.205","172.30.1.104","TCP","54","40724 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1637","0.816206","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1638","0.816596","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1639","0.816603","172.30.1.205","172.30.1.104","TCP","54","40724 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1640","0.818421","172.30.1.205","172.30.1.104","TCP","54","40724 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1641","0.818532","172.30.1.205","172.30.1.104","TCP","74","33362 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904044 TSecr=0 WS=128" "1642","0.818674","172.30.1.104","172.30.1.205","TCP","54","135 > 40724 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1643","0.818685","172.30.1.104","172.30.1.205","TCP","54","135 > 40724 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1644","0.818691","172.30.1.205","172.30.1.104","TCP","54","40724 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1645","0.818788","172.30.1.104","172.30.1.205","TCP","66","49671 > 33362 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1646","0.818796","172.30.1.205","172.30.1.104","TCP","54","33362 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1647","0.819143","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1648","0.819435","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1649","0.819443","172.30.1.205","172.30.1.104","TCP","54","33362 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1650","0.821370","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1651","0.821763","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1652","0.821769","172.30.1.205","172.30.1.104","TCP","54","33362 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1653","0.823124","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1654","0.825249","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1655","0.825258","172.30.1.205","172.30.1.104","TCP","54","33362 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1656","0.826193","172.30.1.205","172.30.1.104","TCP","74","40728 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904052 TSecr=0 WS=128" "1657","0.826531","172.30.1.104","172.30.1.205","TCP","66","135 > 40728 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1658","0.826542","172.30.1.205","172.30.1.104","TCP","54","40728 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1659","0.826902","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1660","0.827227","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1661","0.827236","172.30.1.205","172.30.1.104","TCP","54","40728 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1662","0.829444","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1663","0.829840","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1664","0.829847","172.30.1.205","172.30.1.104","TCP","54","40728 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1665","0.831646","172.30.1.205","172.30.1.104","TCP","54","40728 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1666","0.831756","172.30.1.205","172.30.1.104","TCP","74","33366 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904058 TSecr=0 WS=128" "1667","0.831908","172.30.1.104","172.30.1.205","TCP","54","135 > 40728 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1668","0.831918","172.30.1.104","172.30.1.205","TCP","54","135 > 40728 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1669","0.831924","172.30.1.205","172.30.1.104","TCP","54","40728 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1670","0.832042","172.30.1.104","172.30.1.205","TCP","66","49671 > 33366 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1671","0.832050","172.30.1.205","172.30.1.104","TCP","54","33366 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1672","0.832394","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1673","0.832709","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1674","0.832717","172.30.1.205","172.30.1.104","TCP","54","33366 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1675","0.834609","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1676","0.835060","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1677","0.835069","172.30.1.205","172.30.1.104","TCP","54","33366 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1678","0.836476","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1679","0.838582","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1680","0.838591","172.30.1.205","172.30.1.104","TCP","54","33366 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1681","0.839547","172.30.1.205","172.30.1.104","TCP","74","40732 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904065 TSecr=0 WS=128" "1682","0.839831","172.30.1.104","172.30.1.205","TCP","66","135 > 40732 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1683","0.839842","172.30.1.205","172.30.1.104","TCP","54","40732 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1684","0.840190","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1685","0.840490","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1686","0.840499","172.30.1.205","172.30.1.104","TCP","54","40732 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1687","0.842710","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1688","0.843167","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1689","0.843174","172.30.1.205","172.30.1.104","TCP","54","40732 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1690","0.844991","172.30.1.205","172.30.1.104","TCP","54","40732 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1691","0.845100","172.30.1.205","172.30.1.104","TCP","74","33370 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904071 TSecr=0 WS=128" "1692","0.845272","172.30.1.104","172.30.1.205","TCP","54","135 > 40732 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1693","0.845346","172.30.1.104","172.30.1.205","TCP","54","135 > 40732 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1694","0.845353","172.30.1.205","172.30.1.104","TCP","54","40732 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1695","0.845432","172.30.1.104","172.30.1.205","TCP","66","49671 > 33370 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1696","0.845439","172.30.1.205","172.30.1.104","TCP","54","33370 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1697","0.845823","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1698","0.846142","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1699","0.846151","172.30.1.205","172.30.1.104","TCP","54","33370 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1700","0.848003","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1701","0.848362","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1702","0.848368","172.30.1.205","172.30.1.104","TCP","54","33370 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1703","0.849712","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1704","0.852220","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1705","0.852234","172.30.1.205","172.30.1.104","TCP","54","33370 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1706","0.853285","172.30.1.205","172.30.1.104","TCP","74","40736 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904079 TSecr=0 WS=128" "1707","0.853579","172.30.1.104","172.30.1.205","TCP","66","135 > 40736 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1708","0.853590","172.30.1.205","172.30.1.104","TCP","54","40736 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1709","0.853941","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1710","0.854256","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1711","0.854265","172.30.1.205","172.30.1.104","TCP","54","40736 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1712","0.856430","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1713","0.856864","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1714","0.856871","172.30.1.205","172.30.1.104","TCP","54","40736 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1715","0.858685","172.30.1.205","172.30.1.104","TCP","54","40736 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1716","0.858801","172.30.1.205","172.30.1.104","TCP","74","33374 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904085 TSecr=0 WS=128" "1717","0.858964","172.30.1.104","172.30.1.205","TCP","54","135 > 40736 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1718","0.859003","172.30.1.104","172.30.1.205","TCP","54","135 > 40736 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1719","0.859009","172.30.1.205","172.30.1.104","TCP","54","40736 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1720","0.859123","172.30.1.104","172.30.1.205","TCP","66","49671 > 33374 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1721","0.859132","172.30.1.205","172.30.1.104","TCP","54","33374 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1722","0.859473","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1723","0.859792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1724","0.859801","172.30.1.205","172.30.1.104","TCP","54","33374 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1725","0.861681","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1726","0.862059","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1727","0.862066","172.30.1.205","172.30.1.104","TCP","54","33374 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1728","0.863415","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1729","0.865688","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1730","0.865698","172.30.1.205","172.30.1.104","TCP","54","33374 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1731","0.866645","172.30.1.205","172.30.1.104","TCP","74","40740 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904093 TSecr=0 WS=128" "1732","0.866996","172.30.1.104","172.30.1.205","TCP","66","135 > 40740 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1733","0.867007","172.30.1.205","172.30.1.104","TCP","54","40740 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1734","0.867352","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1735","0.867644","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1736","0.867653","172.30.1.205","172.30.1.104","TCP","54","40740 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1737","0.869862","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1738","0.870225","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1739","0.870231","172.30.1.205","172.30.1.104","TCP","54","40740 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1740","0.872031","172.30.1.205","172.30.1.104","TCP","54","40740 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1741","0.872143","172.30.1.205","172.30.1.104","TCP","74","33378 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904098 TSecr=0 WS=128" "1742","0.872300","172.30.1.104","172.30.1.205","TCP","54","135 > 40740 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1743","0.872325","172.30.1.104","172.30.1.205","TCP","54","135 > 40740 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1744","0.872332","172.30.1.205","172.30.1.104","TCP","54","40740 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1745","0.872423","172.30.1.104","172.30.1.205","TCP","66","49671 > 33378 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1746","0.872432","172.30.1.205","172.30.1.104","TCP","54","33378 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1747","0.872804","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1748","0.873080","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1749","0.873089","172.30.1.205","172.30.1.104","TCP","54","33378 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1750","0.874933","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1751","0.875319","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1752","0.875325","172.30.1.205","172.30.1.104","TCP","54","33378 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1753","0.876684","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1754","0.878788","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1755","0.878798","172.30.1.205","172.30.1.104","TCP","54","33378 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1756","0.879755","172.30.1.205","172.30.1.104","TCP","74","40744 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904106 TSecr=0 WS=128" "1757","0.880114","172.30.1.104","172.30.1.205","TCP","66","135 > 40744 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1758","0.880125","172.30.1.205","172.30.1.104","TCP","54","40744 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1759","0.880467","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1760","0.880764","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1761","0.880773","172.30.1.205","172.30.1.104","TCP","54","40744 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1762","0.882948","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1763","0.883341","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1764","0.883348","172.30.1.205","172.30.1.104","TCP","54","40744 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1765","0.885183","172.30.1.205","172.30.1.104","TCP","54","40744 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1766","0.885302","172.30.1.205","172.30.1.104","TCP","74","33382 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904111 TSecr=0 WS=128" "1767","0.885477","172.30.1.104","172.30.1.205","TCP","54","135 > 40744 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1768","0.885526","172.30.1.104","172.30.1.205","TCP","54","135 > 40744 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1769","0.885533","172.30.1.205","172.30.1.104","TCP","54","40744 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1770","0.885615","172.30.1.104","172.30.1.205","TCP","66","49671 > 33382 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1771","0.885624","172.30.1.205","172.30.1.104","TCP","54","33382 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1772","0.885960","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1773","0.886287","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1774","0.886295","172.30.1.205","172.30.1.104","TCP","54","33382 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1775","0.888140","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1776","0.888504","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1777","0.888512","172.30.1.205","172.30.1.104","TCP","54","33382 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1778","0.889877","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1779","0.893057","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1780","0.893067","172.30.1.205","172.30.1.104","TCP","54","33382 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1781","0.894017","172.30.1.205","172.30.1.104","TCP","74","40748 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904120 TSecr=0 WS=128" "1782","0.894327","172.30.1.104","172.30.1.205","TCP","66","135 > 40748 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1783","0.894337","172.30.1.205","172.30.1.104","TCP","54","40748 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1784","0.894692","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1785","0.895051","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1786","0.895062","172.30.1.205","172.30.1.104","TCP","54","40748 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1787","0.897295","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1788","0.897776","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1789","0.897783","172.30.1.205","172.30.1.104","TCP","54","40748 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1790","0.898632","172.30.1.205","172.30.1.104","TCP","54","33342 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1791","0.898680","172.30.1.205","172.30.1.104","TCP","54","33346 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1792","0.898717","172.30.1.205","172.30.1.104","TCP","54","33350 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1793","0.898745","172.30.1.205","172.30.1.104","TCP","54","33354 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1794","0.898775","172.30.1.205","172.30.1.104","TCP","54","33358 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1795","0.898809","172.30.1.205","172.30.1.104","TCP","54","33362 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1796","0.898842","172.30.1.205","172.30.1.104","TCP","54","33366 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1797","0.898875","172.30.1.205","172.30.1.104","TCP","54","33370 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1798","0.898908","172.30.1.205","172.30.1.104","TCP","54","33374 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1799","0.898940","172.30.1.205","172.30.1.104","TCP","54","33378 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1800","0.898967","172.30.1.205","172.30.1.104","TCP","54","33382 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1801","0.899033","172.30.1.205","172.30.1.104","TCP","54","33338 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "1802","0.899172","172.30.1.104","172.30.1.205","TCP","54","49671 > 33342 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1803","0.899191","172.30.1.104","172.30.1.205","TCP","54","49671 > 33342 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1804","0.899198","172.30.1.205","172.30.1.104","TCP","54","33342 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1805","0.899211","172.30.1.104","172.30.1.205","TCP","54","49671 > 33346 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1806","0.899234","172.30.1.104","172.30.1.205","TCP","54","49671 > 33350 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1807","0.899250","172.30.1.104","172.30.1.205","TCP","54","49671 > 33346 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1808","0.899254","172.30.1.205","172.30.1.104","TCP","54","33346 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1809","0.899283","172.30.1.104","172.30.1.205","TCP","54","49671 > 33354 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1810","0.899302","172.30.1.104","172.30.1.205","TCP","54","49671 > 33358 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1811","0.899324","172.30.1.104","172.30.1.205","TCP","54","49671 > 33358 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1812","0.899329","172.30.1.205","172.30.1.104","TCP","54","33358 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1813","0.899345","172.30.1.104","172.30.1.205","TCP","54","49671 > 33362 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1814","0.899364","172.30.1.104","172.30.1.205","TCP","54","49671 > 33366 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1815","0.899384","172.30.1.104","172.30.1.205","TCP","54","49671 > 33362 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1816","0.899389","172.30.1.205","172.30.1.104","TCP","54","33362 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1817","0.899407","172.30.1.104","172.30.1.205","TCP","54","49671 > 33370 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1818","0.899441","172.30.1.104","172.30.1.205","TCP","54","49671 > 33374 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1819","0.899460","172.30.1.104","172.30.1.205","TCP","54","49671 > 33378 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1820","0.899485","172.30.1.104","172.30.1.205","TCP","54","49671 > 33370 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1821","0.899489","172.30.1.205","172.30.1.104","TCP","54","33370 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1822","0.899595","172.30.1.104","172.30.1.205","TCP","54","49671 > 33382 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1823","0.899613","172.30.1.104","172.30.1.205","TCP","54","49671 > 33366 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1824","0.899617","172.30.1.205","172.30.1.104","TCP","54","33366 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1825","0.899632","172.30.1.104","172.30.1.205","TCP","54","49671 > 33382 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1826","0.899635","172.30.1.205","172.30.1.104","TCP","54","33382 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1827","0.899652","172.30.1.104","172.30.1.205","TCP","54","49671 > 33378 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1828","0.899654","172.30.1.205","172.30.1.104","TCP","54","33378 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1829","0.899671","172.30.1.104","172.30.1.205","TCP","54","49671 > 33374 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1830","0.899674","172.30.1.205","172.30.1.104","TCP","54","33374 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1831","0.899691","172.30.1.104","172.30.1.205","TCP","54","49671 > 33350 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1832","0.899694","172.30.1.205","172.30.1.104","TCP","54","33350 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1833","0.899711","172.30.1.104","172.30.1.205","TCP","54","49671 > 33354 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1834","0.899714","172.30.1.205","172.30.1.104","TCP","54","33354 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1835","0.899890","172.30.1.104","172.30.1.205","TCP","54","49671 > 33338 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1836","0.899910","172.30.1.104","172.30.1.205","TCP","54","49671 > 33338 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "1837","0.899915","172.30.1.205","172.30.1.104","TCP","54","33338 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "1838","0.900679","172.30.1.205","172.30.1.104","TCP","54","40748 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1839","0.900820","172.30.1.205","172.30.1.104","TCP","74","33386 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904127 TSecr=0 WS=128" "1840","0.900948","172.30.1.104","172.30.1.205","TCP","54","135 > 40748 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1841","0.900968","172.30.1.104","172.30.1.205","TCP","54","135 > 40748 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1842","0.900974","172.30.1.205","172.30.1.104","TCP","54","40748 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1843","0.901108","172.30.1.104","172.30.1.205","TCP","66","49671 > 33386 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1844","0.901116","172.30.1.205","172.30.1.104","TCP","54","33386 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1845","0.901485","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1846","0.901776","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1847","0.901784","172.30.1.205","172.30.1.104","TCP","54","33386 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1848","0.903664","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1849","0.904024","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1850","0.904030","172.30.1.205","172.30.1.104","TCP","54","33386 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1851","0.905404","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1852","0.907661","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1853","0.907670","172.30.1.205","172.30.1.104","TCP","54","33386 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1854","0.908624","172.30.1.205","172.30.1.104","TCP","74","40752 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904135 TSecr=0 WS=128" "1855","0.908922","172.30.1.104","172.30.1.205","TCP","66","135 > 40752 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1856","0.908934","172.30.1.205","172.30.1.104","TCP","54","40752 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1857","0.909297","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1858","0.909580","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1859","0.909589","172.30.1.205","172.30.1.104","TCP","54","40752 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1860","0.911776","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1861","0.912191","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1862","0.912197","172.30.1.205","172.30.1.104","TCP","54","40752 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1863","0.914022","172.30.1.205","172.30.1.104","TCP","54","40752 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1864","0.914150","172.30.1.205","172.30.1.104","TCP","74","33390 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904140 TSecr=0 WS=128" "1865","0.914281","172.30.1.104","172.30.1.205","TCP","54","135 > 40752 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1866","0.914304","172.30.1.104","172.30.1.205","TCP","54","135 > 40752 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1867","0.914310","172.30.1.205","172.30.1.104","TCP","54","40752 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1868","0.914410","172.30.1.104","172.30.1.205","TCP","66","49671 > 33390 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1869","0.914418","172.30.1.205","172.30.1.104","TCP","54","33390 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1870","0.914765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1871","0.915041","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1872","0.915050","172.30.1.205","172.30.1.104","TCP","54","33390 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1873","0.916917","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1874","0.917269","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1875","0.917274","172.30.1.205","172.30.1.104","TCP","54","33390 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1876","0.918616","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1877","0.920686","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1878","0.920695","172.30.1.205","172.30.1.104","TCP","54","33390 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1879","0.921679","172.30.1.205","172.30.1.104","TCP","74","40756 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904148 TSecr=0 WS=128" "1880","0.921959","172.30.1.104","172.30.1.205","TCP","66","135 > 40756 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1881","0.921970","172.30.1.205","172.30.1.104","TCP","54","40756 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1882","0.922311","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1883","0.922586","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1884","0.922595","172.30.1.205","172.30.1.104","TCP","54","40756 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1885","0.924787","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1886","0.925178","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1887","0.925185","172.30.1.205","172.30.1.104","TCP","54","40756 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1888","0.926983","172.30.1.205","172.30.1.104","TCP","54","40756 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1889","0.927101","172.30.1.205","172.30.1.104","TCP","74","33394 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904153 TSecr=0 WS=128" "1890","0.927237","172.30.1.104","172.30.1.205","TCP","54","135 > 40756 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1891","0.927260","172.30.1.104","172.30.1.205","TCP","54","135 > 40756 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1892","0.927267","172.30.1.205","172.30.1.104","TCP","54","40756 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1893","0.927378","172.30.1.104","172.30.1.205","TCP","66","49671 > 33394 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1894","0.927386","172.30.1.205","172.30.1.104","TCP","54","33394 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1895","0.927724","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1896","0.928040","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1897","0.928049","172.30.1.205","172.30.1.104","TCP","54","33394 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1898","0.929918","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1899","0.930273","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1900","0.930279","172.30.1.205","172.30.1.104","TCP","54","33394 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1901","0.931634","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1902","0.934189","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1903","0.934199","172.30.1.205","172.30.1.104","TCP","54","33394 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1904","0.935199","172.30.1.205","172.30.1.104","TCP","74","40760 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904161 TSecr=0 WS=128" "1905","0.935520","172.30.1.104","172.30.1.205","TCP","66","135 > 40760 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1906","0.935531","172.30.1.205","172.30.1.104","TCP","54","40760 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1907","0.935876","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1908","0.937386","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1909","0.937395","172.30.1.205","172.30.1.104","TCP","54","40760 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1910","0.939587","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1911","0.940007","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1912","0.940014","172.30.1.205","172.30.1.104","TCP","54","40760 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1913","0.941837","172.30.1.205","172.30.1.104","TCP","54","40760 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1914","0.941966","172.30.1.205","172.30.1.104","TCP","74","33398 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904168 TSecr=0 WS=128" "1915","0.942104","172.30.1.104","172.30.1.205","TCP","54","135 > 40760 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1916","0.942137","172.30.1.104","172.30.1.205","TCP","54","135 > 40760 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1917","0.942144","172.30.1.205","172.30.1.104","TCP","54","40760 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1918","0.942259","172.30.1.104","172.30.1.205","TCP","66","49671 > 33398 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1919","0.942267","172.30.1.205","172.30.1.104","TCP","54","33398 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1920","0.942612","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1921","0.942883","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1922","0.942892","172.30.1.205","172.30.1.104","TCP","54","33398 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1923","0.944746","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1924","0.945101","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1925","0.945111","172.30.1.205","172.30.1.104","TCP","54","33398 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1926","0.946535","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1927","0.948664","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1928","0.948677","172.30.1.205","172.30.1.104","TCP","54","33398 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1929","0.949687","172.30.1.205","172.30.1.104","TCP","74","40764 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904176 TSecr=0 WS=128" "1930","0.949968","172.30.1.104","172.30.1.205","TCP","66","135 > 40764 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1931","0.949979","172.30.1.205","172.30.1.104","TCP","54","40764 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1932","0.950325","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1933","0.950613","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1934","0.950623","172.30.1.205","172.30.1.104","TCP","54","40764 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1935","0.952821","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1936","0.953202","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1937","0.953210","172.30.1.205","172.30.1.104","TCP","54","40764 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1938","0.955045","172.30.1.205","172.30.1.104","TCP","54","40764 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1939","0.955158","172.30.1.205","172.30.1.104","TCP","74","33402 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904181 TSecr=0 WS=128" "1940","0.955328","172.30.1.104","172.30.1.205","TCP","54","135 > 40764 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1941","0.955338","172.30.1.104","172.30.1.205","TCP","54","135 > 40764 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1942","0.955344","172.30.1.205","172.30.1.104","TCP","54","40764 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1943","0.955419","172.30.1.104","172.30.1.205","TCP","66","49671 > 33402 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1944","0.955428","172.30.1.205","172.30.1.104","TCP","54","33402 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1945","0.955788","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1946","0.956071","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1947","0.956080","172.30.1.205","172.30.1.104","TCP","54","33402 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1948","0.957969","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1949","0.958343","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1950","0.958349","172.30.1.205","172.30.1.104","TCP","54","33402 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1951","0.959696","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1952","0.961923","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1953","0.961940","172.30.1.205","172.30.1.104","TCP","54","33402 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1954","0.962880","172.30.1.205","172.30.1.104","TCP","74","40768 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904189 TSecr=0 WS=128" "1955","0.963182","172.30.1.104","172.30.1.205","TCP","66","135 > 40768 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1956","0.963193","172.30.1.205","172.30.1.104","TCP","54","40768 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1957","0.963540","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1958","0.963826","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1959","0.963835","172.30.1.205","172.30.1.104","TCP","54","40768 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1960","0.966051","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1961","0.966471","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1962","0.966479","172.30.1.205","172.30.1.104","TCP","54","40768 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1963","0.968322","172.30.1.205","172.30.1.104","TCP","54","40768 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1964","0.968437","172.30.1.205","172.30.1.104","TCP","74","33406 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904194 TSecr=0 WS=128" "1965","0.968612","172.30.1.104","172.30.1.205","TCP","54","135 > 40768 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1966","0.968629","172.30.1.104","172.30.1.205","TCP","54","135 > 40768 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1967","0.968639","172.30.1.205","172.30.1.104","TCP","54","40768 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1968","0.968756","172.30.1.104","172.30.1.205","TCP","66","49671 > 33406 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1969","0.968772","172.30.1.205","172.30.1.104","TCP","54","33406 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1970","0.969326","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1971","0.969619","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1972","0.969629","172.30.1.205","172.30.1.104","TCP","54","33406 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1973","0.971502","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1974","0.971879","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "1975","0.971891","172.30.1.205","172.30.1.104","TCP","54","33406 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "1976","0.973503","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "1977","0.976753","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "1978","0.976764","172.30.1.205","172.30.1.104","TCP","54","33406 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "1979","0.977751","172.30.1.205","172.30.1.104","TCP","74","40772 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904204 TSecr=0 WS=128" "1980","0.978029","172.30.1.104","172.30.1.205","TCP","66","135 > 40772 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1981","0.978040","172.30.1.205","172.30.1.104","TCP","54","40772 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1982","0.978391","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "1983","0.978669","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1984","0.978678","172.30.1.205","172.30.1.104","TCP","54","40772 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1985","0.980912","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "1986","0.981298","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "1987","0.981304","172.30.1.205","172.30.1.104","TCP","54","40772 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "1988","0.983104","172.30.1.205","172.30.1.104","TCP","54","40772 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "1989","0.983215","172.30.1.205","172.30.1.104","TCP","74","33410 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904209 TSecr=0 WS=128" "1990","0.983347","172.30.1.104","172.30.1.205","TCP","54","135 > 40772 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1991","0.983386","172.30.1.104","172.30.1.205","TCP","54","135 > 40772 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "1992","0.983391","172.30.1.205","172.30.1.104","TCP","54","40772 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "1993","0.983468","172.30.1.104","172.30.1.205","TCP","66","49671 > 33410 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "1994","0.983476","172.30.1.205","172.30.1.104","TCP","54","33410 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "1995","0.983822","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "1996","0.984093","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "1997","0.984102","172.30.1.205","172.30.1.104","TCP","54","33410 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "1998","0.986136","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "1999","0.986523","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2000","0.986530","172.30.1.205","172.30.1.104","TCP","54","33410 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2001","0.987875","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2002","0.990191","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2003","0.990200","172.30.1.205","172.30.1.104","TCP","54","33410 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2004","0.991145","172.30.1.205","172.30.1.104","TCP","74","40776 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904217 TSecr=0 WS=128" "2005","0.991448","172.30.1.104","172.30.1.205","TCP","66","135 > 40776 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2006","0.991459","172.30.1.205","172.30.1.104","TCP","54","40776 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2007","0.991808","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2008","0.992093","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2009","0.992104","172.30.1.205","172.30.1.104","TCP","54","40776 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2010","0.994329","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2011","0.994717","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2012","0.994724","172.30.1.205","172.30.1.104","TCP","54","40776 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2013","0.996527","172.30.1.205","172.30.1.104","TCP","54","40776 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2014","0.996638","172.30.1.205","172.30.1.104","TCP","74","33414 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904223 TSecr=0 WS=128" "2015","0.996810","172.30.1.104","172.30.1.205","TCP","54","135 > 40776 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2016","0.996840","172.30.1.104","172.30.1.205","TCP","54","135 > 40776 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2017","0.996846","172.30.1.205","172.30.1.104","TCP","54","40776 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2018","0.996924","172.30.1.104","172.30.1.205","TCP","66","49671 > 33414 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2019","0.996932","172.30.1.205","172.30.1.104","TCP","54","33414 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2020","0.997288","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2021","0.997693","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2022","0.997702","172.30.1.205","172.30.1.104","TCP","54","33414 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2023","0.999571","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2024","0.999954","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2025","0.999960","172.30.1.205","172.30.1.104","TCP","54","33414 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2026","1.001350","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2027","1.003437","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2028","1.003449","172.30.1.205","172.30.1.104","TCP","54","33414 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2029","1.004409","172.30.1.205","172.30.1.104","TCP","74","40780 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904230 TSecr=0 WS=128" "2030","1.004711","172.30.1.104","172.30.1.205","TCP","66","135 > 40780 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2031","1.004722","172.30.1.205","172.30.1.104","TCP","54","40780 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2032","1.005097","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2033","1.005376","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2034","1.005385","172.30.1.205","172.30.1.104","TCP","54","40780 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2035","1.007549","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2036","1.007931","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2037","1.007937","172.30.1.205","172.30.1.104","TCP","54","40780 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2038","1.009757","172.30.1.205","172.30.1.104","TCP","54","40780 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2039","1.009870","172.30.1.205","172.30.1.104","TCP","74","33418 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904236 TSecr=0 WS=128" "2040","1.010018","172.30.1.104","172.30.1.205","TCP","54","135 > 40780 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2041","1.010029","172.30.1.104","172.30.1.205","TCP","54","135 > 40780 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2042","1.010035","172.30.1.205","172.30.1.104","TCP","54","40780 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2043","1.010166","172.30.1.104","172.30.1.205","TCP","66","49671 > 33418 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2044","1.010174","172.30.1.205","172.30.1.104","TCP","54","33418 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2045","1.010519","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2046","1.010819","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2047","1.010830","172.30.1.205","172.30.1.104","TCP","54","33418 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2048","1.012725","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2049","1.013144","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2050","1.013154","172.30.1.205","172.30.1.104","TCP","54","33418 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2051","1.014581","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2052","1.017885","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2053","1.017897","172.30.1.205","172.30.1.104","TCP","54","33418 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2054","1.018905","172.30.1.205","172.30.1.104","TCP","74","40784 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904245 TSecr=0 WS=128" "2055","1.019220","172.30.1.104","172.30.1.205","TCP","66","135 > 40784 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2056","1.019232","172.30.1.205","172.30.1.104","TCP","54","40784 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2057","1.019580","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2058","1.019875","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2059","1.019884","172.30.1.205","172.30.1.104","TCP","54","40784 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2060","1.022090","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2061","1.022493","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2062","1.022500","172.30.1.205","172.30.1.104","TCP","54","40784 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2063","1.024303","172.30.1.205","172.30.1.104","TCP","54","40784 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2064","1.024424","172.30.1.205","172.30.1.104","TCP","74","33422 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904250 TSecr=0 WS=128" "2065","1.024571","172.30.1.104","172.30.1.205","TCP","54","135 > 40784 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2066","1.024595","172.30.1.104","172.30.1.205","TCP","54","135 > 40784 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2067","1.024603","172.30.1.205","172.30.1.104","TCP","54","40784 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2068","1.024739","172.30.1.104","172.30.1.205","TCP","66","49671 > 33422 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2069","1.024747","172.30.1.205","172.30.1.104","TCP","54","33422 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2070","1.025107","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2071","1.025393","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2072","1.025402","172.30.1.205","172.30.1.104","TCP","54","33422 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2073","1.027252","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2074","1.027638","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2075","1.027644","172.30.1.205","172.30.1.104","TCP","54","33422 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2076","1.028997","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2077","1.031667","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2078","1.031677","172.30.1.205","172.30.1.104","TCP","54","33422 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2079","1.032624","172.30.1.205","172.30.1.104","TCP","74","40788 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904259 TSecr=0 WS=128" "2080","1.032923","172.30.1.104","172.30.1.205","TCP","66","135 > 40788 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2081","1.032934","172.30.1.205","172.30.1.104","TCP","54","40788 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2082","1.033298","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2083","1.033620","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2084","1.033634","172.30.1.205","172.30.1.104","TCP","54","40788 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2085","1.035906","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2086","1.036346","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2087","1.036354","172.30.1.205","172.30.1.104","TCP","54","40788 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2088","1.038191","172.30.1.205","172.30.1.104","TCP","54","40788 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2089","1.038314","172.30.1.205","172.30.1.104","TCP","74","33426 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904264 TSecr=0 WS=128" "2090","1.038475","172.30.1.104","172.30.1.205","TCP","54","135 > 40788 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2091","1.038488","172.30.1.104","172.30.1.205","TCP","54","135 > 40788 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2092","1.038495","172.30.1.205","172.30.1.104","TCP","54","40788 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2093","1.038662","172.30.1.104","172.30.1.205","TCP","66","49671 > 33426 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2094","1.038671","172.30.1.205","172.30.1.104","TCP","54","33426 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2095","1.039018","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2096","1.039305","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2097","1.039312","172.30.1.205","172.30.1.104","TCP","54","33426 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2098","1.041215","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2099","1.041617","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2100","1.041624","172.30.1.205","172.30.1.104","TCP","54","33426 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2101","1.042968","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2102","1.045245","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2103","1.045255","172.30.1.205","172.30.1.104","TCP","54","33426 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2104","1.046220","172.30.1.205","172.30.1.104","TCP","74","40792 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904272 TSecr=0 WS=128" "2105","1.046536","172.30.1.104","172.30.1.205","TCP","66","135 > 40792 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2106","1.046551","172.30.1.205","172.30.1.104","TCP","54","40792 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2107","1.046937","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2108","1.047228","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2109","1.047239","172.30.1.205","172.30.1.104","TCP","54","40792 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2110","1.049439","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2111","1.049841","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2112","1.049848","172.30.1.205","172.30.1.104","TCP","54","40792 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2113","1.051633","172.30.1.205","172.30.1.104","TCP","54","40792 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2114","1.051748","172.30.1.205","172.30.1.104","TCP","74","33430 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904278 TSecr=0 WS=128" "2115","1.051918","172.30.1.104","172.30.1.205","TCP","54","135 > 40792 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2116","1.051933","172.30.1.104","172.30.1.205","TCP","54","135 > 40792 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2117","1.051939","172.30.1.205","172.30.1.104","TCP","54","40792 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2118","1.052021","172.30.1.104","172.30.1.205","TCP","66","49671 > 33430 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2119","1.052030","172.30.1.205","172.30.1.104","TCP","54","33430 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2120","1.052371","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2121","1.052674","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2122","1.052683","172.30.1.205","172.30.1.104","TCP","54","33430 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2123","1.054570","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2124","1.054978","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2125","1.054987","172.30.1.205","172.30.1.104","TCP","54","33430 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2126","1.056395","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2127","1.058703","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2128","1.058715","172.30.1.205","172.30.1.104","TCP","54","33430 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2129","1.059719","172.30.1.205","172.30.1.104","TCP","74","40796 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904286 TSecr=0 WS=128" "2130","1.060034","172.30.1.104","172.30.1.205","TCP","66","135 > 40796 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2131","1.060046","172.30.1.205","172.30.1.104","TCP","54","40796 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2132","1.060400","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2133","1.060677","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2134","1.060685","172.30.1.205","172.30.1.104","TCP","54","40796 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2135","1.062890","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2136","1.063296","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2137","1.063303","172.30.1.205","172.30.1.104","TCP","54","40796 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2138","1.064147","172.30.1.205","172.30.1.104","TCP","54","33390 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2139","1.064197","172.30.1.205","172.30.1.104","TCP","54","33394 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2140","1.064234","172.30.1.205","172.30.1.104","TCP","54","33398 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2141","1.064266","172.30.1.205","172.30.1.104","TCP","54","33402 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2142","1.064298","172.30.1.205","172.30.1.104","TCP","54","33406 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2143","1.064331","172.30.1.205","172.30.1.104","TCP","54","33410 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2144","1.064358","172.30.1.205","172.30.1.104","TCP","54","33414 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2145","1.064384","172.30.1.205","172.30.1.104","TCP","54","33418 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2146","1.064405","172.30.1.205","172.30.1.104","TCP","54","33422 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2147","1.064432","172.30.1.205","172.30.1.104","TCP","54","33426 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2148","1.064457","172.30.1.205","172.30.1.104","TCP","54","33430 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2149","1.064517","172.30.1.205","172.30.1.104","TCP","54","33386 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2150","1.064625","172.30.1.104","172.30.1.205","TCP","54","49671 > 33390 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2151","1.064638","172.30.1.104","172.30.1.205","TCP","54","49671 > 33394 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2152","1.064641","172.30.1.104","172.30.1.205","TCP","54","49671 > 33398 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2153","1.064644","172.30.1.104","172.30.1.205","TCP","54","49671 > 33390 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2154","1.064652","172.30.1.205","172.30.1.104","TCP","54","33390 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2155","1.064659","172.30.1.104","172.30.1.205","TCP","54","49671 > 33394 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2156","1.064661","172.30.1.205","172.30.1.104","TCP","54","33394 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2157","1.064976","172.30.1.104","172.30.1.205","TCP","54","49671 > 33402 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2158","1.064984","172.30.1.104","172.30.1.205","TCP","54","49671 > 33406 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2159","1.064987","172.30.1.104","172.30.1.205","TCP","54","49671 > 33406 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2160","1.064992","172.30.1.205","172.30.1.104","TCP","54","33406 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2161","1.064999","172.30.1.104","172.30.1.205","TCP","54","49671 > 33398 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2162","1.065002","172.30.1.205","172.30.1.104","TCP","54","33398 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2163","1.065003","172.30.1.104","172.30.1.205","TCP","54","49671 > 33402 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2164","1.065005","172.30.1.205","172.30.1.104","TCP","54","33402 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2165","1.065006","172.30.1.104","172.30.1.205","TCP","54","49671 > 33410 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2166","1.065009","172.30.1.104","172.30.1.205","TCP","54","49671 > 33414 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2167","1.065012","172.30.1.104","172.30.1.205","TCP","54","49671 > 33418 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2168","1.065014","172.30.1.104","172.30.1.205","TCP","54","49671 > 33422 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2169","1.065017","172.30.1.104","172.30.1.205","TCP","54","49671 > 33426 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2170","1.065019","172.30.1.104","172.30.1.205","TCP","54","49671 > 33430 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2171","1.065249","172.30.1.104","172.30.1.205","TCP","54","49671 > 33386 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2172","1.065254","172.30.1.104","172.30.1.205","TCP","54","49671 > 33430 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2173","1.065259","172.30.1.205","172.30.1.104","TCP","54","33430 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2174","1.065265","172.30.1.104","172.30.1.205","TCP","54","49671 > 33426 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2175","1.065267","172.30.1.205","172.30.1.104","TCP","54","33426 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2176","1.065268","172.30.1.104","172.30.1.205","TCP","54","49671 > 33422 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2177","1.065270","172.30.1.205","172.30.1.104","TCP","54","33422 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2178","1.065271","172.30.1.104","172.30.1.205","TCP","54","49671 > 33410 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2179","1.065276","172.30.1.205","172.30.1.104","TCP","54","33410 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2180","1.065278","172.30.1.104","172.30.1.205","TCP","54","49671 > 33386 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2181","1.065279","172.30.1.205","172.30.1.104","TCP","54","33386 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2182","1.065281","172.30.1.104","172.30.1.205","TCP","54","49671 > 33414 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2183","1.065283","172.30.1.205","172.30.1.104","TCP","54","33414 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2184","1.065284","172.30.1.104","172.30.1.205","TCP","54","49671 > 33418 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2185","1.065286","172.30.1.205","172.30.1.104","TCP","54","33418 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2186","1.065989","172.30.1.205","172.30.1.104","TCP","54","40796 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2187","1.066101","172.30.1.205","172.30.1.104","TCP","74","33434 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904292 TSecr=0 WS=128" "2188","1.066247","172.30.1.104","172.30.1.205","TCP","54","135 > 40796 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2189","1.066255","172.30.1.104","172.30.1.205","TCP","54","135 > 40796 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2190","1.066260","172.30.1.205","172.30.1.104","TCP","54","40796 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2191","1.066355","172.30.1.104","172.30.1.205","TCP","66","49671 > 33434 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2192","1.066362","172.30.1.205","172.30.1.104","TCP","54","33434 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2193","1.066719","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2194","1.067002","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2195","1.067011","172.30.1.205","172.30.1.104","TCP","54","33434 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2196","1.068903","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2197","1.069275","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2198","1.069281","172.30.1.205","172.30.1.104","TCP","54","33434 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2199","1.070631","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2200","1.072792","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2201","1.072802","172.30.1.205","172.30.1.104","TCP","54","33434 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2202","1.073778","172.30.1.205","172.30.1.104","TCP","74","40800 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904300 TSecr=0 WS=128" "2203","1.074070","172.30.1.104","172.30.1.205","TCP","66","135 > 40800 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2204","1.074080","172.30.1.205","172.30.1.104","TCP","54","40800 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2205","1.074431","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2206","1.074755","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2207","1.074769","172.30.1.205","172.30.1.104","TCP","54","40800 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2208","1.077047","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2209","1.077463","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2210","1.077470","172.30.1.205","172.30.1.104","TCP","54","40800 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2211","1.079282","172.30.1.205","172.30.1.104","TCP","54","40800 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2212","1.079402","172.30.1.205","172.30.1.104","TCP","74","33438 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904305 TSecr=0 WS=128" "2213","1.079548","172.30.1.104","172.30.1.205","TCP","54","135 > 40800 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2214","1.079572","172.30.1.104","172.30.1.205","TCP","54","135 > 40800 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2215","1.079578","172.30.1.205","172.30.1.104","TCP","54","40800 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2216","1.079676","172.30.1.104","172.30.1.205","TCP","66","49671 > 33438 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2217","1.079685","172.30.1.205","172.30.1.104","TCP","54","33438 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2218","1.080052","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2219","1.080333","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2220","1.080342","172.30.1.205","172.30.1.104","TCP","54","33438 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2221","1.082235","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2222","1.082615","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2223","1.082623","172.30.1.205","172.30.1.104","TCP","54","33438 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2224","1.084027","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2225","1.086135","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2226","1.086146","172.30.1.205","172.30.1.104","TCP","54","33438 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2227","1.087120","172.30.1.205","172.30.1.104","TCP","74","40804 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904313 TSecr=0 WS=128" "2228","1.087414","172.30.1.104","172.30.1.205","TCP","66","135 > 40804 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2229","1.087426","172.30.1.205","172.30.1.104","TCP","54","40804 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2230","1.087770","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2231","1.088044","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2232","1.088053","172.30.1.205","172.30.1.104","TCP","54","40804 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2233","1.090253","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2234","1.090626","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2235","1.090633","172.30.1.205","172.30.1.104","TCP","54","40804 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2236","1.092444","172.30.1.205","172.30.1.104","TCP","54","40804 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2237","1.092556","172.30.1.205","172.30.1.104","TCP","74","33442 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904318 TSecr=0 WS=128" "2238","1.092694","172.30.1.104","172.30.1.205","TCP","54","135 > 40804 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2239","1.092709","172.30.1.104","172.30.1.205","TCP","54","135 > 40804 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2240","1.092716","172.30.1.205","172.30.1.104","TCP","54","40804 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2241","1.092830","172.30.1.104","172.30.1.205","TCP","66","49671 > 33442 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2242","1.092840","172.30.1.205","172.30.1.104","TCP","54","33442 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2243","1.093190","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2244","1.094206","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2245","1.094213","172.30.1.205","172.30.1.104","TCP","54","33442 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2246","1.096052","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2247","1.096421","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2248","1.096427","172.30.1.205","172.30.1.104","TCP","54","33442 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2249","1.097786","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2250","1.099916","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2251","1.099925","172.30.1.205","172.30.1.104","TCP","54","33442 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2252","1.100884","172.30.1.205","172.30.1.104","TCP","74","40808 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904327 TSecr=0 WS=128" "2253","1.101183","172.30.1.104","172.30.1.205","TCP","66","135 > 40808 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2254","1.101194","172.30.1.205","172.30.1.104","TCP","54","40808 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2255","1.101543","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2256","1.101834","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2257","1.101843","172.30.1.205","172.30.1.104","TCP","54","40808 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2258","1.104015","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2259","1.104392","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2260","1.104398","172.30.1.205","172.30.1.104","TCP","54","40808 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2261","1.106228","172.30.1.205","172.30.1.104","TCP","54","40808 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2262","1.106354","172.30.1.205","172.30.1.104","TCP","74","33446 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904332 TSecr=0 WS=128" "2263","1.106478","172.30.1.104","172.30.1.205","TCP","54","135 > 40808 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2264","1.106491","172.30.1.104","172.30.1.205","TCP","54","135 > 40808 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2265","1.106498","172.30.1.205","172.30.1.104","TCP","54","40808 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2266","1.106625","172.30.1.104","172.30.1.205","TCP","66","49671 > 33446 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2267","1.106634","172.30.1.205","172.30.1.104","TCP","54","33446 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2268","1.106989","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2269","1.107264","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2270","1.107271","172.30.1.205","172.30.1.104","TCP","54","33446 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2271","1.109159","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2272","1.109527","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2273","1.109534","172.30.1.205","172.30.1.104","TCP","54","33446 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2274","1.110872","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2275","1.113349","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2276","1.113360","172.30.1.205","172.30.1.104","TCP","54","33446 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2277","1.114340","172.30.1.205","172.30.1.104","TCP","74","40812 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904340 TSecr=0 WS=128" "2278","1.114641","172.30.1.104","172.30.1.205","TCP","66","135 > 40812 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2279","1.114653","172.30.1.205","172.30.1.104","TCP","54","40812 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2280","1.114995","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2281","1.115302","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2282","1.115311","172.30.1.205","172.30.1.104","TCP","54","40812 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2283","1.117519","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2284","1.117913","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2285","1.117919","172.30.1.205","172.30.1.104","TCP","54","40812 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2286","1.119712","172.30.1.205","172.30.1.104","TCP","54","40812 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2287","1.119827","172.30.1.205","172.30.1.104","TCP","74","33450 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904346 TSecr=0 WS=128" "2288","1.119982","172.30.1.104","172.30.1.205","TCP","54","135 > 40812 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2289","1.119993","172.30.1.104","172.30.1.205","TCP","54","135 > 40812 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2290","1.120000","172.30.1.205","172.30.1.104","TCP","54","40812 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2291","1.120100","172.30.1.104","172.30.1.205","TCP","66","49671 > 33450 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2292","1.120108","172.30.1.205","172.30.1.104","TCP","54","33450 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2293","1.120447","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2294","1.120716","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2295","1.120723","172.30.1.205","172.30.1.104","TCP","54","33450 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2296","1.122586","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2297","1.122937","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2298","1.122943","172.30.1.205","172.30.1.104","TCP","54","33450 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2299","1.124275","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2300","1.126364","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2301","1.126373","172.30.1.205","172.30.1.104","TCP","54","33450 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2302","1.127352","172.30.1.205","172.30.1.104","TCP","74","40816 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904353 TSecr=0 WS=128" "2303","1.127653","172.30.1.104","172.30.1.205","TCP","66","135 > 40816 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2304","1.127664","172.30.1.205","172.30.1.104","TCP","54","40816 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2305","1.128012","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2306","1.128304","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2307","1.128312","172.30.1.205","172.30.1.104","TCP","54","40816 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2308","1.130507","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2309","1.130901","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2310","1.130908","172.30.1.205","172.30.1.104","TCP","54","40816 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2311","1.132712","172.30.1.205","172.30.1.104","TCP","54","40816 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2312","1.132849","172.30.1.205","172.30.1.104","TCP","74","33454 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904359 TSecr=0 WS=128" "2313","1.132994","172.30.1.104","172.30.1.205","TCP","54","135 > 40816 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2314","1.133004","172.30.1.104","172.30.1.205","TCP","54","135 > 40816 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2315","1.133011","172.30.1.205","172.30.1.104","TCP","54","40816 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2316","1.133111","172.30.1.104","172.30.1.205","TCP","66","49671 > 33454 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2317","1.133120","172.30.1.205","172.30.1.104","TCP","54","33454 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2318","1.133466","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2319","1.133743","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2320","1.133753","172.30.1.205","172.30.1.104","TCP","54","33454 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2321","1.135632","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2322","1.135983","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2323","1.135989","172.30.1.205","172.30.1.104","TCP","54","33454 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2324","1.137360","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2325","1.139567","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2326","1.139576","172.30.1.205","172.30.1.104","TCP","54","33454 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2327","1.140516","172.30.1.205","172.30.1.104","TCP","74","40820 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904366 TSecr=0 WS=128" "2328","1.140826","172.30.1.104","172.30.1.205","TCP","66","135 > 40820 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2329","1.140837","172.30.1.205","172.30.1.104","TCP","54","40820 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2330","1.141193","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2331","1.141476","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2332","1.141485","172.30.1.205","172.30.1.104","TCP","54","40820 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2333","1.143668","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2334","1.144069","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2335","1.144075","172.30.1.205","172.30.1.104","TCP","54","40820 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2336","1.145902","172.30.1.205","172.30.1.104","TCP","54","40820 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2337","1.146015","172.30.1.205","172.30.1.104","TCP","74","33458 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904372 TSecr=0 WS=128" "2338","1.146183","172.30.1.104","172.30.1.205","TCP","54","135 > 40820 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2339","1.146194","172.30.1.104","172.30.1.205","TCP","54","135 > 40820 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2340","1.146200","172.30.1.205","172.30.1.104","TCP","54","40820 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2341","1.146276","172.30.1.104","172.30.1.205","TCP","66","49671 > 33458 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2342","1.146284","172.30.1.205","172.30.1.104","TCP","54","33458 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2343","1.146629","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2344","1.146915","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2345","1.146924","172.30.1.205","172.30.1.104","TCP","54","33458 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2346","1.148824","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2347","1.149195","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2348","1.149202","172.30.1.205","172.30.1.104","TCP","54","33458 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2349","1.150540","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2350","1.152758","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2351","1.152767","172.30.1.205","172.30.1.104","TCP","54","33458 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2352","1.153719","172.30.1.205","172.30.1.104","TCP","74","40824 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904380 TSecr=0 WS=128" "2353","1.154026","172.30.1.104","172.30.1.205","TCP","66","135 > 40824 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2354","1.154036","172.30.1.205","172.30.1.104","TCP","54","40824 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2355","1.154381","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2356","1.154713","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2357","1.154726","172.30.1.205","172.30.1.104","TCP","54","40824 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2358","1.157004","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2359","1.157420","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2360","1.157428","172.30.1.205","172.30.1.104","TCP","54","40824 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2361","1.159252","172.30.1.205","172.30.1.104","TCP","54","40824 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2362","1.159371","172.30.1.205","172.30.1.104","TCP","74","33462 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904385 TSecr=0 WS=128" "2363","1.159549","172.30.1.104","172.30.1.205","TCP","54","135 > 40824 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2364","1.159574","172.30.1.104","172.30.1.205","TCP","54","135 > 40824 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2365","1.159580","172.30.1.205","172.30.1.104","TCP","54","40824 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2366","1.159663","172.30.1.104","172.30.1.205","TCP","66","49671 > 33462 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2367","1.159671","172.30.1.205","172.30.1.104","TCP","54","33462 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2368","1.160019","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2369","1.160343","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2370","1.160354","172.30.1.205","172.30.1.104","TCP","54","33462 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2371","1.162270","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2372","1.162641","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2373","1.162648","172.30.1.205","172.30.1.104","TCP","54","33462 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2374","1.164000","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2375","1.167193","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2376","1.167204","172.30.1.205","172.30.1.104","TCP","54","33462 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2377","1.168241","172.30.1.205","172.30.1.104","TCP","74","40828 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904394 TSecr=0 WS=128" "2378","1.168554","172.30.1.104","172.30.1.205","TCP","66","135 > 40828 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2379","1.168565","172.30.1.205","172.30.1.104","TCP","54","40828 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2380","1.168946","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2381","1.169262","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2382","1.169271","172.30.1.205","172.30.1.104","TCP","54","40828 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2383","1.171459","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2384","1.171868","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2385","1.171875","172.30.1.205","172.30.1.104","TCP","54","40828 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2386","1.173703","172.30.1.205","172.30.1.104","TCP","54","40828 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2387","1.173830","172.30.1.205","172.30.1.104","TCP","74","33466 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904400 TSecr=0 WS=128" "2388","1.173969","172.30.1.104","172.30.1.205","TCP","54","135 > 40828 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2389","1.173994","172.30.1.104","172.30.1.205","TCP","54","135 > 40828 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2390","1.174001","172.30.1.205","172.30.1.104","TCP","54","40828 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2391","1.174142","172.30.1.104","172.30.1.205","TCP","66","49671 > 33466 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2392","1.174158","172.30.1.205","172.30.1.104","TCP","54","33466 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2393","1.174547","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2394","1.174849","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2395","1.174859","172.30.1.205","172.30.1.104","TCP","54","33466 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2396","1.176745","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2397","1.177137","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2398","1.177144","172.30.1.205","172.30.1.104","TCP","54","33466 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2399","1.178508","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2400","1.180771","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2401","1.180793","172.30.1.205","172.30.1.104","TCP","54","33466 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2402","1.181811","172.30.1.205","172.30.1.104","TCP","74","40832 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904408 TSecr=0 WS=128" "2403","1.182117","172.30.1.104","172.30.1.205","TCP","66","135 > 40832 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2404","1.182129","172.30.1.205","172.30.1.104","TCP","54","40832 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2405","1.182480","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2406","1.182799","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2407","1.182808","172.30.1.205","172.30.1.104","TCP","54","40832 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2408","1.185033","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2409","1.185478","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2410","1.185484","172.30.1.205","172.30.1.104","TCP","54","40832 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2411","1.187293","172.30.1.205","172.30.1.104","TCP","54","40832 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2412","1.187428","172.30.1.205","172.30.1.104","TCP","74","33470 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904413 TSecr=0 WS=128" "2413","1.187571","172.30.1.104","172.30.1.205","TCP","54","135 > 40832 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2414","1.187598","172.30.1.104","172.30.1.205","TCP","54","135 > 40832 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2415","1.187605","172.30.1.205","172.30.1.104","TCP","54","40832 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2416","1.187722","172.30.1.104","172.30.1.205","TCP","66","49671 > 33470 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2417","1.187731","172.30.1.205","172.30.1.104","TCP","54","33470 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2418","1.188077","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2419","1.188370","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2420","1.188379","172.30.1.205","172.30.1.104","TCP","54","33470 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2421","1.190264","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2422","1.190654","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2423","1.190660","172.30.1.205","172.30.1.104","TCP","54","33470 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2424","1.191991","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2425","1.194167","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2426","1.194178","172.30.1.205","172.30.1.104","TCP","54","33470 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2427","1.195148","172.30.1.205","172.30.1.104","TCP","74","40836 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904421 TSecr=0 WS=128" "2428","1.195454","172.30.1.104","172.30.1.205","TCP","66","135 > 40836 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2429","1.195465","172.30.1.205","172.30.1.104","TCP","54","40836 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2430","1.195858","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2431","1.196147","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2432","1.196157","172.30.1.205","172.30.1.104","TCP","54","40836 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2433","1.198361","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2434","1.198833","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2435","1.198843","172.30.1.205","172.30.1.104","TCP","54","40836 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2436","1.200725","172.30.1.205","172.30.1.104","TCP","54","40836 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2437","1.200872","172.30.1.205","172.30.1.104","TCP","74","33474 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904427 TSecr=0 WS=128" "2438","1.200973","172.30.1.104","172.30.1.205","TCP","54","135 > 40836 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2439","1.201026","172.30.1.104","172.30.1.205","TCP","54","135 > 40836 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2440","1.201033","172.30.1.205","172.30.1.104","TCP","54","40836 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2441","1.201155","172.30.1.104","172.30.1.205","TCP","66","49671 > 33474 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2442","1.201164","172.30.1.205","172.30.1.104","TCP","54","33474 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2443","1.201514","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2444","1.201780","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2445","1.201789","172.30.1.205","172.30.1.104","TCP","54","33474 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2446","1.203664","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2447","1.204102","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2448","1.204109","172.30.1.205","172.30.1.104","TCP","54","33474 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2449","1.205541","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2450","1.207854","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2451","1.207864","172.30.1.205","172.30.1.104","TCP","54","33474 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2452","1.208824","172.30.1.205","172.30.1.104","TCP","74","40840 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904435 TSecr=0 WS=128" "2453","1.209200","172.30.1.104","172.30.1.205","TCP","66","135 > 40840 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2454","1.209211","172.30.1.205","172.30.1.104","TCP","54","40840 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2455","1.209564","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2456","1.209935","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2457","1.209944","172.30.1.205","172.30.1.104","TCP","54","40840 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2458","1.212112","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2459","1.212551","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2460","1.212558","172.30.1.205","172.30.1.104","TCP","54","40840 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2461","1.214370","172.30.1.205","172.30.1.104","TCP","54","40840 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2462","1.214481","172.30.1.205","172.30.1.104","TCP","74","33478 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904440 TSecr=0 WS=128" "2463","1.214908","172.30.1.104","172.30.1.205","TCP","66","49671 > 33478 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2464","1.214919","172.30.1.205","172.30.1.104","TCP","54","33478 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2465","1.214925","172.30.1.104","172.30.1.205","TCP","54","135 > 40840 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2466","1.214986","172.30.1.104","172.30.1.205","TCP","54","135 > 40840 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2467","1.214993","172.30.1.205","172.30.1.104","TCP","54","40840 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2468","1.215302","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2469","1.215593","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2470","1.215602","172.30.1.205","172.30.1.104","TCP","54","33478 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2471","1.217541","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2472","1.217914","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2473","1.217920","172.30.1.205","172.30.1.104","TCP","54","33478 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2474","1.219254","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2475","1.221612","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2476","1.221633","172.30.1.205","172.30.1.104","TCP","54","33478 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2477","1.222607","172.30.1.205","172.30.1.104","TCP","74","40844 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904449 TSecr=0 WS=128" "2478","1.223080","172.30.1.104","172.30.1.205","TCP","66","135 > 40844 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2479","1.223091","172.30.1.205","172.30.1.104","TCP","54","40844 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2480","1.223439","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2481","1.223740","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2482","1.223749","172.30.1.205","172.30.1.104","TCP","54","40844 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2483","1.225966","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2484","1.226368","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2485","1.226381","172.30.1.205","172.30.1.104","TCP","54","40844 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2486","1.227439","172.30.1.205","172.30.1.104","TCP","54","33438 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2487","1.227488","172.30.1.205","172.30.1.104","TCP","54","33442 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2488","1.227526","172.30.1.205","172.30.1.104","TCP","54","33446 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2489","1.227560","172.30.1.205","172.30.1.104","TCP","54","33450 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2490","1.227592","172.30.1.205","172.30.1.104","TCP","54","33454 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2491","1.227619","172.30.1.205","172.30.1.104","TCP","54","33458 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2492","1.227641","172.30.1.205","172.30.1.104","TCP","54","33462 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2493","1.227662","172.30.1.205","172.30.1.104","TCP","54","33466 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2494","1.227688","172.30.1.205","172.30.1.104","TCP","54","33470 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2495","1.227715","172.30.1.205","172.30.1.104","TCP","54","33474 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2496","1.227744","172.30.1.205","172.30.1.104","TCP","54","33478 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2497","1.227809","172.30.1.205","172.30.1.104","TCP","54","33434 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2498","1.227938","172.30.1.104","172.30.1.205","TCP","54","49671 > 33438 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2499","1.227948","172.30.1.104","172.30.1.205","TCP","54","49671 > 33442 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2500","1.227950","172.30.1.104","172.30.1.205","TCP","54","49671 > 33442 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2501","1.227957","172.30.1.205","172.30.1.104","TCP","54","33442 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2502","1.227964","172.30.1.104","172.30.1.205","TCP","54","49671 > 33438 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2503","1.227966","172.30.1.205","172.30.1.104","TCP","54","33438 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2504","1.227968","172.30.1.104","172.30.1.205","TCP","54","49671 > 33446 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2505","1.227974","172.30.1.104","172.30.1.205","TCP","54","49671 > 33450 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2506","1.228120","172.30.1.104","172.30.1.205","TCP","54","49671 > 33446 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2507","1.228126","172.30.1.205","172.30.1.104","TCP","54","33446 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2508","1.228132","172.30.1.104","172.30.1.205","TCP","54","49671 > 33454 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2509","1.228137","172.30.1.104","172.30.1.205","TCP","54","49671 > 33450 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2510","1.228140","172.30.1.205","172.30.1.104","TCP","54","33450 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2511","1.228141","172.30.1.104","172.30.1.205","TCP","54","49671 > 33454 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2512","1.228144","172.30.1.205","172.30.1.104","TCP","54","33454 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2513","1.228481","172.30.1.104","172.30.1.205","TCP","54","49671 > 33458 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2514","1.228488","172.30.1.104","172.30.1.205","TCP","54","49671 > 33462 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2515","1.228491","172.30.1.104","172.30.1.205","TCP","54","49671 > 33466 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2516","1.228493","172.30.1.104","172.30.1.205","TCP","54","49671 > 33470 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2517","1.228496","172.30.1.104","172.30.1.205","TCP","54","49671 > 33470 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2518","1.228501","172.30.1.205","172.30.1.104","TCP","54","33470 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2519","1.228508","172.30.1.104","172.30.1.205","TCP","54","49671 > 33474 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2520","1.228511","172.30.1.104","172.30.1.205","TCP","54","49671 > 33478 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2521","1.228517","172.30.1.104","172.30.1.205","TCP","54","49671 > 33434 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2522","1.228520","172.30.1.104","172.30.1.205","TCP","54","49671 > 33466 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2523","1.228522","172.30.1.205","172.30.1.104","TCP","54","33466 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2524","1.228523","172.30.1.104","172.30.1.205","TCP","54","49671 > 33458 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2525","1.228525","172.30.1.205","172.30.1.104","TCP","54","33458 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2526","1.228526","172.30.1.104","172.30.1.205","TCP","54","49671 > 33434 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2527","1.228528","172.30.1.205","172.30.1.104","TCP","54","33434 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2528","1.228529","172.30.1.104","172.30.1.205","TCP","54","49671 > 33478 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2529","1.228531","172.30.1.205","172.30.1.104","TCP","54","33478 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2530","1.228532","172.30.1.104","172.30.1.205","TCP","54","49671 > 33474 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2531","1.228534","172.30.1.205","172.30.1.104","TCP","54","33474 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2532","1.228535","172.30.1.104","172.30.1.205","TCP","54","49671 > 33462 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2533","1.228537","172.30.1.205","172.30.1.104","TCP","54","33462 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2534","1.229272","172.30.1.205","172.30.1.104","TCP","54","40844 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2535","1.229396","172.30.1.205","172.30.1.104","TCP","74","33482 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904455 TSecr=0 WS=128" "2536","1.229559","172.30.1.104","172.30.1.205","TCP","54","135 > 40844 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2537","1.229567","172.30.1.104","172.30.1.205","TCP","54","135 > 40844 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2538","1.229572","172.30.1.205","172.30.1.104","TCP","54","40844 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2539","1.229641","172.30.1.104","172.30.1.205","TCP","66","49671 > 33482 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2540","1.229650","172.30.1.205","172.30.1.104","TCP","54","33482 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2541","1.230002","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2542","1.230275","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2543","1.230284","172.30.1.205","172.30.1.104","TCP","54","33482 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2544","1.232140","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2545","1.232492","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2546","1.232498","172.30.1.205","172.30.1.104","TCP","54","33482 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2547","1.233883","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2548","1.236162","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2549","1.236173","172.30.1.205","172.30.1.104","TCP","54","33482 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2550","1.237160","172.30.1.205","172.30.1.104","TCP","74","40848 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904463 TSecr=0 WS=128" "2551","1.237460","172.30.1.104","172.30.1.205","TCP","66","135 > 40848 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2552","1.237471","172.30.1.205","172.30.1.104","TCP","54","40848 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2553","1.237825","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2554","1.238133","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2555","1.238151","172.30.1.205","172.30.1.104","TCP","54","40848 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2556","1.240554","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2557","1.240945","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2558","1.240951","172.30.1.205","172.30.1.104","TCP","54","40848 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2559","1.242753","172.30.1.205","172.30.1.104","TCP","54","40848 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2560","1.242865","172.30.1.205","172.30.1.104","TCP","74","33486 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904469 TSecr=0 WS=128" "2561","1.243025","172.30.1.104","172.30.1.205","TCP","54","135 > 40848 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2562","1.243034","172.30.1.104","172.30.1.205","TCP","54","135 > 40848 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2563","1.243039","172.30.1.205","172.30.1.104","TCP","54","40848 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2564","1.243118","172.30.1.104","172.30.1.205","TCP","66","49671 > 33486 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2565","1.243126","172.30.1.205","172.30.1.104","TCP","54","33486 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2566","1.243471","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2567","1.243742","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2568","1.243751","172.30.1.205","172.30.1.104","TCP","54","33486 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2569","1.245652","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2570","1.246016","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2571","1.246028","172.30.1.205","172.30.1.104","TCP","54","33486 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2572","1.247645","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2573","1.251482","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2574","1.251492","172.30.1.205","172.30.1.104","TCP","54","33486 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2575","1.252427","172.30.1.205","172.30.1.104","TCP","74","40852 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904478 TSecr=0 WS=128" "2576","1.252736","172.30.1.104","172.30.1.205","TCP","66","135 > 40852 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2577","1.252748","172.30.1.205","172.30.1.104","TCP","54","40852 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2578","1.253120","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2579","1.253407","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2580","1.253416","172.30.1.205","172.30.1.104","TCP","54","40852 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2581","1.255583","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2582","1.255990","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2583","1.256002","172.30.1.205","172.30.1.104","TCP","54","40852 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2584","1.257988","172.30.1.205","172.30.1.104","TCP","54","40852 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2585","1.258100","172.30.1.205","172.30.1.104","TCP","74","33490 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904484 TSecr=0 WS=128" "2586","1.258282","172.30.1.104","172.30.1.205","TCP","54","135 > 40852 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2587","1.258291","172.30.1.104","172.30.1.205","TCP","54","135 > 40852 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2588","1.258296","172.30.1.205","172.30.1.104","TCP","54","40852 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2589","1.258370","172.30.1.104","172.30.1.205","TCP","66","49671 > 33490 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2590","1.258378","172.30.1.205","172.30.1.104","TCP","54","33490 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2591","1.258728","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2592","1.260244","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2593","1.260254","172.30.1.205","172.30.1.104","TCP","54","33490 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2594","1.262154","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2595","1.262520","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2596","1.262527","172.30.1.205","172.30.1.104","TCP","54","33490 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2597","1.263861","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2598","1.266123","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2599","1.266133","172.30.1.205","172.30.1.104","TCP","54","33490 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2600","1.267081","172.30.1.205","172.30.1.104","TCP","74","40856 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904493 TSecr=0 WS=128" "2601","1.267364","172.30.1.104","172.30.1.205","TCP","66","135 > 40856 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2602","1.267375","172.30.1.205","172.30.1.104","TCP","54","40856 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2603","1.267726","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2604","1.268013","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2605","1.268022","172.30.1.205","172.30.1.104","TCP","54","40856 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2606","1.270250","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2607","1.270645","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2608","1.270651","172.30.1.205","172.30.1.104","TCP","54","40856 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2609","1.272538","172.30.1.205","172.30.1.104","TCP","54","40856 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2610","1.272644","172.30.1.205","172.30.1.104","TCP","74","33494 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904499 TSecr=0 WS=128" "2611","1.272834","172.30.1.104","172.30.1.205","TCP","54","135 > 40856 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2612","1.272857","172.30.1.104","172.30.1.205","TCP","54","135 > 40856 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2613","1.272864","172.30.1.205","172.30.1.104","TCP","54","40856 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2614","1.272934","172.30.1.104","172.30.1.205","TCP","66","49671 > 33494 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2615","1.272942","172.30.1.205","172.30.1.104","TCP","54","33494 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2616","1.273320","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2617","1.274090","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2618","1.274101","172.30.1.205","172.30.1.104","TCP","54","33494 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2619","1.276075","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2620","1.276424","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2621","1.276430","172.30.1.205","172.30.1.104","TCP","54","33494 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2622","1.277775","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2623","1.280124","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2624","1.280133","172.30.1.205","172.30.1.104","TCP","54","33494 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2625","1.281082","172.30.1.205","172.30.1.104","TCP","74","40860 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904507 TSecr=0 WS=128" "2626","1.281364","172.30.1.104","172.30.1.205","TCP","66","135 > 40860 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2627","1.281375","172.30.1.205","172.30.1.104","TCP","54","40860 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2628","1.281755","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2629","1.282026","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2630","1.282036","172.30.1.205","172.30.1.104","TCP","54","40860 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2631","1.284268","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2632","1.284670","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2633","1.284683","172.30.1.205","172.30.1.104","TCP","54","40860 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2634","1.286683","172.30.1.205","172.30.1.104","TCP","54","40860 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2635","1.286795","172.30.1.205","172.30.1.104","TCP","74","33498 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904513 TSecr=0 WS=128" "2636","1.286949","172.30.1.104","172.30.1.205","TCP","54","135 > 40860 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2637","1.286973","172.30.1.104","172.30.1.205","TCP","54","135 > 40860 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2638","1.286978","172.30.1.205","172.30.1.104","TCP","54","40860 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2639","1.287100","172.30.1.104","172.30.1.205","TCP","66","49671 > 33498 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2640","1.287108","172.30.1.205","172.30.1.104","TCP","54","33498 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2641","1.287459","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2642","1.287757","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2643","1.287765","172.30.1.205","172.30.1.104","TCP","54","33498 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2644","1.289746","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2645","1.290185","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2646","1.290191","172.30.1.205","172.30.1.104","TCP","54","33498 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2647","1.291580","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2648","1.293976","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2649","1.293986","172.30.1.205","172.30.1.104","TCP","54","33498 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2650","1.294921","172.30.1.205","172.30.1.104","TCP","74","40864 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904521 TSecr=0 WS=128" "2651","1.295234","172.30.1.104","172.30.1.205","TCP","66","135 > 40864 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2652","1.295245","172.30.1.205","172.30.1.104","TCP","54","40864 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2653","1.295592","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2654","1.295892","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2655","1.295901","172.30.1.205","172.30.1.104","TCP","54","40864 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2656","1.298102","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2657","1.298496","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2658","1.298503","172.30.1.205","172.30.1.104","TCP","54","40864 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2659","1.300301","172.30.1.205","172.30.1.104","TCP","54","40864 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2660","1.300412","172.30.1.205","172.30.1.104","TCP","74","33502 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904526 TSecr=0 WS=128" "2661","1.300566","172.30.1.104","172.30.1.205","TCP","54","135 > 40864 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2662","1.300577","172.30.1.104","172.30.1.205","TCP","54","135 > 40864 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2663","1.300582","172.30.1.205","172.30.1.104","TCP","54","40864 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2664","1.300708","172.30.1.104","172.30.1.205","TCP","66","49671 > 33502 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2665","1.300716","172.30.1.205","172.30.1.104","TCP","54","33502 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2666","1.301086","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2667","1.301429","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2668","1.301438","172.30.1.205","172.30.1.104","TCP","54","33502 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2669","1.303329","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2670","1.303709","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2671","1.303715","172.30.1.205","172.30.1.104","TCP","54","33502 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2672","1.305092","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2673","1.307328","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2674","1.307339","172.30.1.205","172.30.1.104","TCP","54","33502 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2675","1.308283","172.30.1.205","172.30.1.104","TCP","74","40868 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904534 TSecr=0 WS=128" "2676","1.308612","172.30.1.104","172.30.1.205","TCP","66","135 > 40868 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2677","1.308623","172.30.1.205","172.30.1.104","TCP","54","40868 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2678","1.309006","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2679","1.311930","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2680","1.311941","172.30.1.205","172.30.1.104","TCP","54","40868 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2681","1.314173","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2682","1.315660","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2683","1.315667","172.30.1.205","172.30.1.104","TCP","54","40868 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2684","1.317538","172.30.1.205","172.30.1.104","TCP","54","40868 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2685","1.317649","172.30.1.205","172.30.1.104","TCP","74","33506 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904544 TSecr=0 WS=128" "2686","1.317810","172.30.1.104","172.30.1.205","TCP","54","135 > 40868 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2687","1.317829","172.30.1.104","172.30.1.205","TCP","54","135 > 40868 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2688","1.317839","172.30.1.205","172.30.1.104","TCP","54","40868 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2689","1.317932","172.30.1.104","172.30.1.205","TCP","66","49671 > 33506 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2690","1.317947","172.30.1.205","172.30.1.104","TCP","54","33506 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2691","1.318476","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2692","1.318781","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2693","1.318790","172.30.1.205","172.30.1.104","TCP","54","33506 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2694","1.320687","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2695","1.321066","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2696","1.321073","172.30.1.205","172.30.1.104","TCP","54","33506 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2697","1.322451","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2698","1.323677","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2699","1.323686","172.30.1.205","172.30.1.104","TCP","54","33506 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2700","1.324627","172.30.1.205","172.30.1.104","TCP","74","40872 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904551 TSecr=0 WS=128" "2701","1.324940","172.30.1.104","172.30.1.205","TCP","66","135 > 40872 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2702","1.324952","172.30.1.205","172.30.1.104","TCP","54","40872 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2703","1.325340","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2704","1.325635","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2705","1.325644","172.30.1.205","172.30.1.104","TCP","54","40872 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2706","1.327812","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2707","1.328196","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2708","1.328202","172.30.1.205","172.30.1.104","TCP","54","40872 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2709","1.330031","172.30.1.205","172.30.1.104","TCP","54","40872 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2710","1.330143","172.30.1.205","172.30.1.104","TCP","74","33510 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904556 TSecr=0 WS=128" "2711","1.330326","172.30.1.104","172.30.1.205","TCP","54","135 > 40872 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2712","1.330350","172.30.1.104","172.30.1.205","TCP","54","135 > 40872 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2713","1.330356","172.30.1.205","172.30.1.104","TCP","54","40872 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2714","1.330435","172.30.1.104","172.30.1.205","TCP","66","49671 > 33510 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2715","1.330443","172.30.1.205","172.30.1.104","TCP","54","33510 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2716","1.330790","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2717","1.331077","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2718","1.331086","172.30.1.205","172.30.1.104","TCP","54","33510 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2719","1.332999","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2720","1.333369","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2721","1.333375","172.30.1.205","172.30.1.104","TCP","54","33510 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2722","1.334731","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2723","1.335647","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2724","1.335656","172.30.1.205","172.30.1.104","TCP","54","33510 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2725","1.336593","172.30.1.205","172.30.1.104","TCP","74","40876 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904563 TSecr=0 WS=128" "2726","1.336879","172.30.1.104","172.30.1.205","TCP","66","135 > 40876 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2727","1.336901","172.30.1.205","172.30.1.104","TCP","54","40876 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2728","1.337500","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2729","1.337794","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2730","1.337803","172.30.1.205","172.30.1.104","TCP","54","40876 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2731","1.339985","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2732","1.340391","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2733","1.340397","172.30.1.205","172.30.1.104","TCP","54","40876 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2734","1.342216","172.30.1.205","172.30.1.104","TCP","54","40876 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2735","1.342328","172.30.1.205","172.30.1.104","TCP","74","33514 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904568 TSecr=0 WS=128" "2736","1.342479","172.30.1.104","172.30.1.205","TCP","54","135 > 40876 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2737","1.342518","172.30.1.104","172.30.1.205","TCP","54","135 > 40876 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2738","1.342524","172.30.1.205","172.30.1.104","TCP","54","40876 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2739","1.342633","172.30.1.104","172.30.1.205","TCP","66","49671 > 33514 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2740","1.342642","172.30.1.205","172.30.1.104","TCP","54","33514 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2741","1.342987","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2742","1.343680","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2743","1.343689","172.30.1.205","172.30.1.104","TCP","54","33514 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2744","1.345595","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2745","1.345972","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2746","1.345979","172.30.1.205","172.30.1.104","TCP","54","33514 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2747","1.347438","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2748","1.348412","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2749","1.348421","172.30.1.205","172.30.1.104","TCP","54","33514 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2750","1.349391","172.30.1.205","172.30.1.104","TCP","74","40880 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904575 TSecr=0 WS=128" "2751","1.349683","172.30.1.104","172.30.1.205","TCP","66","135 > 40880 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2752","1.349694","172.30.1.205","172.30.1.104","TCP","54","40880 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2753","1.350042","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2754","1.350360","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2755","1.350369","172.30.1.205","172.30.1.104","TCP","54","40880 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2756","1.352553","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2757","1.352950","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2758","1.352964","172.30.1.205","172.30.1.104","TCP","54","40880 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2759","1.355053","172.30.1.205","172.30.1.104","TCP","54","40880 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2760","1.355164","172.30.1.205","172.30.1.104","TCP","74","33518 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904581 TSecr=0 WS=128" "2761","1.355332","172.30.1.104","172.30.1.205","TCP","54","135 > 40880 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2762","1.355356","172.30.1.104","172.30.1.205","TCP","54","135 > 40880 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2763","1.355361","172.30.1.205","172.30.1.104","TCP","54","40880 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2764","1.355447","172.30.1.104","172.30.1.205","TCP","66","49671 > 33518 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2765","1.355455","172.30.1.205","172.30.1.104","TCP","54","33518 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2766","1.355805","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2767","1.356094","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2768","1.356103","172.30.1.205","172.30.1.104","TCP","54","33518 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2769","1.357973","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2770","1.358353","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2771","1.358359","172.30.1.205","172.30.1.104","TCP","54","33518 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2772","1.359727","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2773","1.360655","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2774","1.360664","172.30.1.205","172.30.1.104","TCP","54","33518 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2775","1.361634","172.30.1.205","172.30.1.104","TCP","74","40884 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904588 TSecr=0 WS=128" "2776","1.361949","172.30.1.104","172.30.1.205","TCP","66","135 > 40884 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2777","1.361959","172.30.1.205","172.30.1.104","TCP","54","40884 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2778","1.362309","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2779","1.362611","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2780","1.362620","172.30.1.205","172.30.1.104","TCP","54","40884 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2781","1.364815","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2782","1.365246","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2783","1.365253","172.30.1.205","172.30.1.104","TCP","54","40884 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2784","1.367065","172.30.1.205","172.30.1.104","TCP","54","40884 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2785","1.367176","172.30.1.205","172.30.1.104","TCP","74","33522 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904593 TSecr=0 WS=128" "2786","1.367325","172.30.1.104","172.30.1.205","TCP","54","135 > 40884 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2787","1.367350","172.30.1.104","172.30.1.205","TCP","54","135 > 40884 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2788","1.367355","172.30.1.205","172.30.1.104","TCP","54","40884 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2789","1.367468","172.30.1.104","172.30.1.205","TCP","66","49671 > 33522 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2790","1.367476","172.30.1.205","172.30.1.104","TCP","54","33522 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2791","1.367837","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2792","1.368509","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2793","1.368527","172.30.1.205","172.30.1.104","TCP","54","33522 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2794","1.370578","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2795","1.370981","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2796","1.370988","172.30.1.205","172.30.1.104","TCP","54","33522 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2797","1.372347","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2798","1.373282","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2799","1.373291","172.30.1.205","172.30.1.104","TCP","54","33522 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2800","1.374221","172.30.1.205","172.30.1.104","TCP","74","40888 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904600 TSecr=0 WS=128" "2801","1.374511","172.30.1.104","172.30.1.205","TCP","66","135 > 40888 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2802","1.374522","172.30.1.205","172.30.1.104","TCP","54","40888 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2803","1.374874","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2804","1.375179","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2805","1.375188","172.30.1.205","172.30.1.104","TCP","54","40888 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2806","1.377426","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2807","1.377810","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2808","1.377817","172.30.1.205","172.30.1.104","TCP","54","40888 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2809","1.379617","172.30.1.205","172.30.1.104","TCP","54","40888 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2810","1.379724","172.30.1.205","172.30.1.104","TCP","74","33526 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904606 TSecr=0 WS=128" "2811","1.379873","172.30.1.104","172.30.1.205","TCP","54","135 > 40888 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2812","1.379896","172.30.1.104","172.30.1.205","TCP","54","135 > 40888 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2813","1.379901","172.30.1.205","172.30.1.104","TCP","54","40888 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2814","1.380017","172.30.1.104","172.30.1.205","TCP","66","49671 > 33526 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2815","1.380025","172.30.1.205","172.30.1.104","TCP","54","33526 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2816","1.380367","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2817","1.380649","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2818","1.380659","172.30.1.205","172.30.1.104","TCP","54","33526 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2819","1.382553","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2820","1.382947","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2821","1.382954","172.30.1.205","172.30.1.104","TCP","54","33526 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2822","1.384294","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2823","1.385257","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2824","1.385275","172.30.1.205","172.30.1.104","TCP","54","33526 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2825","1.386360","172.30.1.205","172.30.1.104","TCP","74","40892 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904612 TSecr=0 WS=128" "2826","1.386676","172.30.1.104","172.30.1.205","TCP","66","135 > 40892 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2827","1.386687","172.30.1.205","172.30.1.104","TCP","54","40892 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2828","1.387031","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2829","1.387321","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2830","1.387330","172.30.1.205","172.30.1.104","TCP","54","40892 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2831","1.389540","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2832","1.389931","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2833","1.389938","172.30.1.205","172.30.1.104","TCP","54","40892 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2834","1.391090","172.30.1.205","172.30.1.104","TCP","54","33482 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2835","1.391139","172.30.1.205","172.30.1.104","TCP","54","33486 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2836","1.391176","172.30.1.205","172.30.1.104","TCP","54","33490 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2837","1.391205","172.30.1.205","172.30.1.104","TCP","54","33494 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2838","1.391239","172.30.1.205","172.30.1.104","TCP","54","33498 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2839","1.391266","172.30.1.205","172.30.1.104","TCP","54","33502 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2840","1.391293","172.30.1.205","172.30.1.104","TCP","54","33506 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2841","1.391319","172.30.1.205","172.30.1.104","TCP","54","33510 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2842","1.391352","172.30.1.205","172.30.1.104","TCP","54","33514 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2843","1.391379","172.30.1.205","172.30.1.104","TCP","54","33518 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2844","1.391406","172.30.1.205","172.30.1.104","TCP","54","33522 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2845","1.391433","172.30.1.205","172.30.1.104","TCP","54","33526 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "2846","1.391631","172.30.1.104","172.30.1.205","TCP","54","49671 > 33486 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2847","1.391653","172.30.1.104","172.30.1.205","TCP","54","49671 > 33490 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2848","1.391681","172.30.1.104","172.30.1.205","TCP","54","49671 > 33482 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2849","1.391707","172.30.1.104","172.30.1.205","TCP","54","49671 > 33494 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2850","1.391735","172.30.1.104","172.30.1.205","TCP","54","49671 > 33498 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2851","1.391761","172.30.1.104","172.30.1.205","TCP","54","49671 > 33482 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2852","1.391767","172.30.1.205","172.30.1.104","TCP","54","33482 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2853","1.391787","172.30.1.104","172.30.1.205","TCP","54","49671 > 33502 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2854","1.391818","172.30.1.104","172.30.1.205","TCP","54","49671 > 33506 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2855","1.391844","172.30.1.104","172.30.1.205","TCP","54","49671 > 33510 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2856","1.391873","172.30.1.104","172.30.1.205","TCP","54","49671 > 33514 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2857","1.391902","172.30.1.104","172.30.1.205","TCP","54","49671 > 33518 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2858","1.391929","172.30.1.104","172.30.1.205","TCP","54","49671 > 33522 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2859","1.391954","172.30.1.104","172.30.1.205","TCP","54","49671 > 33518 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2860","1.391971","172.30.1.205","172.30.1.104","TCP","54","33518 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2861","1.391990","172.30.1.104","172.30.1.205","TCP","54","49671 > 33522 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2862","1.391993","172.30.1.205","172.30.1.104","TCP","54","33522 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2863","1.392007","172.30.1.104","172.30.1.205","TCP","54","49671 > 33514 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2864","1.392010","172.30.1.205","172.30.1.104","TCP","54","33514 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2865","1.392034","172.30.1.104","172.30.1.205","TCP","54","49671 > 33510 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2866","1.392037","172.30.1.205","172.30.1.104","TCP","54","33510 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2867","1.392060","172.30.1.104","172.30.1.205","TCP","54","49671 > 33506 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2868","1.392063","172.30.1.205","172.30.1.104","TCP","54","33506 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2869","1.392086","172.30.1.104","172.30.1.205","TCP","54","49671 > 33502 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2870","1.392089","172.30.1.205","172.30.1.104","TCP","54","33502 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2871","1.392112","172.30.1.104","172.30.1.205","TCP","54","49671 > 33498 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2872","1.392115","172.30.1.205","172.30.1.104","TCP","54","33498 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2873","1.392138","172.30.1.104","172.30.1.205","TCP","54","49671 > 33494 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2874","1.392141","172.30.1.205","172.30.1.104","TCP","54","33494 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2875","1.392166","172.30.1.104","172.30.1.205","TCP","54","49671 > 33486 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2876","1.392169","172.30.1.205","172.30.1.104","TCP","54","33486 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2877","1.392192","172.30.1.104","172.30.1.205","TCP","54","49671 > 33490 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2878","1.392196","172.30.1.205","172.30.1.104","TCP","54","33490 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2879","1.392219","172.30.1.104","172.30.1.205","TCP","54","49671 > 33526 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2880","1.392245","172.30.1.104","172.30.1.205","TCP","54","49671 > 33526 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "2881","1.392249","172.30.1.205","172.30.1.104","TCP","54","33526 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "2882","1.393118","172.30.1.205","172.30.1.104","TCP","54","40892 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2883","1.393233","172.30.1.205","172.30.1.104","TCP","74","33530 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904619 TSecr=0 WS=128" "2884","1.393376","172.30.1.104","172.30.1.205","TCP","54","135 > 40892 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2885","1.393426","172.30.1.104","172.30.1.205","TCP","54","135 > 40892 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2886","1.393431","172.30.1.205","172.30.1.104","TCP","54","40892 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2887","1.393512","172.30.1.104","172.30.1.205","TCP","66","49671 > 33530 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2888","1.393521","172.30.1.205","172.30.1.104","TCP","54","33530 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2889","1.393876","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2890","1.394173","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2891","1.394182","172.30.1.205","172.30.1.104","TCP","54","33530 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2892","1.396060","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2893","1.396433","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2894","1.396439","172.30.1.205","172.30.1.104","TCP","54","33530 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2895","1.397823","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2896","1.398802","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2897","1.398812","172.30.1.205","172.30.1.104","TCP","54","33530 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2898","1.399733","172.30.1.205","172.30.1.104","TCP","74","40896 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904626 TSecr=0 WS=128" "2899","1.400080","172.30.1.104","172.30.1.205","TCP","66","135 > 40896 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2900","1.400091","172.30.1.205","172.30.1.104","TCP","54","40896 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2901","1.400437","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2902","1.400731","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2903","1.400748","172.30.1.205","172.30.1.104","TCP","54","40896 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2904","1.403127","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2905","1.403528","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2906","1.403535","172.30.1.205","172.30.1.104","TCP","54","40896 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2907","1.405362","172.30.1.205","172.30.1.104","TCP","54","40896 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2908","1.405478","172.30.1.205","172.30.1.104","TCP","74","33534 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904631 TSecr=0 WS=128" "2909","1.405622","172.30.1.104","172.30.1.205","TCP","54","135 > 40896 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2910","1.405647","172.30.1.104","172.30.1.205","TCP","54","135 > 40896 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2911","1.405652","172.30.1.205","172.30.1.104","TCP","54","40896 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2912","1.405765","172.30.1.104","172.30.1.205","TCP","66","49671 > 33534 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2913","1.405774","172.30.1.205","172.30.1.104","TCP","54","33534 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2914","1.406116","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2915","1.406399","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2916","1.406408","172.30.1.205","172.30.1.104","TCP","54","33534 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2917","1.408275","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2918","1.408650","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2919","1.408662","172.30.1.205","172.30.1.104","TCP","54","33534 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2920","1.410364","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2921","1.411319","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2922","1.411329","172.30.1.205","172.30.1.104","TCP","54","33534 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2923","1.412252","172.30.1.205","172.30.1.104","TCP","74","40900 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904638 TSecr=0 WS=128" "2924","1.412572","172.30.1.104","172.30.1.205","TCP","66","135 > 40900 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2925","1.412582","172.30.1.205","172.30.1.104","TCP","54","40900 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2926","1.412959","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2927","1.413259","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2928","1.413268","172.30.1.205","172.30.1.104","TCP","54","40900 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2929","1.415432","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2930","1.415860","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2931","1.415867","172.30.1.205","172.30.1.104","TCP","54","40900 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2932","1.417688","172.30.1.205","172.30.1.104","TCP","54","40900 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2933","1.417798","172.30.1.205","172.30.1.104","TCP","74","33538 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904644 TSecr=0 WS=128" "2934","1.417946","172.30.1.104","172.30.1.205","TCP","54","135 > 40900 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2935","1.417999","172.30.1.104","172.30.1.205","TCP","54","135 > 40900 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2936","1.418017","172.30.1.205","172.30.1.104","TCP","54","40900 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2937","1.418113","172.30.1.104","172.30.1.205","TCP","66","49671 > 33538 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2938","1.418121","172.30.1.205","172.30.1.104","TCP","54","33538 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2939","1.418469","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2940","1.418770","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2941","1.418779","172.30.1.205","172.30.1.104","TCP","54","33538 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2942","1.420643","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2943","1.421038","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2944","1.421045","172.30.1.205","172.30.1.104","TCP","54","33538 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2945","1.422443","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2946","1.424117","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2947","1.424136","172.30.1.205","172.30.1.104","TCP","54","33538 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2948","1.425232","172.30.1.205","172.30.1.104","TCP","74","40904 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904651 TSecr=0 WS=128" "2949","1.425550","172.30.1.104","172.30.1.205","TCP","66","135 > 40904 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2950","1.425559","172.30.1.205","172.30.1.104","TCP","54","40904 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2951","1.425904","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2952","1.426219","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2953","1.426228","172.30.1.205","172.30.1.104","TCP","54","40904 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2954","1.428449","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2955","1.428843","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2956","1.428850","172.30.1.205","172.30.1.104","TCP","54","40904 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2957","1.430679","172.30.1.205","172.30.1.104","TCP","54","40904 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2958","1.430790","172.30.1.205","172.30.1.104","TCP","74","33542 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904657 TSecr=0 WS=128" "2959","1.430936","172.30.1.104","172.30.1.205","TCP","54","135 > 40904 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2960","1.430960","172.30.1.104","172.30.1.205","TCP","54","135 > 40904 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2961","1.430965","172.30.1.205","172.30.1.104","TCP","54","40904 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2962","1.431069","172.30.1.104","172.30.1.205","TCP","66","49671 > 33542 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2963","1.431078","172.30.1.205","172.30.1.104","TCP","54","33542 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2964","1.431428","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2965","1.431728","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2966","1.431737","172.30.1.205","172.30.1.104","TCP","54","33542 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2967","1.433636","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2968","1.434068","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2969","1.434075","172.30.1.205","172.30.1.104","TCP","54","33542 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2970","1.435413","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2971","1.436356","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2972","1.436365","172.30.1.205","172.30.1.104","TCP","54","33542 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2973","1.437320","172.30.1.205","172.30.1.104","TCP","74","40908 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904663 TSecr=0 WS=128" "2974","1.437624","172.30.1.104","172.30.1.205","TCP","66","135 > 40908 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2975","1.437634","172.30.1.205","172.30.1.104","TCP","54","40908 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2976","1.437981","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "2977","1.438272","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2978","1.438281","172.30.1.205","172.30.1.104","TCP","54","40908 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2979","1.440458","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "2980","1.440860","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "2981","1.440867","172.30.1.205","172.30.1.104","TCP","54","40908 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "2982","1.442678","172.30.1.205","172.30.1.104","TCP","54","40908 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "2983","1.442789","172.30.1.205","172.30.1.104","TCP","74","33546 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904669 TSecr=0 WS=128" "2984","1.442943","172.30.1.104","172.30.1.205","TCP","54","135 > 40908 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2985","1.442967","172.30.1.104","172.30.1.205","TCP","54","135 > 40908 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "2986","1.442972","172.30.1.205","172.30.1.104","TCP","54","40908 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "2987","1.443058","172.30.1.104","172.30.1.205","TCP","66","49671 > 33546 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "2988","1.443066","172.30.1.205","172.30.1.104","TCP","54","33546 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "2989","1.443408","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "2990","1.443701","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "2991","1.443710","172.30.1.205","172.30.1.104","TCP","54","33546 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "2992","1.445613","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "2993","1.446022","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "2994","1.446031","172.30.1.205","172.30.1.104","TCP","54","33546 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "2995","1.447450","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "2996","1.448422","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "2997","1.448433","172.30.1.205","172.30.1.104","TCP","54","33546 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "2998","1.449411","172.30.1.205","172.30.1.104","TCP","74","40912 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904675 TSecr=0 WS=128" "2999","1.449737","172.30.1.104","172.30.1.205","TCP","66","135 > 40912 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3000","1.449748","172.30.1.205","172.30.1.104","TCP","54","40912 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3001","1.450096","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3002","1.450431","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3003","1.450440","172.30.1.205","172.30.1.104","TCP","54","40912 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3004","1.452619","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3005","1.453020","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3006","1.453027","172.30.1.205","172.30.1.104","TCP","54","40912 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3007","1.454827","172.30.1.205","172.30.1.104","TCP","54","40912 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3008","1.454936","172.30.1.205","172.30.1.104","TCP","74","33550 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904681 TSecr=0 WS=128" "3009","1.455091","172.30.1.104","172.30.1.205","TCP","54","135 > 40912 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3010","1.455116","172.30.1.104","172.30.1.205","TCP","54","135 > 40912 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3011","1.455121","172.30.1.205","172.30.1.104","TCP","54","40912 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3012","1.455205","172.30.1.104","172.30.1.205","TCP","66","49671 > 33550 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3013","1.455214","172.30.1.205","172.30.1.104","TCP","54","33550 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3014","1.455558","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3015","1.455855","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3016","1.455871","172.30.1.205","172.30.1.104","TCP","54","33550 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3017","1.457965","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3018","1.458349","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3019","1.458355","172.30.1.205","172.30.1.104","TCP","54","33550 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3020","1.459684","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3021","1.460651","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3022","1.460660","172.30.1.205","172.30.1.104","TCP","54","33550 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3023","1.461609","172.30.1.205","172.30.1.104","TCP","74","40916 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904688 TSecr=0 WS=128" "3024","1.461925","172.30.1.104","172.30.1.205","TCP","66","135 > 40916 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3025","1.461936","172.30.1.205","172.30.1.104","TCP","54","40916 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3026","1.462278","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3027","1.462580","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3028","1.462589","172.30.1.205","172.30.1.104","TCP","54","40916 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3029","1.464802","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3030","1.465226","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3031","1.465232","172.30.1.205","172.30.1.104","TCP","54","40916 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3032","1.467023","172.30.1.205","172.30.1.104","TCP","54","40916 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3033","1.467132","172.30.1.205","172.30.1.104","TCP","74","33554 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904693 TSecr=0 WS=128" "3034","1.467313","172.30.1.104","172.30.1.205","TCP","54","135 > 40916 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3035","1.467336","172.30.1.104","172.30.1.205","TCP","54","135 > 40916 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3036","1.467342","172.30.1.205","172.30.1.104","TCP","54","40916 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3037","1.467421","172.30.1.104","172.30.1.205","TCP","66","49671 > 33554 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3038","1.467429","172.30.1.205","172.30.1.104","TCP","54","33554 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3039","1.467776","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3040","1.468065","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3041","1.468074","172.30.1.205","172.30.1.104","TCP","54","33554 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3042","1.469977","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3043","1.470365","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3044","1.470371","172.30.1.205","172.30.1.104","TCP","54","33554 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3045","1.471715","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3046","1.472698","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3047","1.472710","172.30.1.205","172.30.1.104","TCP","54","33554 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3048","1.473704","172.30.1.205","172.30.1.104","TCP","74","40920 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904700 TSecr=0 WS=128" "3049","1.474003","172.30.1.104","172.30.1.205","TCP","66","135 > 40920 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3050","1.474014","172.30.1.205","172.30.1.104","TCP","54","40920 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3051","1.474387","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3052","1.474677","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3053","1.474686","172.30.1.205","172.30.1.104","TCP","54","40920 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3054","1.476948","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3055","1.477363","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3056","1.477369","172.30.1.205","172.30.1.104","TCP","54","40920 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3057","1.479174","172.30.1.205","172.30.1.104","TCP","54","40920 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3058","1.479282","172.30.1.205","172.30.1.104","TCP","74","33558 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904705 TSecr=0 WS=128" "3059","1.479465","172.30.1.104","172.30.1.205","TCP","54","135 > 40920 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3060","1.479507","172.30.1.104","172.30.1.205","TCP","54","135 > 40920 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3061","1.479513","172.30.1.205","172.30.1.104","TCP","54","40920 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3062","1.479605","172.30.1.104","172.30.1.205","TCP","66","49671 > 33558 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3063","1.479614","172.30.1.205","172.30.1.104","TCP","54","33558 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3064","1.479975","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3065","1.480369","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3066","1.480377","172.30.1.205","172.30.1.104","TCP","54","33558 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3067","1.482271","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3068","1.482648","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3069","1.482654","172.30.1.205","172.30.1.104","TCP","54","33558 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3070","1.483989","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3071","1.484932","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3072","1.484941","172.30.1.205","172.30.1.104","TCP","54","33558 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3073","1.485873","172.30.1.205","172.30.1.104","TCP","74","40924 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904712 TSecr=0 WS=128" "3074","1.486187","172.30.1.104","172.30.1.205","TCP","66","135 > 40924 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3075","1.486197","172.30.1.205","172.30.1.104","TCP","54","40924 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3076","1.486545","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3077","1.486862","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3078","1.486871","172.30.1.205","172.30.1.104","TCP","54","40924 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3079","1.489040","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3080","1.489437","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3081","1.489449","172.30.1.205","172.30.1.104","TCP","54","40924 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3082","1.491443","172.30.1.205","172.30.1.104","TCP","54","40924 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3083","1.491550","172.30.1.205","172.30.1.104","TCP","74","33562 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904717 TSecr=0 WS=128" "3084","1.491703","172.30.1.104","172.30.1.205","TCP","54","135 > 40924 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3085","1.491748","172.30.1.104","172.30.1.205","TCP","54","135 > 40924 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3086","1.491754","172.30.1.205","172.30.1.104","TCP","54","40924 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3087","1.491863","172.30.1.104","172.30.1.205","TCP","66","49671 > 33562 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3088","1.491871","172.30.1.205","172.30.1.104","TCP","54","33562 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3089","1.492212","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3090","1.492531","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3091","1.492565","172.30.1.205","172.30.1.104","TCP","54","33562 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3092","1.494453","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3093","1.494870","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3094","1.494877","172.30.1.205","172.30.1.104","TCP","54","33562 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3095","1.496201","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3096","1.497155","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3097","1.497164","172.30.1.205","172.30.1.104","TCP","54","33562 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3098","1.498090","172.30.1.205","172.30.1.104","TCP","74","40928 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904724 TSecr=0 WS=128" "3099","1.498375","172.30.1.104","172.30.1.205","TCP","66","135 > 40928 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3100","1.498385","172.30.1.205","172.30.1.104","TCP","54","40928 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3101","1.498727","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3102","1.499026","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3103","1.499036","172.30.1.205","172.30.1.104","TCP","54","40928 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3104","1.501270","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3105","1.501660","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3106","1.501666","172.30.1.205","172.30.1.104","TCP","54","40928 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3107","1.503464","172.30.1.205","172.30.1.104","TCP","54","40928 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3108","1.503581","172.30.1.205","172.30.1.104","TCP","74","33566 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904730 TSecr=0 WS=128" "3109","1.503714","172.30.1.104","172.30.1.205","TCP","54","135 > 40928 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3110","1.503740","172.30.1.104","172.30.1.205","TCP","54","135 > 40928 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3111","1.503745","172.30.1.205","172.30.1.104","TCP","54","40928 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3112","1.503858","172.30.1.104","172.30.1.205","TCP","66","49671 > 33566 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3113","1.503866","172.30.1.205","172.30.1.104","TCP","54","33566 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3114","1.504225","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3115","1.504523","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3116","1.504532","172.30.1.205","172.30.1.104","TCP","54","33566 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3117","1.506456","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3118","1.506877","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3119","1.506885","172.30.1.205","172.30.1.104","TCP","54","33566 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3120","1.508233","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3121","1.509162","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3122","1.509172","172.30.1.205","172.30.1.104","TCP","54","33566 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3123","1.510095","172.30.1.205","172.30.1.104","TCP","74","40932 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904736 TSecr=0 WS=128" "3124","1.510429","172.30.1.104","172.30.1.205","TCP","66","135 > 40932 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3125","1.510439","172.30.1.205","172.30.1.104","TCP","54","40932 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3126","1.510784","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3127","1.511072","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3128","1.511081","172.30.1.205","172.30.1.104","TCP","54","40932 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3129","1.513284","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3130","1.513670","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3131","1.513676","172.30.1.205","172.30.1.104","TCP","54","40932 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3132","1.515456","172.30.1.205","172.30.1.104","TCP","54","40932 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3133","1.515564","172.30.1.205","172.30.1.104","TCP","74","33570 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904741 TSecr=0 WS=128" "3134","1.515731","172.30.1.104","172.30.1.205","TCP","54","135 > 40932 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3135","1.515755","172.30.1.104","172.30.1.205","TCP","54","135 > 40932 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3136","1.515761","172.30.1.205","172.30.1.104","TCP","54","40932 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3137","1.515845","172.30.1.104","172.30.1.205","TCP","66","49671 > 33570 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3138","1.515853","172.30.1.205","172.30.1.104","TCP","54","33570 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3139","1.516196","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3140","1.516509","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3141","1.516515","172.30.1.205","172.30.1.104","TCP","54","33570 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3142","1.518405","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3143","1.518864","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3144","1.518870","172.30.1.205","172.30.1.104","TCP","54","33570 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3145","1.520195","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3146","1.521171","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3147","1.521180","172.30.1.205","172.30.1.104","TCP","54","33570 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3148","1.522104","172.30.1.205","172.30.1.104","TCP","74","40936 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904748 TSecr=0 WS=128" "3149","1.522415","172.30.1.104","172.30.1.205","TCP","66","135 > 40936 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3150","1.522436","172.30.1.205","172.30.1.104","TCP","54","40936 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3151","1.523039","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3152","1.523376","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3153","1.523385","172.30.1.205","172.30.1.104","TCP","54","40936 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3154","1.525565","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3155","1.525947","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3156","1.525953","172.30.1.205","172.30.1.104","TCP","54","40936 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3157","1.527726","172.30.1.205","172.30.1.104","TCP","54","40936 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3158","1.527838","172.30.1.205","172.30.1.104","TCP","74","33574 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904754 TSecr=0 WS=128" "3159","1.528031","172.30.1.104","172.30.1.205","TCP","54","135 > 40936 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3160","1.528040","172.30.1.104","172.30.1.205","TCP","54","135 > 40936 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3161","1.528045","172.30.1.205","172.30.1.104","TCP","54","40936 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3162","1.528143","172.30.1.104","172.30.1.205","TCP","66","49671 > 33574 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3163","1.528155","172.30.1.205","172.30.1.104","TCP","54","33574 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3164","1.528813","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3165","1.529555","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3166","1.529573","172.30.1.205","172.30.1.104","TCP","54","33574 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3167","1.531556","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3168","1.531910","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3169","1.531916","172.30.1.205","172.30.1.104","TCP","54","33574 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3170","1.533271","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3171","1.535140","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3172","1.535150","172.30.1.205","172.30.1.104","TCP","54","33574 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3173","1.536065","172.30.1.205","172.30.1.104","TCP","74","40940 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904762 TSecr=0 WS=128" "3174","1.536378","172.30.1.104","172.30.1.205","TCP","66","135 > 40940 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3175","1.536388","172.30.1.205","172.30.1.104","TCP","54","40940 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3176","1.536730","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3177","1.537008","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3178","1.537017","172.30.1.205","172.30.1.104","TCP","54","40940 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3179","1.539185","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3180","1.539574","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3181","1.539581","172.30.1.205","172.30.1.104","TCP","54","40940 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3182","1.540409","172.30.1.205","172.30.1.104","TCP","54","33534 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3183","1.540457","172.30.1.205","172.30.1.104","TCP","54","33538 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3184","1.540494","172.30.1.205","172.30.1.104","TCP","54","33542 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3185","1.540528","172.30.1.205","172.30.1.104","TCP","54","33546 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3186","1.540559","172.30.1.205","172.30.1.104","TCP","54","33550 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3187","1.540590","172.30.1.205","172.30.1.104","TCP","54","33554 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3188","1.540623","172.30.1.205","172.30.1.104","TCP","54","33558 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3189","1.540651","172.30.1.205","172.30.1.104","TCP","54","33562 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3190","1.540677","172.30.1.205","172.30.1.104","TCP","54","33566 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3191","1.540702","172.30.1.205","172.30.1.104","TCP","54","33570 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3192","1.540723","172.30.1.205","172.30.1.104","TCP","54","33574 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3193","1.540816","172.30.1.205","172.30.1.104","TCP","54","33530 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3194","1.540985","172.30.1.104","172.30.1.205","TCP","54","49671 > 33534 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3195","1.540994","172.30.1.104","172.30.1.205","TCP","54","49671 > 33538 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3196","1.540996","172.30.1.104","172.30.1.205","TCP","54","49671 > 33534 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3197","1.541002","172.30.1.205","172.30.1.104","TCP","54","33534 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3198","1.541015","172.30.1.104","172.30.1.205","TCP","54","49671 > 33542 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3199","1.541022","172.30.1.104","172.30.1.205","TCP","54","49671 > 33546 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3200","1.541025","172.30.1.104","172.30.1.205","TCP","54","49671 > 33546 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3201","1.541028","172.30.1.205","172.30.1.104","TCP","54","33546 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3202","1.541029","172.30.1.104","172.30.1.205","TCP","54","49671 > 33538 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3203","1.541031","172.30.1.205","172.30.1.104","TCP","54","33538 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3204","1.541032","172.30.1.104","172.30.1.205","TCP","54","49671 > 33542 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3205","1.541034","172.30.1.205","172.30.1.104","TCP","54","33542 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3206","1.541035","172.30.1.104","172.30.1.205","TCP","54","49671 > 33550 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3207","1.541038","172.30.1.104","172.30.1.205","TCP","54","49671 > 33554 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3208","1.541272","172.30.1.104","172.30.1.205","TCP","54","49671 > 33558 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3209","1.541278","172.30.1.104","172.30.1.205","TCP","54","49671 > 33562 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3210","1.541281","172.30.1.104","172.30.1.205","TCP","54","49671 > 33550 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3211","1.541285","172.30.1.205","172.30.1.104","TCP","54","33550 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3212","1.541292","172.30.1.104","172.30.1.205","TCP","54","49671 > 33562 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3213","1.541293","172.30.1.205","172.30.1.104","TCP","54","33562 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3214","1.541295","172.30.1.104","172.30.1.205","TCP","54","49671 > 33554 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3215","1.541296","172.30.1.205","172.30.1.104","TCP","54","33554 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3216","1.541298","172.30.1.104","172.30.1.205","TCP","54","49671 > 33558 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3217","1.541302","172.30.1.205","172.30.1.104","TCP","54","33558 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3218","1.541304","172.30.1.104","172.30.1.205","TCP","54","49671 > 33566 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3219","1.541307","172.30.1.104","172.30.1.205","TCP","54","49671 > 33574 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3220","1.541511","172.30.1.104","172.30.1.205","TCP","54","49671 > 33570 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3221","1.541517","172.30.1.104","172.30.1.205","TCP","54","49671 > 33530 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3222","1.541519","172.30.1.104","172.30.1.205","TCP","54","49671 > 33566 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3223","1.541523","172.30.1.205","172.30.1.104","TCP","54","33566 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3224","1.541529","172.30.1.104","172.30.1.205","TCP","54","49671 > 33530 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3225","1.541531","172.30.1.205","172.30.1.104","TCP","54","33530 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3226","1.541532","172.30.1.104","172.30.1.205","TCP","54","49671 > 33574 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3227","1.541534","172.30.1.205","172.30.1.104","TCP","54","33574 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3228","1.541535","172.30.1.104","172.30.1.205","TCP","54","49671 > 33570 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3229","1.541541","172.30.1.205","172.30.1.104","TCP","54","33570 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3230","1.542226","172.30.1.205","172.30.1.104","TCP","54","40940 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3231","1.542333","172.30.1.205","172.30.1.104","TCP","74","33578 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904768 TSecr=0 WS=128" "3232","1.542472","172.30.1.104","172.30.1.205","TCP","54","135 > 40940 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3233","1.542506","172.30.1.104","172.30.1.205","TCP","54","135 > 40940 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3234","1.542511","172.30.1.205","172.30.1.104","TCP","54","40940 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3235","1.542611","172.30.1.104","172.30.1.205","TCP","66","49671 > 33578 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3236","1.542619","172.30.1.205","172.30.1.104","TCP","54","33578 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3237","1.542964","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3238","1.543255","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3239","1.543263","172.30.1.205","172.30.1.104","TCP","54","33578 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3240","1.545166","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3241","1.545539","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3242","1.545545","172.30.1.205","172.30.1.104","TCP","54","33578 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3243","1.546883","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3244","1.548714","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3245","1.548723","172.30.1.205","172.30.1.104","TCP","54","33578 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3246","1.549674","172.30.1.205","172.30.1.104","TCP","74","40944 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904776 TSecr=0 WS=128" "3247","1.549971","172.30.1.104","172.30.1.205","TCP","66","135 > 40944 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3248","1.549992","172.30.1.205","172.30.1.104","TCP","54","40944 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3249","1.550543","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3250","1.550813","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3251","1.550822","172.30.1.205","172.30.1.104","TCP","54","40944 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3252","1.553009","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3253","1.553404","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3254","1.553410","172.30.1.205","172.30.1.104","TCP","54","40944 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3255","1.555229","172.30.1.205","172.30.1.104","TCP","54","40944 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3256","1.555347","172.30.1.205","172.30.1.104","TCP","74","33582 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904781 TSecr=0 WS=128" "3257","1.555468","172.30.1.104","172.30.1.205","TCP","54","135 > 40944 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3258","1.555498","172.30.1.104","172.30.1.205","TCP","54","135 > 40944 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3259","1.555503","172.30.1.205","172.30.1.104","TCP","54","40944 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3260","1.555629","172.30.1.104","172.30.1.205","TCP","66","49671 > 33582 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3261","1.555637","172.30.1.205","172.30.1.104","TCP","54","33582 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3262","1.555980","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3263","1.556249","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3264","1.556258","172.30.1.205","172.30.1.104","TCP","54","33582 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3265","1.558143","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3266","1.558540","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3267","1.558546","172.30.1.205","172.30.1.104","TCP","54","33582 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3268","1.559865","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3269","1.560802","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3270","1.560811","172.30.1.205","172.30.1.104","TCP","54","33582 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3271","1.561737","172.30.1.205","172.30.1.104","TCP","74","40948 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904788 TSecr=0 WS=128" "3272","1.562041","172.30.1.104","172.30.1.205","TCP","66","135 > 40948 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3273","1.562062","172.30.1.205","172.30.1.104","TCP","54","40948 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3274","1.562604","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3275","1.562874","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3276","1.562883","172.30.1.205","172.30.1.104","TCP","54","40948 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3277","1.565057","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3278","1.565434","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3279","1.565441","172.30.1.205","172.30.1.104","TCP","54","40948 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3280","1.567235","172.30.1.205","172.30.1.104","TCP","54","40948 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3281","1.567344","172.30.1.205","172.30.1.104","TCP","74","33586 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904793 TSecr=0 WS=128" "3282","1.567516","172.30.1.104","172.30.1.205","TCP","54","135 > 40948 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3283","1.567525","172.30.1.104","172.30.1.205","TCP","54","135 > 40948 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3284","1.567530","172.30.1.205","172.30.1.104","TCP","54","40948 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3285","1.567647","172.30.1.104","172.30.1.205","TCP","66","49671 > 33586 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3286","1.567655","172.30.1.205","172.30.1.104","TCP","54","33586 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3287","1.567997","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3288","1.568273","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3289","1.568282","172.30.1.205","172.30.1.104","TCP","54","33586 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3290","1.570161","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3291","1.572378","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3292","1.572385","172.30.1.205","172.30.1.104","TCP","54","33586 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3293","1.573736","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3294","1.575333","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3295","1.575342","172.30.1.205","172.30.1.104","TCP","54","33586 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3296","1.576260","172.30.1.205","172.30.1.104","TCP","74","40952 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904802 TSecr=0 WS=128" "3297","1.576538","172.30.1.104","172.30.1.205","TCP","66","135 > 40952 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3298","1.576548","172.30.1.205","172.30.1.104","TCP","54","40952 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3299","1.576918","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3300","1.577240","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3301","1.577248","172.30.1.205","172.30.1.104","TCP","54","40952 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3302","1.579421","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3303","1.579784","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3304","1.579790","172.30.1.205","172.30.1.104","TCP","54","40952 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3305","1.581705","172.30.1.205","172.30.1.104","TCP","54","40952 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3306","1.581816","172.30.1.205","172.30.1.104","TCP","74","33590 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904808 TSecr=0 WS=128" "3307","1.581987","172.30.1.104","172.30.1.205","TCP","54","135 > 40952 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3308","1.581996","172.30.1.104","172.30.1.205","TCP","54","135 > 40952 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3309","1.582002","172.30.1.205","172.30.1.104","TCP","54","40952 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3310","1.582075","172.30.1.104","172.30.1.205","TCP","66","49671 > 33590 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3311","1.582084","172.30.1.205","172.30.1.104","TCP","54","33590 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3312","1.582440","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3313","1.582711","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3314","1.582719","172.30.1.205","172.30.1.104","TCP","54","33590 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3315","1.584569","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3316","1.584933","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3317","1.584940","172.30.1.205","172.30.1.104","TCP","54","33590 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3318","1.586281","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3319","1.587214","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3320","1.587223","172.30.1.205","172.30.1.104","TCP","54","33590 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3321","1.588151","172.30.1.205","172.30.1.104","TCP","74","40956 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904814 TSecr=0 WS=128" "3322","1.588430","172.30.1.104","172.30.1.205","TCP","66","135 > 40956 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3323","1.588441","172.30.1.205","172.30.1.104","TCP","54","40956 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3324","1.588803","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3325","1.589125","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3326","1.589134","172.30.1.205","172.30.1.104","TCP","54","40956 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3327","1.591284","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3328","1.591676","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3329","1.591682","172.30.1.205","172.30.1.104","TCP","54","40956 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3330","1.593550","172.30.1.205","172.30.1.104","TCP","54","40956 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3331","1.593659","172.30.1.205","172.30.1.104","TCP","74","33594 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904820 TSecr=0 WS=128" "3332","1.593817","172.30.1.104","172.30.1.205","TCP","54","135 > 40956 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3333","1.593826","172.30.1.104","172.30.1.205","TCP","54","135 > 40956 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3334","1.593831","172.30.1.205","172.30.1.104","TCP","54","40956 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3335","1.593921","172.30.1.104","172.30.1.205","TCP","66","49671 > 33594 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3336","1.593929","172.30.1.205","172.30.1.104","TCP","54","33594 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3337","1.594267","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3338","1.594527","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3339","1.594536","172.30.1.205","172.30.1.104","TCP","54","33594 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3340","1.596383","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3341","1.596761","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3342","1.596766","172.30.1.205","172.30.1.104","TCP","54","33594 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3343","1.598107","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3344","1.599053","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3345","1.599062","172.30.1.205","172.30.1.104","TCP","54","33594 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3346","1.599983","172.30.1.205","172.30.1.104","TCP","74","40960 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904826 TSecr=0 WS=128" "3347","1.600270","172.30.1.104","172.30.1.205","TCP","66","135 > 40960 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3348","1.600280","172.30.1.205","172.30.1.104","TCP","54","40960 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3349","1.600620","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3350","1.600892","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3351","1.600901","172.30.1.205","172.30.1.104","TCP","54","40960 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3352","1.603065","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3353","1.603448","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3354","1.603458","172.30.1.205","172.30.1.104","TCP","54","40960 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3355","1.605393","172.30.1.205","172.30.1.104","TCP","54","40960 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3356","1.605517","172.30.1.205","172.30.1.104","TCP","74","33598 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904831 TSecr=0 WS=128" "3357","1.605660","172.30.1.104","172.30.1.205","TCP","54","135 > 40960 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3358","1.605699","172.30.1.104","172.30.1.205","TCP","54","135 > 40960 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3359","1.605706","172.30.1.205","172.30.1.104","TCP","54","40960 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3360","1.605778","172.30.1.104","172.30.1.205","TCP","66","49671 > 33598 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3361","1.605787","172.30.1.205","172.30.1.104","TCP","54","33598 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3362","1.606135","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3363","1.606415","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3364","1.606425","172.30.1.205","172.30.1.104","TCP","54","33598 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3365","1.608321","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3366","1.608666","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3367","1.608672","172.30.1.205","172.30.1.104","TCP","54","33598 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3368","1.610049","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3369","1.611042","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3370","1.611054","172.30.1.205","172.30.1.104","TCP","54","33598 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3371","1.612023","172.30.1.205","172.30.1.104","TCP","74","40964 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904838 TSecr=0 WS=128" "3372","1.612300","172.30.1.104","172.30.1.205","TCP","66","135 > 40964 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3373","1.612311","172.30.1.205","172.30.1.104","TCP","54","40964 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3374","1.612666","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3375","1.612944","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3376","1.612953","172.30.1.205","172.30.1.104","TCP","54","40964 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3377","1.615162","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3378","1.615551","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3379","1.615558","172.30.1.205","172.30.1.104","TCP","54","40964 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3380","1.617400","172.30.1.205","172.30.1.104","TCP","54","40964 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3381","1.617512","172.30.1.205","172.30.1.104","TCP","74","33602 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904843 TSecr=0 WS=128" "3382","1.617661","172.30.1.104","172.30.1.205","TCP","54","135 > 40964 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3383","1.617670","172.30.1.104","172.30.1.205","TCP","54","135 > 40964 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3384","1.617675","172.30.1.205","172.30.1.104","TCP","54","40964 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3385","1.617761","172.30.1.104","172.30.1.205","TCP","66","49671 > 33602 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3386","1.617769","172.30.1.205","172.30.1.104","TCP","54","33602 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3387","1.618116","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3388","1.618401","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3389","1.618416","172.30.1.205","172.30.1.104","TCP","54","33602 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3390","1.620388","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3391","1.620767","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3392","1.620774","172.30.1.205","172.30.1.104","TCP","54","33602 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3393","1.622166","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3394","1.623072","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3395","1.623082","172.30.1.205","172.30.1.104","TCP","54","33602 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3396","1.624035","172.30.1.205","172.30.1.104","TCP","74","40968 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904850 TSecr=0 WS=128" "3397","1.624318","172.30.1.104","172.30.1.205","TCP","66","135 > 40968 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3398","1.624329","172.30.1.205","172.30.1.104","TCP","54","40968 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3399","1.624686","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3400","1.624974","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3401","1.624988","172.30.1.205","172.30.1.104","TCP","54","40968 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3402","1.627269","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3403","1.627684","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3404","1.627692","172.30.1.205","172.30.1.104","TCP","54","40968 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3405","1.629575","172.30.1.205","172.30.1.104","TCP","54","40968 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3406","1.629691","172.30.1.205","172.30.1.104","TCP","74","33606 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904856 TSecr=0 WS=128" "3407","1.629850","172.30.1.104","172.30.1.205","TCP","54","135 > 40968 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3408","1.629896","172.30.1.104","172.30.1.205","TCP","54","135 > 40968 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3409","1.629901","172.30.1.205","172.30.1.104","TCP","54","40968 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3410","1.629975","172.30.1.104","172.30.1.205","TCP","66","49671 > 33606 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3411","1.629984","172.30.1.205","172.30.1.104","TCP","54","33606 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3412","1.630332","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3413","1.630632","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3414","1.630641","172.30.1.205","172.30.1.104","TCP","54","33606 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3415","1.632489","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3416","1.632843","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3417","1.632850","172.30.1.205","172.30.1.104","TCP","54","33606 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3418","1.634214","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3419","1.635149","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3420","1.635163","172.30.1.205","172.30.1.104","TCP","54","33606 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3421","1.636178","172.30.1.205","172.30.1.104","TCP","74","40972 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904862 TSecr=0 WS=128" "3422","1.636533","172.30.1.104","172.30.1.205","TCP","66","135 > 40972 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3423","1.636544","172.30.1.205","172.30.1.104","TCP","54","40972 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3424","1.636919","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3425","1.637213","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3426","1.637223","172.30.1.205","172.30.1.104","TCP","54","40972 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3427","1.639385","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3428","1.639786","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3429","1.639792","172.30.1.205","172.30.1.104","TCP","54","40972 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3430","1.641604","172.30.1.205","172.30.1.104","TCP","54","40972 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3431","1.641715","172.30.1.205","172.30.1.104","TCP","74","33610 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904868 TSecr=0 WS=128" "3432","1.641882","172.30.1.104","172.30.1.205","TCP","54","135 > 40972 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3433","1.641891","172.30.1.104","172.30.1.205","TCP","54","135 > 40972 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3434","1.641896","172.30.1.205","172.30.1.104","TCP","54","40972 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3435","1.641986","172.30.1.104","172.30.1.205","TCP","66","49671 > 33610 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3436","1.641994","172.30.1.205","172.30.1.104","TCP","54","33610 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3437","1.642334","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3438","1.642638","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3439","1.642645","172.30.1.205","172.30.1.104","TCP","54","33610 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3440","1.644482","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3441","1.644834","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3442","1.644841","172.30.1.205","172.30.1.104","TCP","54","33610 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3443","1.646173","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3444","1.647138","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3445","1.647147","172.30.1.205","172.30.1.104","TCP","54","33610 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3446","1.648067","172.30.1.205","172.30.1.104","TCP","74","40976 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904874 TSecr=0 WS=128" "3447","1.648358","172.30.1.104","172.30.1.205","TCP","66","135 > 40976 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3448","1.648369","172.30.1.205","172.30.1.104","TCP","54","40976 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3449","1.648716","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3450","1.648985","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3451","1.648994","172.30.1.205","172.30.1.104","TCP","54","40976 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3452","1.651147","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3453","1.651540","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3454","1.651546","172.30.1.205","172.30.1.104","TCP","54","40976 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3455","1.653361","172.30.1.205","172.30.1.104","TCP","54","40976 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3456","1.653471","172.30.1.205","172.30.1.104","TCP","74","33614 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904879 TSecr=0 WS=128" "3457","1.653627","172.30.1.104","172.30.1.205","TCP","54","135 > 40976 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3458","1.653635","172.30.1.104","172.30.1.205","TCP","54","135 > 40976 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3459","1.653640","172.30.1.205","172.30.1.104","TCP","54","40976 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3460","1.653736","172.30.1.104","172.30.1.205","TCP","66","49671 > 33614 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3461","1.653744","172.30.1.205","172.30.1.104","TCP","54","33614 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3462","1.654083","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3463","1.654359","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3464","1.654366","172.30.1.205","172.30.1.104","TCP","54","33614 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3465","1.656191","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3466","1.656530","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3467","1.656537","172.30.1.205","172.30.1.104","TCP","54","33614 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3468","1.657887","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3469","1.659914","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3470","1.659924","172.30.1.205","172.30.1.104","TCP","54","33614 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3471","1.660855","172.30.1.205","172.30.1.104","TCP","74","40980 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904887 TSecr=0 WS=128" "3472","1.661171","172.30.1.104","172.30.1.205","TCP","66","135 > 40980 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3473","1.661182","172.30.1.205","172.30.1.104","TCP","54","40980 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3474","1.661531","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3475","1.661825","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3476","1.661834","172.30.1.205","172.30.1.104","TCP","54","40980 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3477","1.664003","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3478","1.664390","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3479","1.664396","172.30.1.205","172.30.1.104","TCP","54","40980 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3480","1.666196","172.30.1.205","172.30.1.104","TCP","54","40980 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3481","1.666305","172.30.1.205","172.30.1.104","TCP","74","33618 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904892 TSecr=0 WS=128" "3482","1.666467","172.30.1.104","172.30.1.205","TCP","54","135 > 40980 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3483","1.666496","172.30.1.104","172.30.1.205","TCP","54","135 > 40980 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3484","1.666502","172.30.1.205","172.30.1.104","TCP","54","40980 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3485","1.666577","172.30.1.104","172.30.1.205","TCP","66","49671 > 33618 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3486","1.666585","172.30.1.205","172.30.1.104","TCP","54","33618 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3487","1.666927","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3488","1.667238","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3489","1.667247","172.30.1.205","172.30.1.104","TCP","54","33618 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3490","1.669122","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3491","1.669490","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3492","1.669497","172.30.1.205","172.30.1.104","TCP","54","33618 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3493","1.670832","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3494","1.671831","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3495","1.671840","172.30.1.205","172.30.1.104","TCP","54","33618 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3496","1.672755","172.30.1.205","172.30.1.104","TCP","74","40984 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904899 TSecr=0 WS=128" "3497","1.673027","172.30.1.104","172.30.1.205","TCP","66","135 > 40984 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3498","1.673038","172.30.1.205","172.30.1.104","TCP","54","40984 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3499","1.673381","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3500","1.673653","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3501","1.673661","172.30.1.205","172.30.1.104","TCP","54","40984 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3502","1.675815","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3503","1.676262","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3504","1.676268","172.30.1.205","172.30.1.104","TCP","54","40984 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3505","1.678075","172.30.1.205","172.30.1.104","TCP","54","40984 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3506","1.678182","172.30.1.205","172.30.1.104","TCP","74","33622 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904904 TSecr=0 WS=128" "3507","1.678325","172.30.1.104","172.30.1.205","TCP","54","135 > 40984 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3508","1.678348","172.30.1.104","172.30.1.205","TCP","54","135 > 40984 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3509","1.678354","172.30.1.205","172.30.1.104","TCP","54","40984 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3510","1.678462","172.30.1.104","172.30.1.205","TCP","66","49671 > 33622 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3511","1.678471","172.30.1.205","172.30.1.104","TCP","54","33622 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3512","1.678818","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3513","1.679099","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3514","1.679107","172.30.1.205","172.30.1.104","TCP","54","33622 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3515","1.680957","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3516","1.681318","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3517","1.681325","172.30.1.205","172.30.1.104","TCP","54","33622 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3518","1.682661","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3519","1.683737","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3520","1.683746","172.30.1.205","172.30.1.104","TCP","54","33622 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3521","1.684652","172.30.1.205","172.30.1.104","TCP","74","40988 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904911 TSecr=0 WS=128" "3522","1.684946","172.30.1.104","172.30.1.205","TCP","66","135 > 40988 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3523","1.684957","172.30.1.205","172.30.1.104","TCP","54","40988 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3524","1.685320","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3525","1.685595","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3526","1.685604","172.30.1.205","172.30.1.104","TCP","54","40988 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3527","1.687759","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3528","1.688151","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3529","1.688157","172.30.1.205","172.30.1.104","TCP","54","40988 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3530","1.689008","172.30.1.205","172.30.1.104","TCP","54","33582 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3531","1.689059","172.30.1.205","172.30.1.104","TCP","54","33586 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3532","1.689096","172.30.1.205","172.30.1.104","TCP","54","33590 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3533","1.689128","172.30.1.205","172.30.1.104","TCP","54","33594 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3534","1.689159","172.30.1.205","172.30.1.104","TCP","54","33598 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3535","1.689192","172.30.1.205","172.30.1.104","TCP","54","33602 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3536","1.689225","172.30.1.205","172.30.1.104","TCP","54","33606 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3537","1.689256","172.30.1.205","172.30.1.104","TCP","54","33610 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3538","1.689285","172.30.1.104","172.30.1.205","TCP","54","49671 > 33582 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3539","1.689307","172.30.1.205","172.30.1.104","TCP","54","33614 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3540","1.689347","172.30.1.205","172.30.1.104","TCP","54","33618 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3541","1.689374","172.30.1.205","172.30.1.104","TCP","54","33622 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3542","1.689419","172.30.1.104","172.30.1.205","TCP","54","49671 > 33586 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3543","1.689425","172.30.1.104","172.30.1.205","TCP","54","49671 > 33590 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3544","1.689428","172.30.1.104","172.30.1.205","TCP","54","49671 > 33582 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3545","1.689434","172.30.1.205","172.30.1.104","TCP","54","33582 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3546","1.689477","172.30.1.205","172.30.1.104","TCP","54","33578 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3547","1.689520","172.30.1.104","172.30.1.205","TCP","54","49671 > 33586 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3548","1.689525","172.30.1.205","172.30.1.104","TCP","54","33586 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3549","1.689531","172.30.1.104","172.30.1.205","TCP","54","49671 > 33594 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3550","1.689540","172.30.1.104","172.30.1.205","TCP","54","49671 > 33590 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3551","1.689543","172.30.1.205","172.30.1.104","TCP","54","33590 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3552","1.689544","172.30.1.104","172.30.1.205","TCP","54","49671 > 33594 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3553","1.689546","172.30.1.205","172.30.1.104","TCP","54","33594 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3554","1.689553","172.30.1.104","172.30.1.205","TCP","54","49671 > 33598 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3555","1.689574","172.30.1.104","172.30.1.205","TCP","54","49671 > 33602 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3556","1.689766","172.30.1.104","172.30.1.205","TCP","54","49671 > 33606 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3557","1.689832","172.30.1.104","172.30.1.205","TCP","54","49671 > 33610 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3558","1.689838","172.30.1.104","172.30.1.205","TCP","54","49671 > 33598 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3559","1.689842","172.30.1.205","172.30.1.104","TCP","54","33598 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3560","1.689848","172.30.1.104","172.30.1.205","TCP","54","49671 > 33610 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3561","1.689850","172.30.1.205","172.30.1.104","TCP","54","33610 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3562","1.689852","172.30.1.104","172.30.1.205","TCP","54","49671 > 33602 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3563","1.689853","172.30.1.205","172.30.1.104","TCP","54","33602 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3564","1.690019","172.30.1.104","172.30.1.205","TCP","54","49671 > 33606 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3565","1.690024","172.30.1.205","172.30.1.104","TCP","54","33606 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3566","1.690029","172.30.1.104","172.30.1.205","TCP","54","49671 > 33614 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3567","1.690034","172.30.1.104","172.30.1.205","TCP","54","49671 > 33618 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3568","1.690040","172.30.1.104","172.30.1.205","TCP","54","49671 > 33578 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3569","1.690043","172.30.1.104","172.30.1.205","TCP","54","49671 > 33622 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3570","1.690045","172.30.1.104","172.30.1.205","TCP","54","49671 > 33578 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3571","1.690047","172.30.1.205","172.30.1.104","TCP","54","33578 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3572","1.690048","172.30.1.104","172.30.1.205","TCP","54","49671 > 33614 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3573","1.690050","172.30.1.205","172.30.1.104","TCP","54","33614 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3574","1.690051","172.30.1.104","172.30.1.205","TCP","54","49671 > 33618 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3575","1.690053","172.30.1.205","172.30.1.104","TCP","54","33618 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3576","1.690054","172.30.1.104","172.30.1.205","TCP","54","49671 > 33622 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3577","1.690056","172.30.1.205","172.30.1.104","TCP","54","33622 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3578","1.690879","172.30.1.205","172.30.1.104","TCP","54","40988 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3579","1.690986","172.30.1.205","172.30.1.104","TCP","74","33626 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904917 TSecr=0 WS=128" "3580","1.691130","172.30.1.104","172.30.1.205","TCP","54","135 > 40988 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3581","1.691193","172.30.1.104","172.30.1.205","TCP","54","135 > 40988 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3582","1.691198","172.30.1.205","172.30.1.104","TCP","54","40988 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3583","1.691274","172.30.1.104","172.30.1.205","TCP","66","49671 > 33626 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3584","1.691282","172.30.1.205","172.30.1.104","TCP","54","33626 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3585","1.691630","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3586","1.691900","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3587","1.691908","172.30.1.205","172.30.1.104","TCP","54","33626 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3588","1.693860","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3589","1.694276","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3590","1.694283","172.30.1.205","172.30.1.104","TCP","54","33626 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3591","1.695636","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3592","1.696580","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3593","1.696591","172.30.1.205","172.30.1.104","TCP","54","33626 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3594","1.697556","172.30.1.205","172.30.1.104","TCP","74","40992 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904923 TSecr=0 WS=128" "3595","1.697829","172.30.1.104","172.30.1.205","TCP","66","135 > 40992 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3596","1.697839","172.30.1.205","172.30.1.104","TCP","54","40992 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3597","1.698182","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3598","1.698446","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3599","1.698456","172.30.1.205","172.30.1.104","TCP","54","40992 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3600","1.700597","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3601","1.700959","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3602","1.700966","172.30.1.205","172.30.1.104","TCP","54","40992 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3603","1.702771","172.30.1.205","172.30.1.104","TCP","54","40992 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3604","1.702879","172.30.1.205","172.30.1.104","TCP","74","33630 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904929 TSecr=0 WS=128" "3605","1.703082","172.30.1.104","172.30.1.205","TCP","54","135 > 40992 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3606","1.703090","172.30.1.104","172.30.1.205","TCP","54","135 > 40992 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3607","1.703095","172.30.1.205","172.30.1.104","TCP","54","40992 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3608","1.703170","172.30.1.104","172.30.1.205","TCP","66","49671 > 33630 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3609","1.703178","172.30.1.205","172.30.1.104","TCP","54","33630 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3610","1.703516","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3611","1.703796","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3612","1.703805","172.30.1.205","172.30.1.104","TCP","54","33630 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3613","1.705686","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3614","1.706054","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3615","1.706060","172.30.1.205","172.30.1.104","TCP","54","33630 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3616","1.707385","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3617","1.709252","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3618","1.709261","172.30.1.205","172.30.1.104","TCP","54","33630 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3619","1.710185","172.30.1.205","172.30.1.104","TCP","74","40996 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904936 TSecr=0 WS=128" "3620","1.710515","172.30.1.104","172.30.1.205","TCP","66","135 > 40996 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3621","1.710525","172.30.1.205","172.30.1.104","TCP","54","40996 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3622","1.710868","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3623","1.711196","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3624","1.711204","172.30.1.205","172.30.1.104","TCP","54","40996 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3625","1.713384","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3626","1.713782","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3627","1.713788","172.30.1.205","172.30.1.104","TCP","54","40996 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3628","1.715572","172.30.1.205","172.30.1.104","TCP","54","40996 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3629","1.715681","172.30.1.205","172.30.1.104","TCP","74","33634 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904942 TSecr=0 WS=128" "3630","1.715832","172.30.1.104","172.30.1.205","TCP","54","135 > 40996 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3631","1.715856","172.30.1.104","172.30.1.205","TCP","54","135 > 40996 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3632","1.715861","172.30.1.205","172.30.1.104","TCP","54","40996 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3633","1.715969","172.30.1.104","172.30.1.205","TCP","66","49671 > 33634 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3634","1.715977","172.30.1.205","172.30.1.104","TCP","54","33634 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3635","1.716316","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3636","1.716609","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3637","1.716617","172.30.1.205","172.30.1.104","TCP","54","33634 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3638","1.718500","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3639","1.718861","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3640","1.718867","172.30.1.205","172.30.1.104","TCP","54","33634 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3641","1.720217","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3642","1.721171","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3643","1.721180","172.30.1.205","172.30.1.104","TCP","54","33634 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3644","1.722107","172.30.1.205","172.30.1.104","TCP","74","41000 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904948 TSecr=0 WS=128" "3645","1.722394","172.30.1.104","172.30.1.205","TCP","66","135 > 41000 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3646","1.722405","172.30.1.205","172.30.1.104","TCP","54","41000 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3647","1.722745","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3648","1.723030","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3649","1.723038","172.30.1.205","172.30.1.104","TCP","54","41000 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3650","1.725211","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3651","1.725598","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3652","1.725604","172.30.1.205","172.30.1.104","TCP","54","41000 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3653","1.727375","172.30.1.205","172.30.1.104","TCP","54","41000 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3654","1.727482","172.30.1.205","172.30.1.104","TCP","74","33638 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904953 TSecr=0 WS=128" "3655","1.727654","172.30.1.104","172.30.1.205","TCP","54","135 > 41000 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3656","1.727690","172.30.1.104","172.30.1.205","TCP","54","135 > 41000 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3657","1.727695","172.30.1.205","172.30.1.104","TCP","54","41000 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3658","1.727783","172.30.1.104","172.30.1.205","TCP","66","49671 > 33638 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3659","1.727792","172.30.1.205","172.30.1.104","TCP","54","33638 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3660","1.728131","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3661","1.728418","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3662","1.728426","172.30.1.205","172.30.1.104","TCP","54","33638 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3663","1.730302","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3664","1.730676","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3665","1.730682","172.30.1.205","172.30.1.104","TCP","54","33638 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3666","1.732012","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3667","1.732985","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3668","1.732994","172.30.1.205","172.30.1.104","TCP","54","33638 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3669","1.733921","172.30.1.205","172.30.1.104","TCP","74","41004 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904960 TSecr=0 WS=128" "3670","1.734198","172.30.1.104","172.30.1.205","TCP","66","135 > 41004 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3671","1.734209","172.30.1.205","172.30.1.104","TCP","54","41004 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3672","1.734556","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3673","1.734847","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3674","1.734856","172.30.1.205","172.30.1.104","TCP","54","41004 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3675","1.737038","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3676","1.737420","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3677","1.737427","172.30.1.205","172.30.1.104","TCP","54","41004 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3678","1.739216","172.30.1.205","172.30.1.104","TCP","54","41004 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3679","1.739326","172.30.1.205","172.30.1.104","TCP","74","33642 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904965 TSecr=0 WS=128" "3680","1.739493","172.30.1.104","172.30.1.205","TCP","54","135 > 41004 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3681","1.739525","172.30.1.104","172.30.1.205","TCP","54","135 > 41004 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3682","1.739530","172.30.1.205","172.30.1.104","TCP","54","41004 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3683","1.739645","172.30.1.104","172.30.1.205","TCP","66","49671 > 33642 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3684","1.739653","172.30.1.205","172.30.1.104","TCP","54","33642 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3685","1.739990","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3686","1.740881","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3687","1.740890","172.30.1.205","172.30.1.104","TCP","54","33642 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3688","1.742757","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3689","1.743121","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3690","1.743133","172.30.1.205","172.30.1.104","TCP","54","33642 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3691","1.744650","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3692","1.745605","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3693","1.745615","172.30.1.205","172.30.1.104","TCP","54","33642 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3694","1.746545","172.30.1.205","172.30.1.104","TCP","74","41008 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904972 TSecr=0 WS=128" "3695","1.746835","172.30.1.104","172.30.1.205","TCP","66","135 > 41008 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3696","1.746845","172.30.1.205","172.30.1.104","TCP","54","41008 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3697","1.747188","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3698","1.747481","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3699","1.747490","172.30.1.205","172.30.1.104","TCP","54","41008 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3700","1.749674","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3701","1.750048","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3702","1.750055","172.30.1.205","172.30.1.104","TCP","54","41008 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3703","1.751846","172.30.1.205","172.30.1.104","TCP","54","41008 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3704","1.751953","172.30.1.205","172.30.1.104","TCP","74","33646 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904978 TSecr=0 WS=128" "3705","1.752114","172.30.1.104","172.30.1.205","TCP","54","135 > 41008 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3706","1.752197","172.30.1.104","172.30.1.205","TCP","54","135 > 41008 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3707","1.752204","172.30.1.205","172.30.1.104","TCP","54","41008 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3708","1.752263","172.30.1.104","172.30.1.205","TCP","66","49671 > 33646 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3709","1.752272","172.30.1.205","172.30.1.104","TCP","54","33646 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3710","1.752622","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3711","1.752918","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3712","1.752927","172.30.1.205","172.30.1.104","TCP","54","33646 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3713","1.754777","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3714","1.755139","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3715","1.755143","172.30.1.205","172.30.1.104","TCP","54","33646 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3716","1.756468","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3717","1.757441","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3718","1.757450","172.30.1.205","172.30.1.104","TCP","54","33646 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3719","1.758379","172.30.1.205","172.30.1.104","TCP","74","41012 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904984 TSecr=0 WS=128" "3720","1.758675","172.30.1.104","172.30.1.205","TCP","66","135 > 41012 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3721","1.758686","172.30.1.205","172.30.1.104","TCP","54","41012 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3722","1.759030","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3723","1.759298","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3724","1.759307","172.30.1.205","172.30.1.104","TCP","54","41012 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3725","1.761514","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3726","1.761871","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3727","1.761878","172.30.1.205","172.30.1.104","TCP","54","41012 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3728","1.763667","172.30.1.205","172.30.1.104","TCP","54","41012 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3729","1.763780","172.30.1.205","172.30.1.104","TCP","74","33650 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904990 TSecr=0 WS=128" "3730","1.763947","172.30.1.104","172.30.1.205","TCP","54","135 > 41012 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3731","1.763955","172.30.1.104","172.30.1.205","TCP","54","135 > 41012 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3732","1.763960","172.30.1.205","172.30.1.104","TCP","54","41012 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3733","1.764034","172.30.1.104","172.30.1.205","TCP","66","49671 > 33650 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3734","1.764042","172.30.1.205","172.30.1.104","TCP","54","33650 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3735","1.764382","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3736","1.764684","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3737","1.764693","172.30.1.205","172.30.1.104","TCP","54","33650 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3738","1.766574","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3739","1.766924","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3740","1.766928","172.30.1.205","172.30.1.104","TCP","54","33650 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3741","1.768263","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3742","1.771145","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3743","1.771155","172.30.1.205","172.30.1.104","TCP","54","33650 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3744","1.772089","172.30.1.205","172.30.1.104","TCP","74","41016 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499904998 TSecr=0 WS=128" "3745","1.772366","172.30.1.104","172.30.1.205","TCP","66","135 > 41016 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3746","1.772377","172.30.1.205","172.30.1.104","TCP","54","41016 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3747","1.772724","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3748","1.773001","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3749","1.773010","172.30.1.205","172.30.1.104","TCP","54","41016 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3750","1.775180","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3751","1.775617","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3752","1.775629","172.30.1.205","172.30.1.104","TCP","54","41016 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3753","1.777642","172.30.1.205","172.30.1.104","TCP","54","41016 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3754","1.777749","172.30.1.205","172.30.1.104","TCP","74","33654 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905004 TSecr=0 WS=128" "3755","1.777906","172.30.1.104","172.30.1.205","TCP","54","135 > 41016 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3756","1.777945","172.30.1.104","172.30.1.205","TCP","54","135 > 41016 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3757","1.777950","172.30.1.205","172.30.1.104","TCP","54","41016 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3758","1.778092","172.30.1.104","172.30.1.205","TCP","66","49671 > 33654 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3759","1.778101","172.30.1.205","172.30.1.104","TCP","54","33654 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3760","1.778448","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3761","1.778750","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3762","1.778756","172.30.1.205","172.30.1.104","TCP","54","33654 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3763","1.780598","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3764","1.781049","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3765","1.781056","172.30.1.205","172.30.1.104","TCP","54","33654 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3766","1.782405","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3767","1.783510","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3768","1.783521","172.30.1.205","172.30.1.104","TCP","54","33654 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3769","1.784463","172.30.1.205","172.30.1.104","TCP","74","41020 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905010 TSecr=0 WS=128" "3770","1.784784","172.30.1.104","172.30.1.205","TCP","66","135 > 41020 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3771","1.784794","172.30.1.205","172.30.1.104","TCP","54","41020 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3772","1.785148","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3773","1.785427","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3774","1.785437","172.30.1.205","172.30.1.104","TCP","54","41020 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3775","1.787572","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3776","1.787974","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3777","1.787980","172.30.1.205","172.30.1.104","TCP","54","41020 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3778","1.789786","172.30.1.205","172.30.1.104","TCP","54","41020 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3779","1.789893","172.30.1.205","172.30.1.104","TCP","74","33658 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905016 TSecr=0 WS=128" "3780","1.790062","172.30.1.104","172.30.1.205","TCP","54","135 > 41020 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3781","1.790089","172.30.1.104","172.30.1.205","TCP","54","135 > 41020 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3782","1.790094","172.30.1.205","172.30.1.104","TCP","54","41020 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3783","1.790170","172.30.1.104","172.30.1.205","TCP","66","49671 > 33658 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3784","1.790178","172.30.1.205","172.30.1.104","TCP","54","33658 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3785","1.790521","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3786","1.790801","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3787","1.790809","172.30.1.205","172.30.1.104","TCP","54","33658 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3788","1.792653","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3789","1.793016","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3790","1.793022","172.30.1.205","172.30.1.104","TCP","54","33658 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3791","1.794356","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3792","1.795351","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3793","1.795360","172.30.1.205","172.30.1.104","TCP","54","33658 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3794","1.796272","172.30.1.205","172.30.1.104","TCP","74","41024 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905022 TSecr=0 WS=128" "3795","1.796569","172.30.1.104","172.30.1.205","TCP","66","135 > 41024 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3796","1.796579","172.30.1.205","172.30.1.104","TCP","54","41024 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3797","1.796950","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3798","1.797264","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3799","1.797273","172.30.1.205","172.30.1.104","TCP","54","41024 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3800","1.799423","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3801","1.799781","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3802","1.799787","172.30.1.205","172.30.1.104","TCP","54","41024 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3803","1.801592","172.30.1.205","172.30.1.104","TCP","54","41024 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3804","1.801700","172.30.1.205","172.30.1.104","TCP","74","33662 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905028 TSecr=0 WS=128" "3805","1.801845","172.30.1.104","172.30.1.205","TCP","54","135 > 41024 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3806","1.801882","172.30.1.104","172.30.1.205","TCP","54","135 > 41024 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3807","1.801887","172.30.1.205","172.30.1.104","TCP","54","41024 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3808","1.801979","172.30.1.104","172.30.1.205","TCP","66","49671 > 33662 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3809","1.801987","172.30.1.205","172.30.1.104","TCP","54","33662 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3810","1.802321","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3811","1.802606","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3812","1.802614","172.30.1.205","172.30.1.104","TCP","54","33662 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3813","1.804460","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3814","1.804852","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3815","1.804859","172.30.1.205","172.30.1.104","TCP","54","33662 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3816","1.806211","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3817","1.807775","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3818","1.807784","172.30.1.205","172.30.1.104","TCP","54","33662 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3819","1.808692","172.30.1.205","172.30.1.104","TCP","74","41028 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905035 TSecr=0 WS=128" "3820","1.809040","172.30.1.104","172.30.1.205","TCP","66","135 > 41028 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3821","1.809050","172.30.1.205","172.30.1.104","TCP","54","41028 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3822","1.809403","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3823","1.809694","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3824","1.809703","172.30.1.205","172.30.1.104","TCP","54","41028 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3825","1.811864","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3826","1.812273","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3827","1.812279","172.30.1.205","172.30.1.104","TCP","54","41028 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3828","1.814078","172.30.1.205","172.30.1.104","TCP","54","41028 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3829","1.814185","172.30.1.205","172.30.1.104","TCP","74","33666 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905040 TSecr=0 WS=128" "3830","1.814350","172.30.1.104","172.30.1.205","TCP","54","135 > 41028 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3831","1.814399","172.30.1.104","172.30.1.205","TCP","54","135 > 41028 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3832","1.814408","172.30.1.205","172.30.1.104","TCP","54","41028 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3833","1.814463","172.30.1.104","172.30.1.205","TCP","66","49671 > 33666 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3834","1.814474","172.30.1.205","172.30.1.104","TCP","54","33666 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3835","1.814874","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3836","1.815165","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3837","1.815174","172.30.1.205","172.30.1.104","TCP","54","33666 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3838","1.817095","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3839","1.817444","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3840","1.817451","172.30.1.205","172.30.1.104","TCP","54","33666 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3841","1.818792","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3842","1.819754","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3843","1.819765","172.30.1.205","172.30.1.104","TCP","54","33666 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3844","1.820710","172.30.1.205","172.30.1.104","TCP","74","41032 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905047 TSecr=0 WS=128" "3845","1.820995","172.30.1.104","172.30.1.205","TCP","66","135 > 41032 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3846","1.821006","172.30.1.205","172.30.1.104","TCP","54","41032 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3847","1.821372","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3848","1.821653","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3849","1.821661","172.30.1.205","172.30.1.104","TCP","54","41032 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3850","1.823825","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3851","1.824225","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3852","1.824237","172.30.1.205","172.30.1.104","TCP","54","41032 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3853","1.826222","172.30.1.205","172.30.1.104","TCP","54","41032 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3854","1.826332","172.30.1.205","172.30.1.104","TCP","74","33670 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905052 TSecr=0 WS=128" "3855","1.826482","172.30.1.104","172.30.1.205","TCP","54","135 > 41032 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3856","1.826497","172.30.1.104","172.30.1.205","TCP","54","135 > 41032 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3857","1.826503","172.30.1.205","172.30.1.104","TCP","54","41032 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3858","1.826607","172.30.1.104","172.30.1.205","TCP","66","49671 > 33670 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3859","1.826615","172.30.1.205","172.30.1.104","TCP","54","33670 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3860","1.826972","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3861","1.827273","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3862","1.827282","172.30.1.205","172.30.1.104","TCP","54","33670 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3863","1.829168","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3864","1.829536","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3865","1.829542","172.30.1.205","172.30.1.104","TCP","54","33670 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3866","1.830877","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3867","1.831829","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3868","1.831841","172.30.1.205","172.30.1.104","TCP","54","33670 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3869","1.832815","172.30.1.205","172.30.1.104","TCP","74","41036 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905059 TSecr=0 WS=128" "3870","1.833123","172.30.1.104","172.30.1.205","TCP","66","135 > 41036 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3871","1.833134","172.30.1.205","172.30.1.104","TCP","54","41036 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3872","1.833482","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3873","1.833766","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3874","1.833775","172.30.1.205","172.30.1.104","TCP","54","41036 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3875","1.835974","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3876","1.836375","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3877","1.836381","172.30.1.205","172.30.1.104","TCP","54","41036 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3878","1.837257","172.30.1.205","172.30.1.104","TCP","54","33630 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3879","1.837307","172.30.1.205","172.30.1.104","TCP","54","33634 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3880","1.837345","172.30.1.205","172.30.1.104","TCP","54","33638 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3881","1.837378","172.30.1.205","172.30.1.104","TCP","54","33642 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3882","1.837406","172.30.1.205","172.30.1.104","TCP","54","33646 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3883","1.837437","172.30.1.205","172.30.1.104","TCP","54","33650 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3884","1.837466","172.30.1.205","172.30.1.104","TCP","54","33654 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3885","1.837488","172.30.1.205","172.30.1.104","TCP","54","33658 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3886","1.837505","172.30.1.104","172.30.1.205","TCP","54","49671 > 33630 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3887","1.837542","172.30.1.205","172.30.1.104","TCP","54","33662 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3888","1.837576","172.30.1.205","172.30.1.104","TCP","54","33666 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3889","1.837602","172.30.1.205","172.30.1.104","TCP","54","33670 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3890","1.837643","172.30.1.104","172.30.1.205","TCP","54","49671 > 33634 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3891","1.837659","172.30.1.104","172.30.1.205","TCP","54","49671 > 33630 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3892","1.837667","172.30.1.205","172.30.1.104","TCP","54","33630 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3893","1.837682","172.30.1.104","172.30.1.205","TCP","54","49671 > 33634 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3894","1.837686","172.30.1.205","172.30.1.104","TCP","54","33634 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3895","1.837703","172.30.1.104","172.30.1.205","TCP","54","49671 > 33638 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3896","1.837723","172.30.1.104","172.30.1.205","TCP","54","49671 > 33642 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3897","1.837738","172.30.1.205","172.30.1.104","TCP","54","33626 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "3898","1.837813","172.30.1.104","172.30.1.205","TCP","54","49671 > 33646 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3899","1.837832","172.30.1.104","172.30.1.205","TCP","54","49671 > 33650 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3900","1.837853","172.30.1.104","172.30.1.205","TCP","54","49671 > 33650 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3901","1.837858","172.30.1.205","172.30.1.104","TCP","54","33650 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3902","1.837873","172.30.1.104","172.30.1.205","TCP","54","49671 > 33638 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3903","1.837876","172.30.1.205","172.30.1.104","TCP","54","33638 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3904","1.837892","172.30.1.104","172.30.1.205","TCP","54","49671 > 33642 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3905","1.837895","172.30.1.205","172.30.1.104","TCP","54","33642 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3906","1.837913","172.30.1.104","172.30.1.205","TCP","54","49671 > 33646 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3907","1.837916","172.30.1.205","172.30.1.104","TCP","54","33646 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3908","1.837934","172.30.1.104","172.30.1.205","TCP","54","49671 > 33658 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3909","1.837955","172.30.1.104","172.30.1.205","TCP","54","49671 > 33654 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3910","1.838087","172.30.1.104","172.30.1.205","TCP","54","49671 > 33662 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3911","1.838107","172.30.1.104","172.30.1.205","TCP","54","49671 > 33666 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3912","1.838127","172.30.1.104","172.30.1.205","TCP","54","49671 > 33654 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3913","1.838132","172.30.1.205","172.30.1.104","TCP","54","33654 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3914","1.838148","172.30.1.104","172.30.1.205","TCP","54","49671 > 33666 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3915","1.838151","172.30.1.205","172.30.1.104","TCP","54","33666 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3916","1.838169","172.30.1.104","172.30.1.205","TCP","54","49671 > 33658 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3917","1.838172","172.30.1.205","172.30.1.104","TCP","54","33658 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3918","1.838190","172.30.1.104","172.30.1.205","TCP","54","49671 > 33662 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3919","1.838193","172.30.1.205","172.30.1.104","TCP","54","33662 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3920","1.838210","172.30.1.104","172.30.1.205","TCP","54","49671 > 33670 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3921","1.838317","172.30.1.104","172.30.1.205","TCP","54","49671 > 33670 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3922","1.838322","172.30.1.205","172.30.1.104","TCP","54","33670 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3923","1.838338","172.30.1.104","172.30.1.205","TCP","54","49671 > 33626 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3924","1.838361","172.30.1.104","172.30.1.205","TCP","54","49671 > 33626 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "3925","1.838363","172.30.1.205","172.30.1.104","TCP","54","33626 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "3926","1.839236","172.30.1.205","172.30.1.104","TCP","54","41036 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3927","1.839367","172.30.1.205","172.30.1.104","TCP","74","33674 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905065 TSecr=0 WS=128" "3928","1.839506","172.30.1.104","172.30.1.205","TCP","54","135 > 41036 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3929","1.839640","172.30.1.104","172.30.1.205","TCP","66","49671 > 33674 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3930","1.839649","172.30.1.205","172.30.1.104","TCP","54","33674 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3931","1.839665","172.30.1.104","172.30.1.205","TCP","54","135 > 41036 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3932","1.839670","172.30.1.205","172.30.1.104","TCP","54","41036 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3933","1.840020","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3934","1.840306","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3935","1.840315","172.30.1.205","172.30.1.104","TCP","54","33674 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3936","1.842216","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3937","1.842572","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3938","1.842578","172.30.1.205","172.30.1.104","TCP","54","33674 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3939","1.843931","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3940","1.844893","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3941","1.844903","172.30.1.205","172.30.1.104","TCP","54","33674 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3942","1.845870","172.30.1.205","172.30.1.104","TCP","74","41040 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905072 TSecr=0 WS=128" "3943","1.846150","172.30.1.104","172.30.1.205","TCP","66","135 > 41040 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3944","1.846163","172.30.1.205","172.30.1.104","TCP","54","41040 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3945","1.846523","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3946","1.846783","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3947","1.846792","172.30.1.205","172.30.1.104","TCP","54","41040 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3948","1.848997","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3949","1.849380","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3950","1.849387","172.30.1.205","172.30.1.104","TCP","54","41040 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3951","1.851202","172.30.1.205","172.30.1.104","TCP","54","41040 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3952","1.851320","172.30.1.205","172.30.1.104","TCP","74","33678 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905077 TSecr=0 WS=128" "3953","1.851467","172.30.1.104","172.30.1.205","TCP","54","135 > 41040 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3954","1.851499","172.30.1.104","172.30.1.205","TCP","54","135 > 41040 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3955","1.851505","172.30.1.205","172.30.1.104","TCP","54","41040 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3956","1.851631","172.30.1.104","172.30.1.205","TCP","66","49671 > 33678 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3957","1.851639","172.30.1.205","172.30.1.104","TCP","54","33678 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3958","1.851987","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3959","1.853885","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3960","1.853896","172.30.1.205","172.30.1.104","TCP","54","33678 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3961","1.855767","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3962","1.856132","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3963","1.856138","172.30.1.205","172.30.1.104","TCP","54","33678 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3964","1.857510","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3965","1.860168","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3966","1.860180","172.30.1.205","172.30.1.104","TCP","54","33678 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3967","1.861153","172.30.1.205","172.30.1.104","TCP","74","41044 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905087 TSecr=0 WS=128" "3968","1.861428","172.30.1.104","172.30.1.205","TCP","66","135 > 41044 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3969","1.861439","172.30.1.205","172.30.1.104","TCP","54","41044 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3970","1.861788","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3971","1.862078","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3972","1.862087","172.30.1.205","172.30.1.104","TCP","54","41044 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3973","1.864257","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3974","1.864668","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "3975","1.864675","172.30.1.205","172.30.1.104","TCP","54","41044 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "3976","1.866490","172.30.1.205","172.30.1.104","TCP","54","41044 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "3977","1.866605","172.30.1.205","172.30.1.104","TCP","74","33682 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905093 TSecr=0 WS=128" "3978","1.866835","172.30.1.104","172.30.1.205","TCP","54","135 > 41044 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3979","1.866879","172.30.1.104","172.30.1.205","TCP","54","135 > 41044 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "3980","1.866884","172.30.1.205","172.30.1.104","TCP","54","41044 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "3981","1.866972","172.30.1.104","172.30.1.205","TCP","66","49671 > 33682 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3982","1.866984","172.30.1.205","172.30.1.104","TCP","54","33682 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3983","1.867324","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "3984","1.868863","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3985","1.868872","172.30.1.205","172.30.1.104","TCP","54","33682 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3986","1.870736","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "3987","1.871078","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "3988","1.871085","172.30.1.205","172.30.1.104","TCP","54","33682 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "3989","1.872422","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "3990","1.873366","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "3991","1.873376","172.30.1.205","172.30.1.104","TCP","54","33682 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "3992","1.874324","172.30.1.205","172.30.1.104","TCP","74","41048 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905100 TSecr=0 WS=128" "3993","1.874600","172.30.1.104","172.30.1.205","TCP","66","135 > 41048 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "3994","1.874610","172.30.1.205","172.30.1.104","TCP","54","41048 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "3995","1.874959","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "3996","1.875239","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "3997","1.875248","172.30.1.205","172.30.1.104","TCP","54","41048 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "3998","1.877461","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "3999","1.877824","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4000","1.877830","172.30.1.205","172.30.1.104","TCP","54","41048 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4001","1.879623","172.30.1.205","172.30.1.104","TCP","54","41048 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4002","1.879738","172.30.1.205","172.30.1.104","TCP","74","33686 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905106 TSecr=0 WS=128" "4003","1.879873","172.30.1.104","172.30.1.205","TCP","54","135 > 41048 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4004","1.879887","172.30.1.104","172.30.1.205","TCP","54","135 > 41048 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4005","1.879893","172.30.1.205","172.30.1.104","TCP","54","41048 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4006","1.880053","172.30.1.104","172.30.1.205","TCP","66","49671 > 33686 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4007","1.880062","172.30.1.205","172.30.1.104","TCP","54","33686 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4008","1.880402","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4009","1.880681","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4010","1.880690","172.30.1.205","172.30.1.104","TCP","54","33686 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4011","1.882580","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4012","1.882933","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4013","1.882939","172.30.1.205","172.30.1.104","TCP","54","33686 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4014","1.884270","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4015","1.885227","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4016","1.885237","172.30.1.205","172.30.1.104","TCP","54","33686 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4017","1.886172","172.30.1.205","172.30.1.104","TCP","74","41052 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905112 TSecr=0 WS=128" "4018","1.886517","172.30.1.104","172.30.1.205","TCP","66","135 > 41052 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4019","1.886528","172.30.1.205","172.30.1.104","TCP","54","41052 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4020","1.886871","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4021","1.887153","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4022","1.887163","172.30.1.205","172.30.1.104","TCP","54","41052 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4023","1.889356","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4024","1.889708","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4025","1.889715","172.30.1.205","172.30.1.104","TCP","54","41052 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4026","1.891500","172.30.1.205","172.30.1.104","TCP","54","41052 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4027","1.891610","172.30.1.205","172.30.1.104","TCP","74","33690 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905118 TSecr=0 WS=128" "4028","1.891746","172.30.1.104","172.30.1.205","TCP","54","135 > 41052 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4029","1.891844","172.30.1.104","172.30.1.205","TCP","54","135 > 41052 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4030","1.891850","172.30.1.205","172.30.1.104","TCP","54","41052 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4031","1.891872","172.30.1.104","172.30.1.205","TCP","66","49671 > 33690 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4032","1.891880","172.30.1.205","172.30.1.104","TCP","54","33690 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4033","1.892218","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4034","1.892498","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4035","1.892506","172.30.1.205","172.30.1.104","TCP","54","33690 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4036","1.894393","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4037","1.894766","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4038","1.894776","172.30.1.205","172.30.1.104","TCP","54","33690 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4039","1.896188","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4040","1.897180","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4041","1.897191","172.30.1.205","172.30.1.104","TCP","54","33690 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4042","1.898151","172.30.1.205","172.30.1.104","TCP","74","41056 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905124 TSecr=0 WS=128" "4043","1.898468","172.30.1.104","172.30.1.205","TCP","66","135 > 41056 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4044","1.898480","172.30.1.205","172.30.1.104","TCP","54","41056 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4045","1.898826","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4046","1.899143","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4047","1.899154","172.30.1.205","172.30.1.104","TCP","54","41056 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4048","1.901377","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4049","1.901797","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4050","1.901804","172.30.1.205","172.30.1.104","TCP","54","41056 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4051","1.903622","172.30.1.205","172.30.1.104","TCP","54","41056 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4052","1.903741","172.30.1.205","172.30.1.104","TCP","74","33694 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905130 TSecr=0 WS=128" "4053","1.903938","172.30.1.104","172.30.1.205","TCP","54","135 > 41056 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4054","1.903983","172.30.1.104","172.30.1.205","TCP","54","135 > 41056 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4055","1.903989","172.30.1.205","172.30.1.104","TCP","54","41056 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4056","1.904102","172.30.1.104","172.30.1.205","TCP","66","49671 > 33694 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4057","1.904111","172.30.1.205","172.30.1.104","TCP","54","33694 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4058","1.904470","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4059","1.906274","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4060","1.906284","172.30.1.205","172.30.1.104","TCP","54","33694 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4061","1.908138","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4062","1.908540","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4063","1.908549","172.30.1.205","172.30.1.104","TCP","54","33694 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4064","1.909992","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4065","1.910994","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4066","1.911004","172.30.1.205","172.30.1.104","TCP","54","33694 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4067","1.911954","172.30.1.205","172.30.1.104","TCP","74","41060 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905138 TSecr=0 WS=128" "4068","1.912296","172.30.1.104","172.30.1.205","TCP","66","135 > 41060 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4069","1.912307","172.30.1.205","172.30.1.104","TCP","54","41060 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4070","1.912652","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4071","1.912948","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4072","1.912957","172.30.1.205","172.30.1.104","TCP","54","41060 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4073","1.915169","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4074","1.915569","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4075","1.915576","172.30.1.205","172.30.1.104","TCP","54","41060 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4076","1.917399","172.30.1.205","172.30.1.104","TCP","54","41060 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4077","1.917512","172.30.1.205","172.30.1.104","TCP","74","33698 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905143 TSecr=0 WS=128" "4078","1.917728","172.30.1.104","172.30.1.205","TCP","54","135 > 41060 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4079","1.917778","172.30.1.104","172.30.1.205","TCP","66","49671 > 33698 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4080","1.917788","172.30.1.205","172.30.1.104","TCP","54","33698 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4081","1.917806","172.30.1.104","172.30.1.205","TCP","54","135 > 41060 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4082","1.917811","172.30.1.205","172.30.1.104","TCP","54","41060 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4083","1.918145","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4084","1.918462","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4085","1.918471","172.30.1.205","172.30.1.104","TCP","54","33698 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4086","1.920342","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4087","1.920715","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4088","1.920721","172.30.1.205","172.30.1.104","TCP","54","33698 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4089","1.922087","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4090","1.923075","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4091","1.923085","172.30.1.205","172.30.1.104","TCP","54","33698 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4092","1.924020","172.30.1.205","172.30.1.104","TCP","74","41064 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905150 TSecr=0 WS=128" "4093","1.924329","172.30.1.104","172.30.1.205","TCP","66","135 > 41064 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4094","1.924340","172.30.1.205","172.30.1.104","TCP","54","41064 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4095","1.924688","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4096","1.924991","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4097","1.925001","172.30.1.205","172.30.1.104","TCP","54","41064 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4098","1.927178","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4099","1.927578","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4100","1.927585","172.30.1.205","172.30.1.104","TCP","54","41064 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4101","1.929411","172.30.1.205","172.30.1.104","TCP","54","41064 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4102","1.929521","172.30.1.205","172.30.1.104","TCP","74","33702 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905155 TSecr=0 WS=128" "4103","1.929848","172.30.1.104","172.30.1.205","TCP","66","49671 > 33702 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4104","1.929859","172.30.1.205","172.30.1.104","TCP","54","33702 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4105","1.929871","172.30.1.104","172.30.1.205","TCP","54","135 > 41064 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4106","1.929902","172.30.1.104","172.30.1.205","TCP","54","135 > 41064 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4107","1.929908","172.30.1.205","172.30.1.104","TCP","54","41064 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4108","1.930232","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4109","1.931492","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4110","1.931510","172.30.1.205","172.30.1.104","TCP","54","33702 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4111","1.933418","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4112","1.933901","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4113","1.933913","172.30.1.205","172.30.1.104","TCP","54","33702 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4114","1.935499","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4115","1.936477","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4116","1.936486","172.30.1.205","172.30.1.104","TCP","54","33702 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4117","1.937439","172.30.1.205","172.30.1.104","TCP","74","41068 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905163 TSecr=0 WS=128" "4118","1.937789","172.30.1.104","172.30.1.205","TCP","66","135 > 41068 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4119","1.937800","172.30.1.205","172.30.1.104","TCP","54","41068 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4120","1.938145","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4121","1.938460","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4122","1.938469","172.30.1.205","172.30.1.104","TCP","54","41068 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4123","1.940621","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4124","1.941052","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4125","1.941059","172.30.1.205","172.30.1.104","TCP","54","41068 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4126","1.942861","172.30.1.205","172.30.1.104","TCP","54","41068 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4127","1.942972","172.30.1.205","172.30.1.104","TCP","74","33706 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905169 TSecr=0 WS=128" "4128","1.943148","172.30.1.104","172.30.1.205","TCP","54","135 > 41068 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4129","1.943186","172.30.1.104","172.30.1.205","TCP","54","135 > 41068 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4130","1.943192","172.30.1.205","172.30.1.104","TCP","54","41068 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4131","1.943303","172.30.1.104","172.30.1.205","TCP","66","49671 > 33706 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4132","1.943311","172.30.1.205","172.30.1.104","TCP","54","33706 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4133","1.943655","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4134","1.943995","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4135","1.944004","172.30.1.205","172.30.1.104","TCP","54","33706 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4136","1.945888","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4137","1.946297","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4138","1.946303","172.30.1.205","172.30.1.104","TCP","54","33706 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4139","1.947618","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4140","1.948654","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4141","1.948663","172.30.1.205","172.30.1.104","TCP","54","33706 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4142","1.949609","172.30.1.205","172.30.1.104","TCP","74","41072 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905176 TSecr=0 WS=128" "4143","1.949961","172.30.1.104","172.30.1.205","TCP","66","135 > 41072 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4144","1.949972","172.30.1.205","172.30.1.104","TCP","54","41072 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4145","1.950320","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4146","1.950642","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4147","1.950651","172.30.1.205","172.30.1.104","TCP","54","41072 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4148","1.952826","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4149","1.953278","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4150","1.953285","172.30.1.205","172.30.1.104","TCP","54","41072 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4151","1.955070","172.30.1.205","172.30.1.104","TCP","54","41072 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4152","1.955178","172.30.1.205","172.30.1.104","TCP","74","33710 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905181 TSecr=0 WS=128" "4153","1.955392","172.30.1.104","172.30.1.205","TCP","54","135 > 41072 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4154","1.955434","172.30.1.104","172.30.1.205","TCP","54","135 > 41072 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4155","1.955443","172.30.1.205","172.30.1.104","TCP","54","41072 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4156","1.955468","172.30.1.104","172.30.1.205","TCP","66","49671 > 33710 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4157","1.955479","172.30.1.205","172.30.1.104","TCP","54","33710 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4158","1.955852","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4159","1.958401","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4160","1.958421","172.30.1.205","172.30.1.104","TCP","54","33710 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4161","1.960402","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4162","1.960848","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4163","1.960855","172.30.1.205","172.30.1.104","TCP","54","33710 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4164","1.962196","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4165","1.963259","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4166","1.963269","172.30.1.205","172.30.1.104","TCP","54","33710 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4167","1.964192","172.30.1.205","172.30.1.104","TCP","74","41076 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905190 TSecr=0 WS=128" "4168","1.964536","172.30.1.104","172.30.1.205","TCP","66","135 > 41076 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4169","1.964557","172.30.1.205","172.30.1.104","TCP","54","41076 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4170","1.965136","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4171","1.965540","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4172","1.965548","172.30.1.205","172.30.1.104","TCP","54","41076 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4173","1.967714","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4174","1.968211","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4175","1.968221","172.30.1.205","172.30.1.104","TCP","54","41076 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4176","1.970114","172.30.1.205","172.30.1.104","TCP","54","41076 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4177","1.970235","172.30.1.205","172.30.1.104","TCP","74","33714 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905196 TSecr=0 WS=128" "4178","1.970437","172.30.1.104","172.30.1.205","TCP","54","135 > 41076 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4179","1.970510","172.30.1.104","172.30.1.205","TCP","54","135 > 41076 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4180","1.970515","172.30.1.205","172.30.1.104","TCP","54","41076 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4181","1.970607","172.30.1.104","172.30.1.205","TCP","66","49671 > 33714 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4182","1.970616","172.30.1.205","172.30.1.104","TCP","54","33714 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4183","1.970972","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4184","1.973314","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4185","1.973325","172.30.1.205","172.30.1.104","TCP","54","33714 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4186","1.975211","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4187","1.975684","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4188","1.975691","172.30.1.205","172.30.1.104","TCP","54","33714 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4189","1.977079","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4190","1.978128","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4191","1.978137","172.30.1.205","172.30.1.104","TCP","54","33714 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4192","1.979071","172.30.1.205","172.30.1.104","TCP","74","41080 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905205 TSecr=0 WS=128" "4193","1.979400","172.30.1.104","172.30.1.205","TCP","66","135 > 41080 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4194","1.979412","172.30.1.205","172.30.1.104","TCP","54","41080 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4195","1.979766","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4196","1.980111","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4197","1.980120","172.30.1.205","172.30.1.104","TCP","54","41080 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4198","1.982313","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4199","1.982767","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4200","1.982774","172.30.1.205","172.30.1.104","TCP","54","41080 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4201","1.984585","172.30.1.205","172.30.1.104","TCP","54","41080 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4202","1.984698","172.30.1.205","172.30.1.104","TCP","74","33718 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905211 TSecr=0 WS=128" "4203","1.984888","172.30.1.104","172.30.1.205","TCP","54","135 > 41080 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4204","1.984959","172.30.1.104","172.30.1.205","TCP","54","135 > 41080 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4205","1.984965","172.30.1.205","172.30.1.104","TCP","54","41080 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4206","1.985026","172.30.1.104","172.30.1.205","TCP","66","49671 > 33718 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4207","1.985034","172.30.1.205","172.30.1.104","TCP","54","33718 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4208","1.985383","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4209","1.985718","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4210","1.985727","172.30.1.205","172.30.1.104","TCP","54","33718 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4211","1.987597","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4212","1.988036","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4213","1.988042","172.30.1.205","172.30.1.104","TCP","54","33718 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4214","1.989413","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4215","1.990501","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4216","1.990510","172.30.1.205","172.30.1.104","TCP","54","33718 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4217","1.991441","172.30.1.205","172.30.1.104","TCP","74","41084 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905217 TSecr=0 WS=128" "4218","1.991759","172.30.1.104","172.30.1.205","TCP","66","135 > 41084 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4219","1.991769","172.30.1.205","172.30.1.104","TCP","54","41084 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4220","1.992117","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4221","1.992444","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4222","1.992453","172.30.1.205","172.30.1.104","TCP","54","41084 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4223","1.994678","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4224","1.995100","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4225","1.995107","172.30.1.205","172.30.1.104","TCP","54","41084 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4226","1.995949","172.30.1.205","172.30.1.104","TCP","54","33678 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4227","1.995997","172.30.1.205","172.30.1.104","TCP","54","33682 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4228","1.996030","172.30.1.205","172.30.1.104","TCP","54","33686 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4229","1.996060","172.30.1.205","172.30.1.104","TCP","54","33690 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4230","1.996088","172.30.1.205","172.30.1.104","TCP","54","33694 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4231","1.996116","172.30.1.205","172.30.1.104","TCP","54","33698 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4232","1.996143","172.30.1.205","172.30.1.104","TCP","54","33702 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4233","1.996166","172.30.1.205","172.30.1.104","TCP","54","33706 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4234","1.996193","172.30.1.205","172.30.1.104","TCP","54","33710 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4235","1.996219","172.30.1.205","172.30.1.104","TCP","54","33714 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4236","1.996245","172.30.1.205","172.30.1.104","TCP","54","33718 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4237","1.996317","172.30.1.205","172.30.1.104","TCP","54","33674 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4238","1.996383","172.30.1.104","172.30.1.205","TCP","54","49671 > 33678 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4239","1.996410","172.30.1.104","172.30.1.205","TCP","54","49671 > 33682 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4240","1.996439","172.30.1.104","172.30.1.205","TCP","54","49671 > 33678 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4241","1.996445","172.30.1.205","172.30.1.104","TCP","54","33678 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4242","1.996465","172.30.1.104","172.30.1.205","TCP","54","49671 > 33682 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4243","1.996468","172.30.1.205","172.30.1.104","TCP","54","33682 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4244","1.996568","172.30.1.104","172.30.1.205","TCP","54","49671 > 33686 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4245","1.996597","172.30.1.104","172.30.1.205","TCP","54","49671 > 33690 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4246","1.996627","172.30.1.104","172.30.1.205","TCP","54","49671 > 33694 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4247","1.996655","172.30.1.104","172.30.1.205","TCP","54","49671 > 33698 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4248","1.996769","172.30.1.104","172.30.1.205","TCP","54","49671 > 33694 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4249","1.996789","172.30.1.205","172.30.1.104","TCP","54","33694 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4250","1.996812","172.30.1.104","172.30.1.205","TCP","54","49671 > 33698 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4251","1.996816","172.30.1.205","172.30.1.104","TCP","54","33698 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4252","1.996840","172.30.1.104","172.30.1.205","TCP","54","49671 > 33686 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4253","1.996842","172.30.1.205","172.30.1.104","TCP","54","33686 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4254","1.996867","172.30.1.104","172.30.1.205","TCP","54","49671 > 33690 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4255","1.996869","172.30.1.205","172.30.1.104","TCP","54","33690 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4256","1.996904","172.30.1.104","172.30.1.205","TCP","54","49671 > 33702 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4257","1.996934","172.30.1.104","172.30.1.205","TCP","54","49671 > 33702 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4258","1.996938","172.30.1.205","172.30.1.104","TCP","54","33702 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4259","1.996961","172.30.1.104","172.30.1.205","TCP","54","49671 > 33706 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4260","1.996990","172.30.1.104","172.30.1.205","TCP","54","49671 > 33710 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4261","1.997018","172.30.1.104","172.30.1.205","TCP","54","49671 > 33714 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4262","1.997047","172.30.1.104","172.30.1.205","TCP","54","49671 > 33706 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4263","1.997052","172.30.1.205","172.30.1.104","TCP","54","33706 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4264","1.997077","172.30.1.104","172.30.1.205","TCP","54","49671 > 33718 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4265","1.997104","172.30.1.104","172.30.1.205","TCP","54","49671 > 33674 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4266","1.997131","172.30.1.104","172.30.1.205","TCP","54","49671 > 33674 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4267","1.997136","172.30.1.205","172.30.1.104","TCP","54","33674 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4268","1.997159","172.30.1.104","172.30.1.205","TCP","54","49671 > 33718 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4269","1.997162","172.30.1.205","172.30.1.104","TCP","54","33718 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4270","1.997186","172.30.1.104","172.30.1.205","TCP","54","49671 > 33710 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4271","1.997189","172.30.1.205","172.30.1.104","TCP","54","33710 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4272","1.997214","172.30.1.104","172.30.1.205","TCP","54","49671 > 33714 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4273","1.997217","172.30.1.205","172.30.1.104","TCP","54","33714 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4274","1.997945","172.30.1.205","172.30.1.104","TCP","54","41084 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4275","1.998056","172.30.1.205","172.30.1.104","TCP","74","33722 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905224 TSecr=0 WS=128" "4276","1.998240","172.30.1.104","172.30.1.205","TCP","54","135 > 41084 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4277","1.998265","172.30.1.104","172.30.1.205","TCP","54","135 > 41084 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4278","1.998270","172.30.1.205","172.30.1.104","TCP","54","41084 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4279","1.998371","172.30.1.104","172.30.1.205","TCP","66","49671 > 33722 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4280","1.998380","172.30.1.205","172.30.1.104","TCP","54","33722 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4281","1.998732","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4282","1.999039","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4283","1.999048","172.30.1.205","172.30.1.104","TCP","54","33722 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4284","2.000950","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4285","2.001354","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4286","2.001360","172.30.1.205","172.30.1.104","TCP","54","33722 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4287","2.002721","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4288","2.003760","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4289","2.003770","172.30.1.205","172.30.1.104","TCP","54","33722 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4290","2.004693","172.30.1.205","172.30.1.104","TCP","74","41088 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905231 TSecr=0 WS=128" "4291","2.005012","172.30.1.104","172.30.1.205","TCP","66","135 > 41088 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4292","2.005023","172.30.1.205","172.30.1.104","TCP","54","41088 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4293","2.005384","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4294","2.005718","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4295","2.005727","172.30.1.205","172.30.1.104","TCP","54","41088 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4296","2.007903","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4297","2.008324","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4298","2.008331","172.30.1.205","172.30.1.104","TCP","54","41088 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4299","2.010157","172.30.1.205","172.30.1.104","TCP","54","41088 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4300","2.010283","172.30.1.205","172.30.1.104","TCP","74","33726 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905236 TSecr=0 WS=128" "4301","2.010463","172.30.1.104","172.30.1.205","TCP","54","135 > 41088 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4302","2.010489","172.30.1.104","172.30.1.205","TCP","54","135 > 41088 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4303","2.010496","172.30.1.205","172.30.1.104","TCP","54","41088 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4304","2.010592","172.30.1.104","172.30.1.205","TCP","66","49671 > 33726 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4305","2.010601","172.30.1.205","172.30.1.104","TCP","54","33726 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4306","2.010954","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4307","2.011561","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4308","2.011572","172.30.1.205","172.30.1.104","TCP","54","33726 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4309","2.013521","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4310","2.013940","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4311","2.013946","172.30.1.205","172.30.1.104","TCP","54","33726 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4312","2.015307","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4313","2.016420","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4314","2.016432","172.30.1.205","172.30.1.104","TCP","54","33726 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4315","2.017450","172.30.1.205","172.30.1.104","TCP","74","41092 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905243 TSecr=0 WS=128" "4316","2.017802","172.30.1.104","172.30.1.205","TCP","66","135 > 41092 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4317","2.017813","172.30.1.205","172.30.1.104","TCP","54","41092 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4318","2.018161","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4319","2.018469","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4320","2.018478","172.30.1.205","172.30.1.104","TCP","54","41092 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4321","2.020663","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4322","2.021118","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4323","2.021132","172.30.1.205","172.30.1.104","TCP","54","41092 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4324","2.023209","172.30.1.205","172.30.1.104","TCP","54","41092 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4325","2.023322","172.30.1.205","172.30.1.104","TCP","74","33730 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905249 TSecr=0 WS=128" "4326","2.023511","172.30.1.104","172.30.1.205","TCP","54","135 > 41092 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4327","2.023539","172.30.1.104","172.30.1.205","TCP","54","135 > 41092 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4328","2.023545","172.30.1.205","172.30.1.104","TCP","54","41092 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4329","2.023641","172.30.1.104","172.30.1.205","TCP","66","49671 > 33730 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4330","2.023650","172.30.1.205","172.30.1.104","TCP","54","33730 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4331","2.023995","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4332","2.024345","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4333","2.024378","172.30.1.205","172.30.1.104","TCP","54","33730 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4334","2.026263","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4335","2.026678","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4336","2.026684","172.30.1.205","172.30.1.104","TCP","54","33730 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4337","2.028026","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4338","2.029147","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4339","2.029156","172.30.1.205","172.30.1.104","TCP","54","33730 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4340","2.030090","172.30.1.205","172.30.1.104","TCP","74","41096 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905256 TSecr=0 WS=128" "4341","2.030493","172.30.1.104","172.30.1.205","TCP","66","135 > 41096 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4342","2.030507","172.30.1.205","172.30.1.104","TCP","54","41096 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4343","2.030891","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4344","2.031218","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4345","2.031231","172.30.1.205","172.30.1.104","TCP","54","41096 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4346","2.033500","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4347","2.033903","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4348","2.033910","172.30.1.205","172.30.1.104","TCP","54","41096 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4349","2.035828","172.30.1.205","172.30.1.104","TCP","54","41096 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4350","2.035946","172.30.1.205","172.30.1.104","TCP","74","33734 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905262 TSecr=0 WS=128" "4351","2.036135","172.30.1.104","172.30.1.205","TCP","54","135 > 41096 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4352","2.036163","172.30.1.104","172.30.1.205","TCP","54","135 > 41096 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4353","2.036169","172.30.1.205","172.30.1.104","TCP","54","41096 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4354","2.036278","172.30.1.104","172.30.1.205","TCP","66","49671 > 33734 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4355","2.036287","172.30.1.205","172.30.1.104","TCP","54","33734 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4356","2.036649","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4357","2.036974","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4358","2.036984","172.30.1.205","172.30.1.104","TCP","54","33734 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4359","2.038883","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4360","2.039327","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4361","2.039334","172.30.1.205","172.30.1.104","TCP","54","33734 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4362","2.040680","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4363","2.041705","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4364","2.041715","172.30.1.205","172.30.1.104","TCP","54","33734 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4365","2.042651","172.30.1.205","172.30.1.104","TCP","74","41100 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905269 TSecr=0 WS=128" "4366","2.042966","172.30.1.104","172.30.1.205","TCP","66","135 > 41100 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4367","2.042977","172.30.1.205","172.30.1.104","TCP","54","41100 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4368","2.043356","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4369","2.043680","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4370","2.043688","172.30.1.205","172.30.1.104","TCP","54","41100 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4371","2.045910","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4372","2.046357","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4373","2.046364","172.30.1.205","172.30.1.104","TCP","54","41100 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4374","2.048189","172.30.1.205","172.30.1.104","TCP","54","41100 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4375","2.048301","172.30.1.205","172.30.1.104","TCP","74","33738 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905274 TSecr=0 WS=128" "4376","2.048518","172.30.1.104","172.30.1.205","TCP","54","135 > 41100 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4377","2.048546","172.30.1.104","172.30.1.205","TCP","54","135 > 41100 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4378","2.048552","172.30.1.205","172.30.1.104","TCP","54","41100 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4379","2.048678","172.30.1.104","172.30.1.205","TCP","66","49671 > 33738 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4380","2.048687","172.30.1.205","172.30.1.104","TCP","54","33738 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4381","2.049064","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4382","2.049379","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4383","2.049388","172.30.1.205","172.30.1.104","TCP","54","33738 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4384","2.051254","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4385","2.051639","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4386","2.051646","172.30.1.205","172.30.1.104","TCP","54","33738 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4387","2.053014","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4388","2.054086","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4389","2.054096","172.30.1.205","172.30.1.104","TCP","54","33738 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4390","2.055020","172.30.1.205","172.30.1.104","TCP","74","41104 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905281 TSecr=0 WS=128" "4391","2.055365","172.30.1.104","172.30.1.205","TCP","66","135 > 41104 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4392","2.055376","172.30.1.205","172.30.1.104","TCP","54","41104 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4393","2.055727","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4394","2.056011","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4395","2.056020","172.30.1.205","172.30.1.104","TCP","54","41104 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4396","2.058213","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4397","2.058604","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4398","2.058611","172.30.1.205","172.30.1.104","TCP","54","41104 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4399","2.060409","172.30.1.205","172.30.1.104","TCP","54","41104 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4400","2.060522","172.30.1.205","172.30.1.104","TCP","74","33742 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905286 TSecr=0 WS=128" "4401","2.060680","172.30.1.104","172.30.1.205","TCP","54","135 > 41104 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4402","2.060701","172.30.1.104","172.30.1.205","TCP","54","135 > 41104 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4403","2.060707","172.30.1.205","172.30.1.104","TCP","54","41104 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4404","2.060819","172.30.1.104","172.30.1.205","TCP","66","49671 > 33742 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4405","2.060828","172.30.1.205","172.30.1.104","TCP","54","33742 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4406","2.061187","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4407","2.061475","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4408","2.061484","172.30.1.205","172.30.1.104","TCP","54","33742 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4409","2.063354","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4410","2.063736","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4411","2.063743","172.30.1.205","172.30.1.104","TCP","54","33742 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4412","2.065118","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4413","2.066105","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4414","2.066114","172.30.1.205","172.30.1.104","TCP","54","33742 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4415","2.067050","172.30.1.205","172.30.1.104","TCP","74","41108 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905293 TSecr=0 WS=128" "4416","2.067355","172.30.1.104","172.30.1.205","TCP","66","135 > 41108 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4417","2.067366","172.30.1.205","172.30.1.104","TCP","54","41108 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4418","2.067719","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4419","2.068019","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4420","2.068028","172.30.1.205","172.30.1.104","TCP","54","41108 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4421","2.070253","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4422","2.070663","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4423","2.070672","172.30.1.205","172.30.1.104","TCP","54","41108 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4424","2.072555","172.30.1.205","172.30.1.104","TCP","54","41108 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4425","2.072678","172.30.1.205","172.30.1.104","TCP","74","33746 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905299 TSecr=0 WS=128" "4426","2.072896","172.30.1.104","172.30.1.205","TCP","54","135 > 41108 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4427","2.072925","172.30.1.104","172.30.1.205","TCP","54","135 > 41108 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4428","2.072931","172.30.1.205","172.30.1.104","TCP","54","41108 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4429","2.072957","172.30.1.104","172.30.1.205","TCP","66","49671 > 33746 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4430","2.072966","172.30.1.205","172.30.1.104","TCP","54","33746 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4431","2.073342","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4432","2.073666","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4433","2.073675","172.30.1.205","172.30.1.104","TCP","54","33746 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4434","2.075559","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4435","2.075942","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4436","2.075949","172.30.1.205","172.30.1.104","TCP","54","33746 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4437","2.077362","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4438","2.078382","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4439","2.078392","172.30.1.205","172.30.1.104","TCP","54","33746 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4440","2.079327","172.30.1.205","172.30.1.104","TCP","74","41112 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905305 TSecr=0 WS=128" "4441","2.079677","172.30.1.104","172.30.1.205","TCP","66","135 > 41112 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4442","2.079688","172.30.1.205","172.30.1.104","TCP","54","41112 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4443","2.080037","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4444","2.080476","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4445","2.080485","172.30.1.205","172.30.1.104","TCP","54","41112 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4446","2.082691","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4447","2.083260","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4448","2.083266","172.30.1.205","172.30.1.104","TCP","54","41112 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4449","2.085099","172.30.1.205","172.30.1.104","TCP","54","41112 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4450","2.085209","172.30.1.205","172.30.1.104","TCP","74","33750 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905311 TSecr=0 WS=128" "4451","2.085364","172.30.1.104","172.30.1.205","TCP","54","135 > 41112 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4452","2.085392","172.30.1.104","172.30.1.205","TCP","54","135 > 41112 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4453","2.085398","172.30.1.205","172.30.1.104","TCP","54","41112 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4454","2.085471","172.30.1.104","172.30.1.205","TCP","66","49671 > 33750 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4455","2.085480","172.30.1.205","172.30.1.104","TCP","54","33750 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4456","2.085824","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4457","2.086090","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4458","2.086101","172.30.1.205","172.30.1.104","TCP","54","33750 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4459","2.087985","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4460","2.088419","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4461","2.088426","172.30.1.205","172.30.1.104","TCP","54","33750 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4462","2.089804","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4463","2.091287","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4464","2.091298","172.30.1.205","172.30.1.104","TCP","54","33750 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4465","2.092241","172.30.1.205","172.30.1.104","TCP","74","41116 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905318 TSecr=0 WS=128" "4466","2.092556","172.30.1.104","172.30.1.205","TCP","66","135 > 41116 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4467","2.092567","172.30.1.205","172.30.1.104","TCP","54","41116 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4468","2.092947","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4469","2.094352","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4470","2.094361","172.30.1.205","172.30.1.104","TCP","54","41116 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4471","2.096520","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4472","2.096963","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4473","2.096971","172.30.1.205","172.30.1.104","TCP","54","41116 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4474","2.098776","172.30.1.205","172.30.1.104","TCP","54","41116 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4475","2.098888","172.30.1.205","172.30.1.104","TCP","74","33754 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905325 TSecr=0 WS=128" "4476","2.099075","172.30.1.104","172.30.1.205","TCP","54","135 > 41116 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4477","2.099083","172.30.1.104","172.30.1.205","TCP","54","135 > 41116 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4478","2.099089","172.30.1.205","172.30.1.104","TCP","54","41116 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4479","2.099162","172.30.1.104","172.30.1.205","TCP","66","49671 > 33754 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4480","2.099171","172.30.1.205","172.30.1.104","TCP","54","33754 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4481","2.099513","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4482","2.099799","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4483","2.099808","172.30.1.205","172.30.1.104","TCP","54","33754 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4484","2.101699","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4485","2.102063","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4486","2.102070","172.30.1.205","172.30.1.104","TCP","54","33754 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4487","2.103402","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4488","2.104493","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4489","2.104502","172.30.1.205","172.30.1.104","TCP","54","33754 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4490","2.105452","172.30.1.205","172.30.1.104","TCP","74","41120 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905331 TSecr=0 WS=128" "4491","2.105784","172.30.1.104","172.30.1.205","TCP","66","135 > 41120 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4492","2.105794","172.30.1.205","172.30.1.104","TCP","54","41120 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4493","2.106141","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4494","2.106432","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4495","2.106440","172.30.1.205","172.30.1.104","TCP","54","41120 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4496","2.108597","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4497","2.109025","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4498","2.109034","172.30.1.205","172.30.1.104","TCP","54","41120 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4499","2.110906","172.30.1.205","172.30.1.104","TCP","54","41120 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4500","2.111026","172.30.1.205","172.30.1.104","TCP","74","33758 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905337 TSecr=0 WS=128" "4501","2.111177","172.30.1.104","172.30.1.205","TCP","54","135 > 41120 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4502","2.111209","172.30.1.104","172.30.1.205","TCP","54","135 > 41120 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4503","2.111214","172.30.1.205","172.30.1.104","TCP","54","41120 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4504","2.111318","172.30.1.104","172.30.1.205","TCP","66","49671 > 33758 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4505","2.111327","172.30.1.205","172.30.1.104","TCP","54","33758 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4506","2.111677","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4507","2.111980","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4508","2.111987","172.30.1.205","172.30.1.104","TCP","54","33758 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4509","2.113865","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4510","2.114233","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4511","2.114240","172.30.1.205","172.30.1.104","TCP","54","33758 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4512","2.115583","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4513","2.116572","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4514","2.116582","172.30.1.205","172.30.1.104","TCP","54","33758 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4515","2.117541","172.30.1.205","172.30.1.104","TCP","74","41124 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905343 TSecr=0 WS=128" "4516","2.117857","172.30.1.104","172.30.1.205","TCP","66","135 > 41124 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4517","2.117868","172.30.1.205","172.30.1.104","TCP","54","41124 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4518","2.118217","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4519","2.118541","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4520","2.118558","172.30.1.205","172.30.1.104","TCP","54","41124 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4521","2.120934","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4522","2.121332","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4523","2.121345","172.30.1.205","172.30.1.104","TCP","54","41124 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4524","2.123264","172.30.1.205","172.30.1.104","TCP","54","41124 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4525","2.123374","172.30.1.205","172.30.1.104","TCP","74","33762 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905349 TSecr=0 WS=128" "4526","2.123542","172.30.1.104","172.30.1.205","TCP","54","135 > 41124 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4527","2.123563","172.30.1.104","172.30.1.205","TCP","54","135 > 41124 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4528","2.123569","172.30.1.205","172.30.1.104","TCP","54","41124 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4529","2.123642","172.30.1.104","172.30.1.205","TCP","66","49671 > 33762 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4530","2.123651","172.30.1.205","172.30.1.104","TCP","54","33762 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4531","2.124012","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4532","2.124283","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4533","2.124291","172.30.1.205","172.30.1.104","TCP","54","33762 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4534","2.126187","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4535","2.126543","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4536","2.126550","172.30.1.205","172.30.1.104","TCP","54","33762 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4537","2.127880","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4538","2.128883","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4539","2.128892","172.30.1.205","172.30.1.104","TCP","54","33762 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4540","2.129829","172.30.1.205","172.30.1.104","TCP","74","41128 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905356 TSecr=0 WS=128" "4541","2.130121","172.30.1.104","172.30.1.205","TCP","66","135 > 41128 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4542","2.130131","172.30.1.205","172.30.1.104","TCP","54","41128 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4543","2.130479","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4544","2.130756","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4545","2.130765","172.30.1.205","172.30.1.104","TCP","54","41128 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4546","2.132952","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4547","2.133400","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4548","2.133407","172.30.1.205","172.30.1.104","TCP","54","41128 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4549","2.135214","172.30.1.205","172.30.1.104","TCP","54","41128 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4550","2.135322","172.30.1.205","172.30.1.104","TCP","74","33766 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905361 TSecr=0 WS=128" "4551","2.135495","172.30.1.104","172.30.1.205","TCP","54","135 > 41128 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4552","2.135506","172.30.1.104","172.30.1.205","TCP","54","135 > 41128 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4553","2.135511","172.30.1.205","172.30.1.104","TCP","54","41128 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4554","2.135620","172.30.1.104","172.30.1.205","TCP","66","49671 > 33766 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4555","2.135628","172.30.1.205","172.30.1.104","TCP","54","33766 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4556","2.135971","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4557","2.136291","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4558","2.136302","172.30.1.205","172.30.1.104","TCP","54","33766 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4559","2.138191","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4560","2.138554","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4561","2.138560","172.30.1.205","172.30.1.104","TCP","54","33766 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4562","2.139891","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4563","2.140963","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4564","2.140982","172.30.1.205","172.30.1.104","TCP","54","33766 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4565","2.142012","172.30.1.205","172.30.1.104","TCP","74","41132 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905368 TSecr=0 WS=128" "4566","2.142341","172.30.1.104","172.30.1.205","TCP","66","135 > 41132 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4567","2.142352","172.30.1.205","172.30.1.104","TCP","54","41132 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4568","2.142698","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4569","2.143008","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4570","2.143017","172.30.1.205","172.30.1.104","TCP","54","41132 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4571","2.145206","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4572","2.145597","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4573","2.145604","172.30.1.205","172.30.1.104","TCP","54","41132 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4574","2.146439","172.30.1.205","172.30.1.104","TCP","54","33726 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4575","2.146488","172.30.1.205","172.30.1.104","TCP","54","33730 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4576","2.146524","172.30.1.205","172.30.1.104","TCP","54","33734 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4577","2.146558","172.30.1.205","172.30.1.104","TCP","54","33738 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4578","2.146591","172.30.1.205","172.30.1.104","TCP","54","33742 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4579","2.146623","172.30.1.205","172.30.1.104","TCP","54","33746 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4580","2.146652","172.30.1.205","172.30.1.104","TCP","54","33750 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4581","2.146685","172.30.1.205","172.30.1.104","TCP","54","33754 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4582","2.146713","172.30.1.205","172.30.1.104","TCP","54","33758 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4583","2.146745","172.30.1.205","172.30.1.104","TCP","54","33762 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4584","2.146773","172.30.1.205","172.30.1.104","TCP","54","33766 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4585","2.146843","172.30.1.205","172.30.1.104","TCP","54","33722 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4586","2.147125","172.30.1.104","172.30.1.205","TCP","54","49671 > 33726 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4587","2.147141","172.30.1.104","172.30.1.205","TCP","54","49671 > 33730 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4588","2.147175","172.30.1.104","172.30.1.205","TCP","54","49671 > 33726 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4589","2.147182","172.30.1.205","172.30.1.104","TCP","54","33726 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4590","2.147194","172.30.1.104","172.30.1.205","TCP","54","49671 > 33734 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4591","2.147216","172.30.1.104","172.30.1.205","TCP","54","49671 > 33738 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4592","2.147262","172.30.1.104","172.30.1.205","TCP","54","49671 > 33738 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4593","2.147266","172.30.1.205","172.30.1.104","TCP","54","33738 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4594","2.147282","172.30.1.104","172.30.1.205","TCP","54","49671 > 33730 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4595","2.147285","172.30.1.205","172.30.1.104","TCP","54","33730 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4596","2.147305","172.30.1.104","172.30.1.205","TCP","54","49671 > 33742 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4597","2.147325","172.30.1.104","172.30.1.205","TCP","54","49671 > 33746 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4598","2.147346","172.30.1.104","172.30.1.205","TCP","54","49671 > 33742 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4599","2.147349","172.30.1.205","172.30.1.104","TCP","54","33742 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4600","2.147423","172.30.1.104","172.30.1.205","TCP","54","49671 > 33750 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4601","2.147441","172.30.1.104","172.30.1.205","TCP","54","49671 > 33734 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4602","2.147446","172.30.1.205","172.30.1.104","TCP","54","33734 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4603","2.147461","172.30.1.104","172.30.1.205","TCP","54","49671 > 33754 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4604","2.147481","172.30.1.104","172.30.1.205","TCP","54","49671 > 33754 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4605","2.147485","172.30.1.205","172.30.1.104","TCP","54","33754 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4606","2.147501","172.30.1.104","172.30.1.205","TCP","54","49671 > 33758 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4607","2.147521","172.30.1.104","172.30.1.205","TCP","54","49671 > 33750 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4608","2.147524","172.30.1.205","172.30.1.104","TCP","54","33750 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4609","2.147541","172.30.1.104","172.30.1.205","TCP","54","49671 > 33762 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4610","2.147561","172.30.1.104","172.30.1.205","TCP","54","49671 > 33762 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4611","2.147564","172.30.1.205","172.30.1.104","TCP","54","33762 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4612","2.147580","172.30.1.104","172.30.1.205","TCP","54","49671 > 33766 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4613","2.147712","172.30.1.104","172.30.1.205","TCP","54","49671 > 33758 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4614","2.147716","172.30.1.205","172.30.1.104","TCP","54","33758 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4615","2.147988","172.30.1.104","172.30.1.205","TCP","54","49671 > 33722 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4616","2.148017","172.30.1.104","172.30.1.205","TCP","54","49671 > 33766 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4617","2.148023","172.30.1.205","172.30.1.104","TCP","54","33766 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4618","2.148062","172.30.1.104","172.30.1.205","TCP","54","49671 > 33722 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4619","2.148067","172.30.1.205","172.30.1.104","TCP","54","33722 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4620","2.148082","172.30.1.104","172.30.1.205","TCP","54","49671 > 33746 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4621","2.148085","172.30.1.205","172.30.1.104","TCP","54","33746 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4622","2.148424","172.30.1.205","172.30.1.104","TCP","54","41132 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4623","2.148531","172.30.1.205","172.30.1.104","TCP","74","33770 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905374 TSecr=0 WS=128" "4624","2.148702","172.30.1.104","172.30.1.205","TCP","54","135 > 41132 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4625","2.148722","172.30.1.104","172.30.1.205","TCP","54","135 > 41132 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4626","2.148727","172.30.1.205","172.30.1.104","TCP","54","41132 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4627","2.148797","172.30.1.104","172.30.1.205","TCP","66","49671 > 33770 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4628","2.148807","172.30.1.205","172.30.1.104","TCP","54","33770 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4629","2.149184","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4630","2.149474","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4631","2.149482","172.30.1.205","172.30.1.104","TCP","54","33770 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4632","2.151344","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4633","2.151721","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4634","2.151728","172.30.1.205","172.30.1.104","TCP","54","33770 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4635","2.153107","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4636","2.155433","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4637","2.155442","172.30.1.205","172.30.1.104","TCP","54","33770 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4638","2.156370","172.30.1.205","172.30.1.104","TCP","74","41136 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905382 TSecr=0 WS=128" "4639","2.156676","172.30.1.104","172.30.1.205","TCP","66","135 > 41136 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4640","2.156687","172.30.1.205","172.30.1.104","TCP","54","41136 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4641","2.157072","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4642","2.157392","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4643","2.157415","172.30.1.205","172.30.1.104","TCP","54","41136 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4644","2.160085","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4645","2.160516","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4646","2.160523","172.30.1.205","172.30.1.104","TCP","54","41136 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4647","2.162337","172.30.1.205","172.30.1.104","TCP","54","41136 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4648","2.162447","172.30.1.205","172.30.1.104","TCP","74","33774 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905388 TSecr=0 WS=128" "4649","2.162663","172.30.1.104","172.30.1.205","TCP","54","135 > 41136 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4650","2.162693","172.30.1.104","172.30.1.205","TCP","54","135 > 41136 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4651","2.162699","172.30.1.205","172.30.1.104","TCP","54","41136 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4652","2.162808","172.30.1.104","172.30.1.205","TCP","66","49671 > 33774 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4653","2.162818","172.30.1.205","172.30.1.104","TCP","54","33774 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4654","2.163162","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4655","2.163581","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4656","2.163590","172.30.1.205","172.30.1.104","TCP","54","33774 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4657","2.165466","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4658","2.165888","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4659","2.165894","172.30.1.205","172.30.1.104","TCP","54","33774 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4660","2.167233","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4661","2.168401","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4662","2.168411","172.30.1.205","172.30.1.104","TCP","54","33774 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4663","2.169360","172.30.1.205","172.30.1.104","TCP","74","41140 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905395 TSecr=0 WS=128" "4664","2.169685","172.30.1.104","172.30.1.205","TCP","66","135 > 41140 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4665","2.169696","172.30.1.205","172.30.1.104","TCP","54","41140 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4666","2.170041","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4667","2.170349","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4668","2.170358","172.30.1.205","172.30.1.104","TCP","54","41140 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4669","2.172512","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4670","2.172884","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4671","2.172891","172.30.1.205","172.30.1.104","TCP","54","41140 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4672","2.174687","172.30.1.205","172.30.1.104","TCP","54","41140 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4673","2.174796","172.30.1.205","172.30.1.104","TCP","74","33778 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905401 TSecr=0 WS=128" "4674","2.174950","172.30.1.104","172.30.1.205","TCP","54","135 > 41140 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4675","2.174977","172.30.1.104","172.30.1.205","TCP","54","135 > 41140 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4676","2.174983","172.30.1.205","172.30.1.104","TCP","54","41140 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4677","2.175057","172.30.1.104","172.30.1.205","TCP","66","49671 > 33778 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4678","2.175065","172.30.1.205","172.30.1.104","TCP","54","33778 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4679","2.175407","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4680","2.175701","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4681","2.175710","172.30.1.205","172.30.1.104","TCP","54","33778 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4682","2.177602","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4683","2.177985","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4684","2.177997","172.30.1.205","172.30.1.104","TCP","54","33778 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4685","2.179559","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4686","2.180631","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4687","2.180641","172.30.1.205","172.30.1.104","TCP","54","33778 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4688","2.181590","172.30.1.205","172.30.1.104","TCP","74","41144 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905408 TSecr=0 WS=128" "4689","2.181878","172.30.1.104","172.30.1.205","TCP","66","135 > 41144 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4690","2.181889","172.30.1.205","172.30.1.104","TCP","54","41144 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4691","2.182233","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4692","2.182510","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4693","2.182520","172.30.1.205","172.30.1.104","TCP","54","41144 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4694","2.184685","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4695","2.185066","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4696","2.185073","172.30.1.205","172.30.1.104","TCP","54","41144 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4697","2.186869","172.30.1.205","172.30.1.104","TCP","54","41144 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4698","2.186979","172.30.1.205","172.30.1.104","TCP","74","33782 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905413 TSecr=0 WS=128" "4699","2.187194","172.30.1.104","172.30.1.205","TCP","54","135 > 41144 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4700","2.187244","172.30.1.104","172.30.1.205","TCP","54","135 > 41144 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4701","2.187249","172.30.1.205","172.30.1.104","TCP","54","41144 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4702","2.187321","172.30.1.104","172.30.1.205","TCP","66","49671 > 33782 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4703","2.187330","172.30.1.205","172.30.1.104","TCP","54","33782 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4704","2.187677","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4705","2.187941","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4706","2.187948","172.30.1.205","172.30.1.104","TCP","54","33782 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4707","2.189815","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4708","2.190162","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4709","2.190168","172.30.1.205","172.30.1.104","TCP","54","33782 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4710","2.191495","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4711","2.192581","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4712","2.192590","172.30.1.205","172.30.1.104","TCP","54","33782 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4713","2.193534","172.30.1.205","172.30.1.104","TCP","74","41148 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905419 TSecr=0 WS=128" "4714","2.193830","172.30.1.104","172.30.1.205","TCP","66","135 > 41148 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4715","2.193841","172.30.1.205","172.30.1.104","TCP","54","41148 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4716","2.194207","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4717","2.194492","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4718","2.194501","172.30.1.205","172.30.1.104","TCP","54","41148 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4719","2.196670","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4720","2.197038","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4721","2.197046","172.30.1.205","172.30.1.104","TCP","54","41148 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4722","2.198839","172.30.1.205","172.30.1.104","TCP","54","41148 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4723","2.198948","172.30.1.205","172.30.1.104","TCP","74","33786 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905425 TSecr=0 WS=128" "4724","2.199103","172.30.1.104","172.30.1.205","TCP","54","135 > 41148 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4725","2.199140","172.30.1.104","172.30.1.205","TCP","54","135 > 41148 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4726","2.199146","172.30.1.205","172.30.1.104","TCP","54","41148 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4727","2.199221","172.30.1.104","172.30.1.205","TCP","66","49671 > 33786 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4728","2.199230","172.30.1.205","172.30.1.104","TCP","54","33786 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4729","2.199594","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4730","2.199899","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4731","2.199910","172.30.1.205","172.30.1.104","TCP","54","33786 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4732","2.201779","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4733","2.202139","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4734","2.202146","172.30.1.205","172.30.1.104","TCP","54","33786 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4735","2.203478","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4736","2.204538","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4737","2.204548","172.30.1.205","172.30.1.104","TCP","54","33786 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4738","2.205504","172.30.1.205","172.30.1.104","TCP","74","41152 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905431 TSecr=0 WS=128" "4739","2.205848","172.30.1.104","172.30.1.205","TCP","66","135 > 41152 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4740","2.205859","172.30.1.205","172.30.1.104","TCP","54","41152 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4741","2.206207","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4742","2.206532","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4743","2.206541","172.30.1.205","172.30.1.104","TCP","54","41152 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4744","2.208696","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4745","2.209177","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4746","2.209184","172.30.1.205","172.30.1.104","TCP","54","41152 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4747","2.211003","172.30.1.205","172.30.1.104","TCP","54","41152 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4748","2.211113","172.30.1.205","172.30.1.104","TCP","74","33790 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905437 TSecr=0 WS=128" "4749","2.211321","172.30.1.104","172.30.1.205","TCP","54","135 > 41152 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4750","2.211351","172.30.1.104","172.30.1.205","TCP","54","135 > 41152 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4751","2.211356","172.30.1.205","172.30.1.104","TCP","54","41152 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4752","2.211460","172.30.1.104","172.30.1.205","TCP","66","49671 > 33790 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4753","2.211468","172.30.1.205","172.30.1.104","TCP","54","33790 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4754","2.211817","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4755","2.212711","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4756","2.212720","172.30.1.205","172.30.1.104","TCP","54","33790 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4757","2.214594","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4758","2.214978","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4759","2.214985","172.30.1.205","172.30.1.104","TCP","54","33790 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4760","2.216327","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4761","2.217451","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4762","2.217461","172.30.1.205","172.30.1.104","TCP","54","33790 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4763","2.218399","172.30.1.205","172.30.1.104","TCP","74","41156 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905444 TSecr=0 WS=128" "4764","2.218714","172.30.1.104","172.30.1.205","TCP","66","135 > 41156 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4765","2.218725","172.30.1.205","172.30.1.104","TCP","54","41156 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4766","2.219072","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4767","2.219394","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4768","2.219403","172.30.1.205","172.30.1.104","TCP","54","41156 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4769","2.221626","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4770","2.222028","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4771","2.222034","172.30.1.205","172.30.1.104","TCP","54","41156 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4772","2.223834","172.30.1.205","172.30.1.104","TCP","54","41156 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4773","2.223944","172.30.1.205","172.30.1.104","TCP","74","33794 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905450 TSecr=0 WS=128" "4774","2.224109","172.30.1.104","172.30.1.205","TCP","54","135 > 41156 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4775","2.224137","172.30.1.104","172.30.1.205","TCP","54","135 > 41156 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4776","2.224143","172.30.1.205","172.30.1.104","TCP","54","41156 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4777","2.224239","172.30.1.104","172.30.1.205","TCP","66","49671 > 33794 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4778","2.224247","172.30.1.205","172.30.1.104","TCP","54","33794 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4779","2.224591","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4780","2.224920","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4781","2.224930","172.30.1.205","172.30.1.104","TCP","54","33794 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4782","2.226830","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4783","2.227187","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4784","2.227193","172.30.1.205","172.30.1.104","TCP","54","33794 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4785","2.228528","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4786","2.229580","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4787","2.229590","172.30.1.205","172.30.1.104","TCP","54","33794 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4788","2.230525","172.30.1.205","172.30.1.104","TCP","74","41160 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905456 TSecr=0 WS=128" "4789","2.230873","172.30.1.104","172.30.1.205","TCP","66","135 > 41160 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4790","2.230883","172.30.1.205","172.30.1.104","TCP","54","41160 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4791","2.231232","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4792","2.231527","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4793","2.231536","172.30.1.205","172.30.1.104","TCP","54","41160 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4794","2.233731","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4795","2.234116","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4796","2.234123","172.30.1.205","172.30.1.104","TCP","54","41160 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4797","2.235921","172.30.1.205","172.30.1.104","TCP","54","41160 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4798","2.236032","172.30.1.205","172.30.1.104","TCP","74","33798 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905462 TSecr=0 WS=128" "4799","2.236177","172.30.1.104","172.30.1.205","TCP","54","135 > 41160 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4800","2.236214","172.30.1.104","172.30.1.205","TCP","54","135 > 41160 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4801","2.236219","172.30.1.205","172.30.1.104","TCP","54","41160 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4802","2.236309","172.30.1.104","172.30.1.205","TCP","66","49671 > 33798 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4803","2.236317","172.30.1.205","172.30.1.104","TCP","54","33798 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4804","2.236662","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4805","2.236924","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4806","2.236933","172.30.1.205","172.30.1.104","TCP","54","33798 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4807","2.238808","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4808","2.239159","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4809","2.239166","172.30.1.205","172.30.1.104","TCP","54","33798 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4810","2.240502","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4811","2.241500","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4812","2.241510","172.30.1.205","172.30.1.104","TCP","54","33798 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4813","2.242449","172.30.1.205","172.30.1.104","TCP","74","41164 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905468 TSecr=0 WS=128" "4814","2.242820","172.30.1.104","172.30.1.205","TCP","66","135 > 41164 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4815","2.242830","172.30.1.205","172.30.1.104","TCP","54","41164 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4816","2.243175","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4817","2.243492","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4818","2.243501","172.30.1.205","172.30.1.104","TCP","54","41164 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4819","2.245683","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4820","2.246130","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4821","2.246137","172.30.1.205","172.30.1.104","TCP","54","41164 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4822","2.247929","172.30.1.205","172.30.1.104","TCP","54","41164 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4823","2.248054","172.30.1.205","172.30.1.104","TCP","74","33802 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905474 TSecr=0 WS=128" "4824","2.248195","172.30.1.104","172.30.1.205","TCP","54","135 > 41164 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4825","2.248203","172.30.1.104","172.30.1.205","TCP","54","135 > 41164 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4826","2.248208","172.30.1.205","172.30.1.104","TCP","54","41164 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4827","2.248348","172.30.1.104","172.30.1.205","TCP","66","49671 > 33802 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4828","2.248356","172.30.1.205","172.30.1.104","TCP","54","33802 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4829","2.248697","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4830","2.248976","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4831","2.248985","172.30.1.205","172.30.1.104","TCP","54","33802 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4832","2.250827","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4833","2.251259","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4834","2.251266","172.30.1.205","172.30.1.104","TCP","54","33802 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4835","2.252597","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4836","2.254968","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4837","2.254977","172.30.1.205","172.30.1.104","TCP","54","33802 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4838","2.255911","172.30.1.205","172.30.1.104","TCP","74","41168 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905482 TSecr=0 WS=128" "4839","2.256205","172.30.1.104","172.30.1.205","TCP","66","135 > 41168 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4840","2.256216","172.30.1.205","172.30.1.104","TCP","54","41168 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4841","2.256559","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4842","2.256829","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4843","2.256838","172.30.1.205","172.30.1.104","TCP","54","41168 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4844","2.259007","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4845","2.259386","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4846","2.259392","172.30.1.205","172.30.1.104","TCP","54","41168 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4847","2.261207","172.30.1.205","172.30.1.104","TCP","54","41168 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4848","2.261319","172.30.1.205","172.30.1.104","TCP","74","33806 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905487 TSecr=0 WS=128" "4849","2.261497","172.30.1.104","172.30.1.205","TCP","54","135 > 41168 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4850","2.261508","172.30.1.104","172.30.1.205","TCP","54","135 > 41168 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4851","2.261513","172.30.1.205","172.30.1.104","TCP","54","41168 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4852","2.261588","172.30.1.104","172.30.1.205","TCP","66","49671 > 33806 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4853","2.261596","172.30.1.205","172.30.1.104","TCP","54","33806 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4854","2.261937","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4855","2.262211","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4856","2.262220","172.30.1.205","172.30.1.104","TCP","54","33806 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4857","2.264053","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4858","2.264422","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4859","2.264428","172.30.1.205","172.30.1.104","TCP","54","33806 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4860","2.265806","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4861","2.266818","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4862","2.266828","172.30.1.205","172.30.1.104","TCP","54","33806 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4863","2.267751","172.30.1.205","172.30.1.104","TCP","74","41172 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905494 TSecr=0 WS=128" "4864","2.268072","172.30.1.104","172.30.1.205","TCP","66","135 > 41172 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4865","2.268082","172.30.1.205","172.30.1.104","TCP","54","41172 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4866","2.268442","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4867","2.268708","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4868","2.268718","172.30.1.205","172.30.1.104","TCP","54","41172 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4869","2.270934","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4870","2.271288","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4871","2.271294","172.30.1.205","172.30.1.104","TCP","54","41172 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4872","2.273149","172.30.1.205","172.30.1.104","TCP","54","41172 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4873","2.273258","172.30.1.205","172.30.1.104","TCP","74","33810 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905499 TSecr=0 WS=128" "4874","2.273402","172.30.1.104","172.30.1.205","TCP","54","135 > 41172 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4875","2.273446","172.30.1.104","172.30.1.205","TCP","54","135 > 41172 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4876","2.273451","172.30.1.205","172.30.1.104","TCP","54","41172 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4877","2.273523","172.30.1.104","172.30.1.205","TCP","66","49671 > 33810 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4878","2.273532","172.30.1.205","172.30.1.104","TCP","54","33810 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4879","2.273878","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4880","2.274146","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4881","2.274155","172.30.1.205","172.30.1.104","TCP","54","33810 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4882","2.276029","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4883","2.276366","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4884","2.276372","172.30.1.205","172.30.1.104","TCP","54","33810 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4885","2.277726","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4886","2.278785","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4887","2.278795","172.30.1.205","172.30.1.104","TCP","54","33810 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4888","2.279713","172.30.1.205","172.30.1.104","TCP","74","41176 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905506 TSecr=0 WS=128" "4889","2.279970","172.30.1.104","172.30.1.205","TCP","66","135 > 41176 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4890","2.279980","172.30.1.205","172.30.1.104","TCP","54","41176 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4891","2.280322","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4892","2.280582","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4893","2.280590","172.30.1.205","172.30.1.104","TCP","54","41176 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4894","2.282767","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4895","2.283144","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4896","2.283151","172.30.1.205","172.30.1.104","TCP","54","41176 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4897","2.284971","172.30.1.205","172.30.1.104","TCP","54","41176 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4898","2.285079","172.30.1.205","172.30.1.104","TCP","74","33814 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905511 TSecr=0 WS=128" "4899","2.285268","172.30.1.104","172.30.1.205","TCP","54","135 > 41176 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4900","2.285277","172.30.1.104","172.30.1.205","TCP","54","135 > 41176 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4901","2.285282","172.30.1.205","172.30.1.104","TCP","54","41176 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4902","2.285389","172.30.1.104","172.30.1.205","TCP","66","49671 > 33814 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4903","2.285397","172.30.1.205","172.30.1.104","TCP","54","33814 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4904","2.285736","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4905","2.286030","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4906","2.286039","172.30.1.205","172.30.1.104","TCP","54","33814 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4907","2.287891","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4908","2.288222","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4909","2.288229","172.30.1.205","172.30.1.104","TCP","54","33814 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4910","2.289592","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4911","2.291108","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4912","2.291118","172.30.1.205","172.30.1.104","TCP","54","33814 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4913","2.292037","172.30.1.205","172.30.1.104","TCP","74","41180 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905518 TSecr=0 WS=128" "4914","2.292387","172.30.1.104","172.30.1.205","TCP","66","135 > 41180 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4915","2.292397","172.30.1.205","172.30.1.104","TCP","54","41180 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4916","2.292742","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4917","2.293011","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4918","2.293020","172.30.1.205","172.30.1.104","TCP","54","41180 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4919","2.295195","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4920","2.296993","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4921","2.297000","172.30.1.205","172.30.1.104","TCP","54","41180 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4922","2.297851","172.30.1.205","172.30.1.104","TCP","54","33774 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4923","2.297911","172.30.1.205","172.30.1.104","TCP","54","33778 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4924","2.297951","172.30.1.205","172.30.1.104","TCP","54","33782 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4925","2.297984","172.30.1.205","172.30.1.104","TCP","54","33786 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4926","2.298016","172.30.1.205","172.30.1.104","TCP","54","33790 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4927","2.298044","172.30.1.205","172.30.1.104","TCP","54","33794 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4928","2.298071","172.30.1.205","172.30.1.104","TCP","54","33798 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4929","2.298098","172.30.1.205","172.30.1.104","TCP","54","33802 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4930","2.298125","172.30.1.205","172.30.1.104","TCP","54","33806 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4931","2.298157","172.30.1.205","172.30.1.104","TCP","54","33810 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4932","2.298184","172.30.1.205","172.30.1.104","TCP","54","33814 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4933","2.298268","172.30.1.205","172.30.1.104","TCP","54","33770 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "4934","2.298351","172.30.1.104","172.30.1.205","TCP","54","49671 > 33774 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4935","2.298369","172.30.1.104","172.30.1.205","TCP","54","49671 > 33778 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4936","2.298389","172.30.1.104","172.30.1.205","TCP","54","49671 > 33782 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4937","2.298412","172.30.1.104","172.30.1.205","TCP","54","49671 > 33786 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4938","2.298435","172.30.1.104","172.30.1.205","TCP","54","49671 > 33790 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4939","2.298455","172.30.1.104","172.30.1.205","TCP","54","49671 > 33794 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4940","2.298483","172.30.1.104","172.30.1.205","TCP","54","49671 > 33798 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4941","2.298497","172.30.1.104","172.30.1.205","TCP","54","49671 > 33802 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4942","2.298517","172.30.1.104","172.30.1.205","TCP","54","49671 > 33806 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4943","2.298606","172.30.1.104","172.30.1.205","TCP","54","49671 > 33810 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4944","2.298624","172.30.1.104","172.30.1.205","TCP","54","49671 > 33790 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4945","2.298631","172.30.1.205","172.30.1.104","TCP","54","33790 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4946","2.298646","172.30.1.104","172.30.1.205","TCP","54","49671 > 33786 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4947","2.298649","172.30.1.205","172.30.1.104","TCP","54","33786 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4948","2.298669","172.30.1.104","172.30.1.205","TCP","54","49671 > 33774 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4949","2.298672","172.30.1.205","172.30.1.104","TCP","54","33774 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4950","2.298689","172.30.1.104","172.30.1.205","TCP","54","49671 > 33810 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4951","2.298692","172.30.1.205","172.30.1.104","TCP","54","33810 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4952","2.298707","172.30.1.104","172.30.1.205","TCP","54","49671 > 33806 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4953","2.298710","172.30.1.205","172.30.1.104","TCP","54","33806 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4954","2.298726","172.30.1.104","172.30.1.205","TCP","54","49671 > 33802 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4955","2.298730","172.30.1.205","172.30.1.104","TCP","54","33802 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4956","2.298746","172.30.1.104","172.30.1.205","TCP","54","49671 > 33798 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4957","2.298750","172.30.1.205","172.30.1.104","TCP","54","33798 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4958","2.298766","172.30.1.104","172.30.1.205","TCP","54","49671 > 33794 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4959","2.298770","172.30.1.205","172.30.1.104","TCP","54","33794 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4960","2.298786","172.30.1.104","172.30.1.205","TCP","54","49671 > 33778 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4961","2.298789","172.30.1.205","172.30.1.104","TCP","54","33778 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4962","2.298806","172.30.1.104","172.30.1.205","TCP","54","49671 > 33782 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4963","2.298810","172.30.1.205","172.30.1.104","TCP","54","33782 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4964","2.299030","172.30.1.104","172.30.1.205","TCP","54","49671 > 33814 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4965","2.299049","172.30.1.104","172.30.1.205","TCP","54","49671 > 33770 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4966","2.299069","172.30.1.104","172.30.1.205","TCP","54","49671 > 33814 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4967","2.299074","172.30.1.205","172.30.1.104","TCP","54","33814 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4968","2.299089","172.30.1.104","172.30.1.205","TCP","54","49671 > 33770 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "4969","2.299092","172.30.1.205","172.30.1.104","TCP","54","33770 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "4970","2.299853","172.30.1.205","172.30.1.104","TCP","54","41180 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4971","2.299975","172.30.1.205","172.30.1.104","TCP","74","33818 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905526 TSecr=0 WS=128" "4972","2.300100","172.30.1.104","172.30.1.205","TCP","54","135 > 41180 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4973","2.300121","172.30.1.104","172.30.1.205","TCP","54","135 > 41180 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4974","2.300127","172.30.1.205","172.30.1.104","TCP","54","41180 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "4975","2.300230","172.30.1.104","172.30.1.205","TCP","66","49671 > 33818 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4976","2.300239","172.30.1.205","172.30.1.104","TCP","54","33818 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4977","2.300591","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "4978","2.300875","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4979","2.300884","172.30.1.205","172.30.1.104","TCP","54","33818 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4980","2.302780","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "4981","2.303145","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "4982","2.303151","172.30.1.205","172.30.1.104","TCP","54","33818 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "4983","2.304512","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "4984","2.305582","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "4985","2.305591","172.30.1.205","172.30.1.104","TCP","54","33818 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "4986","2.306547","172.30.1.205","172.30.1.104","TCP","74","41184 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905532 TSecr=0 WS=128" "4987","2.306830","172.30.1.104","172.30.1.205","TCP","66","135 > 41184 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "4988","2.306841","172.30.1.205","172.30.1.104","TCP","54","41184 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "4989","2.307186","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "4990","2.307455","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "4991","2.307464","172.30.1.205","172.30.1.104","TCP","54","41184 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "4992","2.309662","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "4993","2.310023","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "4994","2.310030","172.30.1.205","172.30.1.104","TCP","54","41184 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "4995","2.311818","172.30.1.205","172.30.1.104","TCP","54","41184 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "4996","2.311929","172.30.1.205","172.30.1.104","TCP","74","33822 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905538 TSecr=0 WS=128" "4997","2.312094","172.30.1.104","172.30.1.205","TCP","54","135 > 41184 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4998","2.312102","172.30.1.104","172.30.1.205","TCP","54","135 > 41184 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "4999","2.312108","172.30.1.205","172.30.1.104","TCP","54","41184 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5000","2.312208","172.30.1.104","172.30.1.205","TCP","66","49671 > 33822 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5001","2.312216","172.30.1.205","172.30.1.104","TCP","54","33822 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5002","2.312558","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5003","2.312856","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5004","2.312872","172.30.1.205","172.30.1.104","TCP","54","33822 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5005","2.314808","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5006","2.315171","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5007","2.315178","172.30.1.205","172.30.1.104","TCP","54","33822 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5008","2.316512","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5009","2.317547","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5010","2.317557","172.30.1.205","172.30.1.104","TCP","54","33822 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5011","2.318507","172.30.1.205","172.30.1.104","TCP","74","41188 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905544 TSecr=0 WS=128" "5012","2.318831","172.30.1.104","172.30.1.205","TCP","66","135 > 41188 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5013","2.318841","172.30.1.205","172.30.1.104","TCP","54","41188 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5014","2.319184","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5015","2.319481","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5016","2.319490","172.30.1.205","172.30.1.104","TCP","54","41188 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5017","2.321683","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5018","2.322091","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5019","2.322098","172.30.1.205","172.30.1.104","TCP","54","41188 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5020","2.323882","172.30.1.205","172.30.1.104","TCP","54","41188 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5021","2.323991","172.30.1.205","172.30.1.104","TCP","74","33826 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905550 TSecr=0 WS=128" "5022","2.324206","172.30.1.104","172.30.1.205","TCP","54","135 > 41188 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5023","2.324215","172.30.1.104","172.30.1.205","TCP","54","135 > 41188 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5024","2.324220","172.30.1.205","172.30.1.104","TCP","54","41188 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5025","2.324315","172.30.1.104","172.30.1.205","TCP","66","49671 > 33826 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5026","2.324324","172.30.1.205","172.30.1.104","TCP","54","33826 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5027","2.324664","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5028","2.324968","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5029","2.324980","172.30.1.205","172.30.1.104","TCP","54","33826 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5030","2.326925","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5031","2.327286","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5032","2.327293","172.30.1.205","172.30.1.104","TCP","54","33826 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5033","2.328658","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5034","2.329690","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5035","2.329701","172.30.1.205","172.30.1.104","TCP","54","33826 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5036","2.330667","172.30.1.205","172.30.1.104","TCP","74","41192 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905557 TSecr=0 WS=128" "5037","2.330947","172.30.1.104","172.30.1.205","TCP","66","135 > 41192 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5038","2.330958","172.30.1.205","172.30.1.104","TCP","54","41192 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5039","2.331305","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5040","2.331572","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5041","2.331582","172.30.1.205","172.30.1.104","TCP","54","41192 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5042","2.333779","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5043","2.334135","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5044","2.334141","172.30.1.205","172.30.1.104","TCP","54","41192 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5045","2.335941","172.30.1.205","172.30.1.104","TCP","54","41192 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5046","2.336053","172.30.1.205","172.30.1.104","TCP","74","33830 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905562 TSecr=0 WS=128" "5047","2.336232","172.30.1.104","172.30.1.205","TCP","54","135 > 41192 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5048","2.336242","172.30.1.104","172.30.1.205","TCP","54","135 > 41192 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5049","2.336247","172.30.1.205","172.30.1.104","TCP","54","41192 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5050","2.336323","172.30.1.104","172.30.1.205","TCP","66","49671 > 33830 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5051","2.336332","172.30.1.205","172.30.1.104","TCP","54","33830 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5052","2.336678","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5053","2.336943","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5054","2.336950","172.30.1.205","172.30.1.104","TCP","54","33830 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5055","2.338821","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5056","2.339173","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5057","2.339179","172.30.1.205","172.30.1.104","TCP","54","33830 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5058","2.340522","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5059","2.341579","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5060","2.341590","172.30.1.205","172.30.1.104","TCP","54","33830 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5061","2.342538","172.30.1.205","172.30.1.104","TCP","74","41196 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905568 TSecr=0 WS=128" "5062","2.342801","172.30.1.104","172.30.1.205","TCP","66","135 > 41196 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5063","2.342812","172.30.1.205","172.30.1.104","TCP","54","41196 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5064","2.343159","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5065","2.343424","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5066","2.343433","172.30.1.205","172.30.1.104","TCP","54","41196 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5067","2.345639","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5068","2.345997","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5069","2.346003","172.30.1.205","172.30.1.104","TCP","54","41196 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5070","2.347819","172.30.1.205","172.30.1.104","TCP","54","41196 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5071","2.347931","172.30.1.205","172.30.1.104","TCP","74","33834 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905574 TSecr=0 WS=128" "5072","2.348083","172.30.1.104","172.30.1.205","TCP","54","135 > 41196 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5073","2.348092","172.30.1.104","172.30.1.205","TCP","54","135 > 41196 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5074","2.348098","172.30.1.205","172.30.1.104","TCP","54","41196 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5075","2.348189","172.30.1.104","172.30.1.205","TCP","66","49671 > 33834 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5076","2.348197","172.30.1.205","172.30.1.104","TCP","54","33834 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5077","2.348539","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5078","2.348792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5079","2.348802","172.30.1.205","172.30.1.104","TCP","54","33834 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5080","2.350707","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5081","2.351054","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5082","2.351060","172.30.1.205","172.30.1.104","TCP","54","33834 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5083","2.352406","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5084","2.353404","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5085","2.353413","172.30.1.205","172.30.1.104","TCP","54","33834 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5086","2.354358","172.30.1.205","172.30.1.104","TCP","74","41200 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905580 TSecr=0 WS=128" "5087","2.354676","172.30.1.104","172.30.1.205","TCP","66","135 > 41200 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5088","2.354687","172.30.1.205","172.30.1.104","TCP","54","41200 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5089","2.355036","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5090","2.355306","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5091","2.355314","172.30.1.205","172.30.1.104","TCP","54","41200 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5092","2.357526","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5093","2.357906","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5094","2.357913","172.30.1.205","172.30.1.104","TCP","54","41200 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5095","2.359725","172.30.1.205","172.30.1.104","TCP","54","41200 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5096","2.359839","172.30.1.205","172.30.1.104","TCP","74","33838 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905586 TSecr=0 WS=128" "5097","2.359996","172.30.1.104","172.30.1.205","TCP","54","135 > 41200 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5098","2.360020","172.30.1.104","172.30.1.205","TCP","54","135 > 41200 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5099","2.360026","172.30.1.205","172.30.1.104","TCP","54","41200 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5100","2.360109","172.30.1.104","172.30.1.205","TCP","66","49671 > 33838 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5101","2.360118","172.30.1.205","172.30.1.104","TCP","54","33838 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5102","2.360463","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5103","2.360745","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5104","2.360754","172.30.1.205","172.30.1.104","TCP","54","33838 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5105","2.362659","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5106","2.363760","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5107","2.363766","172.30.1.205","172.30.1.104","TCP","54","33838 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5108","2.365163","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5109","2.366223","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5110","2.366233","172.30.1.205","172.30.1.104","TCP","54","33838 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5111","2.367164","172.30.1.205","172.30.1.104","TCP","74","41204 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905593 TSecr=0 WS=128" "5112","2.367501","172.30.1.104","172.30.1.205","TCP","66","135 > 41204 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5113","2.367512","172.30.1.205","172.30.1.104","TCP","54","41204 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5114","2.367860","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5115","2.368135","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5116","2.368144","172.30.1.205","172.30.1.104","TCP","54","41204 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5117","2.370378","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5118","2.370745","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5119","2.370752","172.30.1.205","172.30.1.104","TCP","54","41204 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5120","2.372555","172.30.1.205","172.30.1.104","TCP","54","41204 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5121","2.372667","172.30.1.205","172.30.1.104","TCP","74","33842 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905599 TSecr=0 WS=128" "5122","2.372794","172.30.1.104","172.30.1.205","TCP","54","135 > 41204 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5123","2.372850","172.30.1.104","172.30.1.205","TCP","54","135 > 41204 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5124","2.372856","172.30.1.205","172.30.1.104","TCP","54","41204 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5125","2.372960","172.30.1.104","172.30.1.205","TCP","66","49671 > 33842 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5126","2.372968","172.30.1.205","172.30.1.104","TCP","54","33842 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5127","2.373320","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5128","2.373586","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5129","2.373595","172.30.1.205","172.30.1.104","TCP","54","33842 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5130","2.375474","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5131","2.375811","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5132","2.375817","172.30.1.205","172.30.1.104","TCP","54","33842 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5133","2.377210","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5134","2.378220","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5135","2.378230","172.30.1.205","172.30.1.104","TCP","54","33842 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5136","2.379163","172.30.1.205","172.30.1.104","TCP","74","41208 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905605 TSecr=0 WS=128" "5137","2.379453","172.30.1.104","172.30.1.205","TCP","66","135 > 41208 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5138","2.379463","172.30.1.205","172.30.1.104","TCP","54","41208 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5139","2.379823","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5140","2.380099","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5141","2.380108","172.30.1.205","172.30.1.104","TCP","54","41208 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5142","2.382338","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5143","2.382700","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5144","2.382707","172.30.1.205","172.30.1.104","TCP","54","41208 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5145","2.384532","172.30.1.205","172.30.1.104","TCP","54","41208 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5146","2.384656","172.30.1.205","172.30.1.104","TCP","74","33846 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905611 TSecr=0 WS=128" "5147","2.384844","172.30.1.104","172.30.1.205","TCP","54","135 > 41208 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5148","2.384855","172.30.1.104","172.30.1.205","TCP","54","135 > 41208 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5149","2.384862","172.30.1.205","172.30.1.104","TCP","54","41208 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5150","2.384930","172.30.1.104","172.30.1.205","TCP","66","49671 > 33846 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5151","2.384939","172.30.1.205","172.30.1.104","TCP","54","33846 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5152","2.385292","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5153","2.385555","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5154","2.385564","172.30.1.205","172.30.1.104","TCP","54","33846 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5155","2.387438","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5156","2.387781","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5157","2.387787","172.30.1.205","172.30.1.104","TCP","54","33846 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5158","2.389186","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5159","2.390206","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5160","2.390215","172.30.1.205","172.30.1.104","TCP","54","33846 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5161","2.391169","172.30.1.205","172.30.1.104","TCP","74","41212 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905617 TSecr=0 WS=128" "5162","2.391444","172.30.1.104","172.30.1.205","TCP","66","135 > 41212 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5163","2.391455","172.30.1.205","172.30.1.104","TCP","54","41212 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5164","2.391810","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5165","2.392079","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5166","2.392088","172.30.1.205","172.30.1.104","TCP","54","41212 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5167","2.394285","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5168","2.394694","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5169","2.394700","172.30.1.205","172.30.1.104","TCP","54","41212 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5170","2.396503","172.30.1.205","172.30.1.104","TCP","54","41212 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5171","2.396616","172.30.1.205","172.30.1.104","TCP","74","33850 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905623 TSecr=0 WS=128" "5172","2.396763","172.30.1.104","172.30.1.205","TCP","54","135 > 41212 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5173","2.396812","172.30.1.104","172.30.1.205","TCP","54","135 > 41212 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5174","2.396819","172.30.1.205","172.30.1.104","TCP","54","41212 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5175","2.396888","172.30.1.104","172.30.1.205","TCP","66","49671 > 33850 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5176","2.396897","172.30.1.205","172.30.1.104","TCP","54","33850 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5177","2.397239","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5178","2.397589","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5179","2.397596","172.30.1.205","172.30.1.104","TCP","54","33850 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5180","2.399447","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5181","2.399826","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5182","2.399832","172.30.1.205","172.30.1.104","TCP","54","33850 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5183","2.401212","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5184","2.402292","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5185","2.402302","172.30.1.205","172.30.1.104","TCP","54","33850 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5186","2.403250","172.30.1.205","172.30.1.104","TCP","74","41216 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905629 TSecr=0 WS=128" "5187","2.403525","172.30.1.104","172.30.1.205","TCP","66","135 > 41216 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5188","2.403536","172.30.1.205","172.30.1.104","TCP","54","41216 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5189","2.403885","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5190","2.404148","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5191","2.404157","172.30.1.205","172.30.1.104","TCP","54","41216 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5192","2.406374","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5193","2.406793","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5194","2.406799","172.30.1.205","172.30.1.104","TCP","54","41216 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5195","2.408623","172.30.1.205","172.30.1.104","TCP","54","41216 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5196","2.408746","172.30.1.205","172.30.1.104","TCP","74","33854 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905635 TSecr=0 WS=128" "5197","2.408895","172.30.1.104","172.30.1.205","TCP","54","135 > 41216 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5198","2.408905","172.30.1.104","172.30.1.205","TCP","54","135 > 41216 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5199","2.408912","172.30.1.205","172.30.1.104","TCP","54","41216 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5200","2.409008","172.30.1.104","172.30.1.205","TCP","66","49671 > 33854 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5201","2.409016","172.30.1.205","172.30.1.104","TCP","54","33854 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5202","2.409388","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5203","2.409656","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5204","2.409665","172.30.1.205","172.30.1.104","TCP","54","33854 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5205","2.411561","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5206","2.411908","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5207","2.411914","172.30.1.205","172.30.1.104","TCP","54","33854 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5208","2.413293","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5209","2.414311","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5210","2.414320","172.30.1.205","172.30.1.104","TCP","54","33854 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5211","2.415244","172.30.1.205","172.30.1.104","TCP","74","41220 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905641 TSecr=0 WS=128" "5212","2.415532","172.30.1.104","172.30.1.205","TCP","66","135 > 41220 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5213","2.415543","172.30.1.205","172.30.1.104","TCP","54","41220 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5214","2.415894","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5215","2.416177","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5216","2.416186","172.30.1.205","172.30.1.104","TCP","54","41220 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5217","2.418399","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5218","2.418760","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5219","2.418768","172.30.1.205","172.30.1.104","TCP","54","41220 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5220","2.420577","172.30.1.205","172.30.1.104","TCP","54","41220 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5221","2.420689","172.30.1.205","172.30.1.104","TCP","74","33858 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905647 TSecr=0 WS=128" "5222","2.420820","172.30.1.104","172.30.1.205","TCP","54","135 > 41220 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5223","2.420866","172.30.1.104","172.30.1.205","TCP","54","135 > 41220 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5224","2.420872","172.30.1.205","172.30.1.104","TCP","54","41220 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5225","2.420944","172.30.1.104","172.30.1.205","TCP","66","49671 > 33858 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5226","2.420952","172.30.1.205","172.30.1.104","TCP","54","33858 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5227","2.421308","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5228","2.421600","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5229","2.421609","172.30.1.205","172.30.1.104","TCP","54","33858 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5230","2.423488","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5231","2.423834","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5232","2.423840","172.30.1.205","172.30.1.104","TCP","54","33858 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5233","2.425217","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5234","2.426237","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5235","2.426246","172.30.1.205","172.30.1.104","TCP","54","33858 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5236","2.427182","172.30.1.205","172.30.1.104","TCP","74","41224 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905653 TSecr=0 WS=128" "5237","2.427466","172.30.1.104","172.30.1.205","TCP","66","135 > 41224 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5238","2.427477","172.30.1.205","172.30.1.104","TCP","54","41224 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5239","2.427824","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5240","2.428085","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5241","2.428095","172.30.1.205","172.30.1.104","TCP","54","41224 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5242","2.430294","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5243","2.430705","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5244","2.430712","172.30.1.205","172.30.1.104","TCP","54","41224 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5245","2.432526","172.30.1.205","172.30.1.104","TCP","54","41224 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5246","2.432637","172.30.1.205","172.30.1.104","TCP","74","33862 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905659 TSecr=0 WS=128" "5247","2.432815","172.30.1.104","172.30.1.205","TCP","54","135 > 41224 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5248","2.432824","172.30.1.104","172.30.1.205","TCP","54","135 > 41224 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5249","2.432830","172.30.1.205","172.30.1.104","TCP","54","41224 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5250","2.432904","172.30.1.104","172.30.1.205","TCP","66","49671 > 33862 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5251","2.432912","172.30.1.205","172.30.1.104","TCP","54","33862 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5252","2.433263","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5253","2.433551","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5254","2.433560","172.30.1.205","172.30.1.104","TCP","54","33862 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5255","2.435424","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5256","2.435771","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5257","2.435777","172.30.1.205","172.30.1.104","TCP","54","33862 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5258","2.437155","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5259","2.438195","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5260","2.438204","172.30.1.205","172.30.1.104","TCP","54","33862 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5261","2.439125","172.30.1.205","172.30.1.104","TCP","74","41228 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905665 TSecr=0 WS=128" "5262","2.439404","172.30.1.104","172.30.1.205","TCP","66","135 > 41228 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5263","2.439415","172.30.1.205","172.30.1.104","TCP","54","41228 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5264","2.439767","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5265","2.440031","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5266","2.440040","172.30.1.205","172.30.1.104","TCP","54","41228 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5267","2.442255","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5268","2.442649","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5269","2.442656","172.30.1.205","172.30.1.104","TCP","54","41228 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5270","2.443495","172.30.1.205","172.30.1.104","TCP","54","33822 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5271","2.443553","172.30.1.205","172.30.1.104","TCP","54","33826 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5272","2.443593","172.30.1.205","172.30.1.104","TCP","54","33830 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5273","2.443628","172.30.1.205","172.30.1.104","TCP","54","33834 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5274","2.443661","172.30.1.205","172.30.1.104","TCP","54","33838 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5275","2.443693","172.30.1.205","172.30.1.104","TCP","54","33842 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5276","2.443724","172.30.1.205","172.30.1.104","TCP","54","33846 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5277","2.443750","172.30.1.205","172.30.1.104","TCP","54","33850 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5278","2.443777","172.30.1.205","172.30.1.104","TCP","54","33854 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5279","2.443799","172.30.1.205","172.30.1.104","TCP","54","33858 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5280","2.443820","172.30.1.205","172.30.1.104","TCP","54","33862 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5281","2.443895","172.30.1.205","172.30.1.104","TCP","54","33818 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5282","2.444097","172.30.1.104","172.30.1.205","TCP","54","49671 > 33822 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5283","2.444107","172.30.1.104","172.30.1.205","TCP","54","49671 > 33826 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5284","2.444110","172.30.1.104","172.30.1.205","TCP","54","49671 > 33822 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5285","2.444117","172.30.1.205","172.30.1.104","TCP","54","33822 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5286","2.444124","172.30.1.104","172.30.1.205","TCP","54","49671 > 33826 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5287","2.444126","172.30.1.205","172.30.1.104","TCP","54","33826 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5288","2.444127","172.30.1.104","172.30.1.205","TCP","54","49671 > 33830 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5289","2.444131","172.30.1.104","172.30.1.205","TCP","54","49671 > 33834 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5290","2.444137","172.30.1.104","172.30.1.205","TCP","54","49671 > 33830 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5291","2.444139","172.30.1.205","172.30.1.104","TCP","54","33830 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5292","2.444141","172.30.1.104","172.30.1.205","TCP","54","49671 > 33834 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5293","2.444143","172.30.1.205","172.30.1.104","TCP","54","33834 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5294","2.444144","172.30.1.104","172.30.1.205","TCP","54","49671 > 33838 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5295","2.444147","172.30.1.104","172.30.1.205","TCP","54","49671 > 33842 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5296","2.444540","172.30.1.104","172.30.1.205","TCP","54","49671 > 33838 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5297","2.444547","172.30.1.205","172.30.1.104","TCP","54","33838 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5298","2.444554","172.30.1.104","172.30.1.205","TCP","54","49671 > 33846 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5299","2.444564","172.30.1.104","172.30.1.205","TCP","54","49671 > 33842 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5300","2.444566","172.30.1.205","172.30.1.104","TCP","54","33842 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5301","2.444567","172.30.1.104","172.30.1.205","TCP","54","49671 > 33846 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5302","2.444569","172.30.1.205","172.30.1.104","TCP","54","33846 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5303","2.444570","172.30.1.104","172.30.1.205","TCP","54","49671 > 33850 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5304","2.444573","172.30.1.104","172.30.1.205","TCP","54","49671 > 33854 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5305","2.444575","172.30.1.104","172.30.1.205","TCP","54","49671 > 33858 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5306","2.444578","172.30.1.104","172.30.1.205","TCP","54","49671 > 33862 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5307","2.444580","172.30.1.104","172.30.1.205","TCP","54","49671 > 33862 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5308","2.444582","172.30.1.205","172.30.1.104","TCP","54","33862 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5309","2.444583","172.30.1.104","172.30.1.205","TCP","54","49671 > 33858 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5310","2.444585","172.30.1.205","172.30.1.104","TCP","54","33858 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5311","2.444587","172.30.1.104","172.30.1.205","TCP","54","49671 > 33850 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5312","2.444589","172.30.1.205","172.30.1.104","TCP","54","33850 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5313","2.444593","172.30.1.104","172.30.1.205","TCP","54","49671 > 33854 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5314","2.444595","172.30.1.205","172.30.1.104","TCP","54","33854 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5315","2.444597","172.30.1.104","172.30.1.205","TCP","54","49671 > 33818 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5316","2.444599","172.30.1.104","172.30.1.205","TCP","54","49671 > 33818 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5317","2.444601","172.30.1.205","172.30.1.104","TCP","54","33818 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5318","2.445337","172.30.1.205","172.30.1.104","TCP","54","41228 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5319","2.445452","172.30.1.205","172.30.1.104","TCP","74","33866 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905671 TSecr=0 WS=128" "5320","2.445575","172.30.1.104","172.30.1.205","TCP","54","135 > 41228 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5321","2.445595","172.30.1.104","172.30.1.205","TCP","54","135 > 41228 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5322","2.445600","172.30.1.205","172.30.1.104","TCP","54","41228 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5323","2.445714","172.30.1.104","172.30.1.205","TCP","66","49671 > 33866 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5324","2.445722","172.30.1.205","172.30.1.104","TCP","54","33866 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5325","2.446074","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5326","2.446343","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5327","2.446357","172.30.1.205","172.30.1.104","TCP","54","33866 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5328","2.448306","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5329","2.448717","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5330","2.448724","172.30.1.205","172.30.1.104","TCP","54","33866 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5331","2.450123","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5332","2.451256","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5333","2.451268","172.30.1.205","172.30.1.104","TCP","54","33866 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5334","2.452262","172.30.1.205","172.30.1.104","TCP","74","41232 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905678 TSecr=0 WS=128" "5335","2.452579","172.30.1.104","172.30.1.205","TCP","66","135 > 41232 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5336","2.452590","172.30.1.205","172.30.1.104","TCP","54","41232 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5337","2.452988","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5338","2.453271","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5339","2.453280","172.30.1.205","172.30.1.104","TCP","54","41232 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5340","2.455485","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5341","2.455868","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5342","2.455875","172.30.1.205","172.30.1.104","TCP","54","41232 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5343","2.457718","172.30.1.205","172.30.1.104","TCP","54","41232 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5344","2.457839","172.30.1.205","172.30.1.104","TCP","74","33870 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905684 TSecr=0 WS=128" "5345","2.457974","172.30.1.104","172.30.1.205","TCP","54","135 > 41232 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5346","2.458019","172.30.1.104","172.30.1.205","TCP","54","135 > 41232 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5347","2.458025","172.30.1.205","172.30.1.104","TCP","54","41232 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5348","2.458093","172.30.1.104","172.30.1.205","TCP","66","49671 > 33870 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5349","2.458102","172.30.1.205","172.30.1.104","TCP","54","33870 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5350","2.458452","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5351","2.461033","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5352","2.461042","172.30.1.205","172.30.1.104","TCP","54","33870 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5353","2.462930","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5354","2.463290","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5355","2.463297","172.30.1.205","172.30.1.104","TCP","54","33870 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5356","2.464662","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5357","2.465770","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5358","2.465781","172.30.1.205","172.30.1.104","TCP","54","33870 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5359","2.466767","172.30.1.205","172.30.1.104","TCP","74","41236 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905693 TSecr=0 WS=128" "5360","2.467135","172.30.1.104","172.30.1.205","TCP","66","135 > 41236 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5361","2.467146","172.30.1.205","172.30.1.104","TCP","54","41236 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5362","2.467500","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5363","2.467780","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5364","2.467788","172.30.1.205","172.30.1.104","TCP","54","41236 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5365","2.470018","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5366","2.470400","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5367","2.470407","172.30.1.205","172.30.1.104","TCP","54","41236 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5368","2.472215","172.30.1.205","172.30.1.104","TCP","54","41236 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5369","2.472330","172.30.1.205","172.30.1.104","TCP","74","33874 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905698 TSecr=0 WS=128" "5370","2.472560","172.30.1.104","172.30.1.205","TCP","54","135 > 41236 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5371","2.472569","172.30.1.104","172.30.1.205","TCP","54","135 > 41236 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5372","2.472575","172.30.1.205","172.30.1.104","TCP","54","41236 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5373","2.472674","172.30.1.104","172.30.1.205","TCP","66","49671 > 33874 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5374","2.472683","172.30.1.205","172.30.1.104","TCP","54","33874 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5375","2.473070","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5376","2.473385","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5377","2.473394","172.30.1.205","172.30.1.104","TCP","54","33874 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5378","2.475257","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5379","2.475611","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5380","2.475617","172.30.1.205","172.30.1.104","TCP","54","33874 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5381","2.477000","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5382","2.478760","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5383","2.478769","172.30.1.205","172.30.1.104","TCP","54","33874 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5384","2.479742","172.30.1.205","172.30.1.104","TCP","74","41240 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905706 TSecr=0 WS=128" "5385","2.480022","172.30.1.104","172.30.1.205","TCP","66","135 > 41240 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5386","2.480033","172.30.1.205","172.30.1.104","TCP","54","41240 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5387","2.480382","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5388","2.480651","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5389","2.480660","172.30.1.205","172.30.1.104","TCP","54","41240 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5390","2.482875","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5391","2.483270","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5392","2.483278","172.30.1.205","172.30.1.104","TCP","54","41240 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5393","2.485137","172.30.1.205","172.30.1.104","TCP","54","41240 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5394","2.485255","172.30.1.205","172.30.1.104","TCP","74","33878 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905711 TSecr=0 WS=128" "5395","2.485411","172.30.1.104","172.30.1.205","TCP","54","135 > 41240 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5396","2.485450","172.30.1.104","172.30.1.205","TCP","54","135 > 41240 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5397","2.485457","172.30.1.205","172.30.1.104","TCP","54","41240 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5398","2.485564","172.30.1.104","172.30.1.205","TCP","66","49671 > 33878 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5399","2.485572","172.30.1.205","172.30.1.104","TCP","54","33878 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5400","2.485919","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5401","2.486194","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5402","2.486201","172.30.1.205","172.30.1.104","TCP","54","33878 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5403","2.488053","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5404","2.488402","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5405","2.488408","172.30.1.205","172.30.1.104","TCP","54","33878 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5406","2.489780","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5407","2.490846","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5408","2.490855","172.30.1.205","172.30.1.104","TCP","54","33878 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5409","2.491795","172.30.1.205","172.30.1.104","TCP","74","41244 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905718 TSecr=0 WS=128" "5410","2.492121","172.30.1.104","172.30.1.205","TCP","66","135 > 41244 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5411","2.492132","172.30.1.205","172.30.1.104","TCP","54","41244 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5412","2.492481","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5413","2.492759","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5414","2.492768","172.30.1.205","172.30.1.104","TCP","54","41244 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5415","2.494958","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5416","2.495317","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5417","2.495324","172.30.1.205","172.30.1.104","TCP","54","41244 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5418","2.497154","172.30.1.205","172.30.1.104","TCP","54","41244 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5419","2.497267","172.30.1.205","172.30.1.104","TCP","74","33882 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905723 TSecr=0 WS=128" "5420","2.497437","172.30.1.104","172.30.1.205","TCP","54","135 > 41244 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5421","2.497446","172.30.1.104","172.30.1.205","TCP","54","135 > 41244 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5422","2.497452","172.30.1.205","172.30.1.104","TCP","54","41244 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5423","2.497531","172.30.1.104","172.30.1.205","TCP","66","49671 > 33882 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5424","2.497539","172.30.1.205","172.30.1.104","TCP","54","33882 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5425","2.497882","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5426","2.498148","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5427","2.498156","172.30.1.205","172.30.1.104","TCP","54","33882 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5428","2.500021","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5429","2.500357","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5430","2.500363","172.30.1.205","172.30.1.104","TCP","54","33882 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5431","2.501733","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5432","2.502853","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5433","2.502863","172.30.1.205","172.30.1.104","TCP","54","33882 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5434","2.503804","172.30.1.205","172.30.1.104","TCP","74","41248 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905730 TSecr=0 WS=128" "5435","2.504100","172.30.1.104","172.30.1.205","TCP","66","135 > 41248 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5436","2.504111","172.30.1.205","172.30.1.104","TCP","54","41248 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5437","2.504458","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5438","2.504754","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5439","2.504763","172.30.1.205","172.30.1.104","TCP","54","41248 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5440","2.506947","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5441","2.507354","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5442","2.507360","172.30.1.205","172.30.1.104","TCP","54","41248 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5443","2.509219","172.30.1.205","172.30.1.104","TCP","54","41248 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5444","2.509330","172.30.1.205","172.30.1.104","TCP","74","33886 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905735 TSecr=0 WS=128" "5445","2.509491","172.30.1.104","172.30.1.205","TCP","54","135 > 41248 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5446","2.509500","172.30.1.104","172.30.1.205","TCP","54","135 > 41248 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5447","2.509506","172.30.1.205","172.30.1.104","TCP","54","41248 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5448","2.509607","172.30.1.104","172.30.1.205","TCP","66","49671 > 33886 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5449","2.509616","172.30.1.205","172.30.1.104","TCP","54","33886 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5450","2.509978","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5451","2.510249","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5452","2.510258","172.30.1.205","172.30.1.104","TCP","54","33886 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5453","2.512114","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5454","2.512512","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5455","2.512518","172.30.1.205","172.30.1.104","TCP","54","33886 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5456","2.513894","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5457","2.514969","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5458","2.514978","172.30.1.205","172.30.1.104","TCP","54","33886 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5459","2.515918","172.30.1.205","172.30.1.104","TCP","74","41252 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905742 TSecr=0 WS=128" "5460","2.516215","172.30.1.104","172.30.1.205","TCP","66","135 > 41252 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5461","2.516226","172.30.1.205","172.30.1.104","TCP","54","41252 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5462","2.516575","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5463","2.516859","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5464","2.516868","172.30.1.205","172.30.1.104","TCP","54","41252 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5465","2.519071","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5466","2.519449","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5467","2.519456","172.30.1.205","172.30.1.104","TCP","54","41252 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5468","2.521283","172.30.1.205","172.30.1.104","TCP","54","41252 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5469","2.521395","172.30.1.205","172.30.1.104","TCP","74","33890 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905747 TSecr=0 WS=128" "5470","2.521552","172.30.1.104","172.30.1.205","TCP","54","135 > 41252 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5471","2.521562","172.30.1.104","172.30.1.205","TCP","54","135 > 41252 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5472","2.521567","172.30.1.205","172.30.1.104","TCP","54","41252 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5473","2.521674","172.30.1.104","172.30.1.205","TCP","66","49671 > 33890 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5474","2.521683","172.30.1.205","172.30.1.104","TCP","54","33890 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5475","2.522030","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5476","2.523553","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5477","2.523560","172.30.1.205","172.30.1.104","TCP","54","33890 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5478","2.525467","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5479","2.525814","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5480","2.525820","172.30.1.205","172.30.1.104","TCP","54","33890 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5481","2.527173","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5482","2.528297","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5483","2.528306","172.30.1.205","172.30.1.104","TCP","54","33890 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5484","2.529272","172.30.1.205","172.30.1.104","TCP","74","41256 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905755 TSecr=0 WS=128" "5485","2.529581","172.30.1.104","172.30.1.205","TCP","66","135 > 41256 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5486","2.529592","172.30.1.205","172.30.1.104","TCP","54","41256 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5487","2.529941","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5488","2.530210","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5489","2.530219","172.30.1.205","172.30.1.104","TCP","54","41256 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5490","2.532398","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5491","2.532809","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5492","2.532816","172.30.1.205","172.30.1.104","TCP","54","41256 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5493","2.534638","172.30.1.205","172.30.1.104","TCP","54","41256 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5494","2.534751","172.30.1.205","172.30.1.104","TCP","74","33894 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905761 TSecr=0 WS=128" "5495","2.534896","172.30.1.104","172.30.1.205","TCP","54","135 > 41256 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5496","2.534905","172.30.1.104","172.30.1.205","TCP","54","135 > 41256 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5497","2.534911","172.30.1.205","172.30.1.104","TCP","54","41256 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5498","2.534998","172.30.1.104","172.30.1.205","TCP","66","49671 > 33894 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5499","2.535007","172.30.1.205","172.30.1.104","TCP","54","33894 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5500","2.535354","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5501","2.535687","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5502","2.535696","172.30.1.205","172.30.1.104","TCP","54","33894 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5503","2.537599","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5504","2.537935","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5505","2.537942","172.30.1.205","172.30.1.104","TCP","54","33894 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5506","2.539297","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5507","2.540329","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5508","2.540338","172.30.1.205","172.30.1.104","TCP","54","33894 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5509","2.541300","172.30.1.205","172.30.1.104","TCP","74","41260 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905767 TSecr=0 WS=128" "5510","2.541561","172.30.1.104","172.30.1.205","TCP","66","135 > 41260 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5511","2.541572","172.30.1.205","172.30.1.104","TCP","54","41260 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5512","2.541919","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5513","2.542178","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5514","2.542187","172.30.1.205","172.30.1.104","TCP","54","41260 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5515","2.544348","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5516","2.544916","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5517","2.544923","172.30.1.205","172.30.1.104","TCP","54","41260 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5518","2.546732","172.30.1.205","172.30.1.104","TCP","54","41260 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5519","2.546846","172.30.1.205","172.30.1.104","TCP","74","33898 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905773 TSecr=0 WS=128" "5520","2.546992","172.30.1.104","172.30.1.205","TCP","54","135 > 41260 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5521","2.547002","172.30.1.104","172.30.1.205","TCP","54","135 > 41260 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5522","2.547007","172.30.1.205","172.30.1.104","TCP","54","41260 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5523","2.547113","172.30.1.104","172.30.1.205","TCP","66","49671 > 33898 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5524","2.547122","172.30.1.205","172.30.1.104","TCP","54","33898 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5525","2.547465","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5526","2.547727","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5527","2.547736","172.30.1.205","172.30.1.104","TCP","54","33898 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5528","2.549636","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5529","2.549993","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5530","2.549999","172.30.1.205","172.30.1.104","TCP","54","33898 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5531","2.551345","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5532","2.552446","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5533","2.552456","172.30.1.205","172.30.1.104","TCP","54","33898 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5534","2.553424","172.30.1.205","172.30.1.104","TCP","74","41264 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905779 TSecr=0 WS=128" "5535","2.553787","172.30.1.104","172.30.1.205","TCP","66","135 > 41264 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5536","2.553799","172.30.1.205","172.30.1.104","TCP","54","41264 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5537","2.554163","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5538","2.554473","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5539","2.554482","172.30.1.205","172.30.1.104","TCP","54","41264 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5540","2.556660","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5541","2.557057","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5542","2.557064","172.30.1.205","172.30.1.104","TCP","54","41264 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5543","2.558881","172.30.1.205","172.30.1.104","TCP","54","41264 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5544","2.558995","172.30.1.205","172.30.1.104","TCP","74","33902 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905785 TSecr=0 WS=128" "5545","2.559165","172.30.1.104","172.30.1.205","TCP","54","135 > 41264 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5546","2.559176","172.30.1.104","172.30.1.205","TCP","54","135 > 41264 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5547","2.559182","172.30.1.205","172.30.1.104","TCP","54","41264 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5548","2.559283","172.30.1.104","172.30.1.205","TCP","66","49671 > 33902 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5549","2.559292","172.30.1.205","172.30.1.104","TCP","54","33902 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5550","2.559640","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5551","2.562131","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5552","2.562139","172.30.1.205","172.30.1.104","TCP","54","33902 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5553","2.563999","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5554","2.564363","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5555","2.564369","172.30.1.205","172.30.1.104","TCP","54","33902 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5556","2.565740","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5557","2.566865","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5558","2.566874","172.30.1.205","172.30.1.104","TCP","54","33902 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5559","2.567811","172.30.1.205","172.30.1.104","TCP","74","41268 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905794 TSecr=0 WS=128" "5560","2.568152","172.30.1.104","172.30.1.205","TCP","66","135 > 41268 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5561","2.568163","172.30.1.205","172.30.1.104","TCP","54","41268 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5562","2.568512","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5563","2.568805","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5564","2.568815","172.30.1.205","172.30.1.104","TCP","54","41268 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5565","2.571010","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5566","2.571373","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5567","2.571380","172.30.1.205","172.30.1.104","TCP","54","41268 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5568","2.573197","172.30.1.205","172.30.1.104","TCP","54","41268 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5569","2.573309","172.30.1.205","172.30.1.104","TCP","74","33906 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905799 TSecr=0 WS=128" "5570","2.573475","172.30.1.104","172.30.1.205","TCP","54","135 > 41268 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5571","2.573484","172.30.1.104","172.30.1.205","TCP","54","135 > 41268 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5572","2.573490","172.30.1.205","172.30.1.104","TCP","54","41268 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5573","2.573666","172.30.1.104","172.30.1.205","TCP","66","49671 > 33906 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5574","2.573674","172.30.1.205","172.30.1.104","TCP","54","33906 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5575","2.574021","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5576","2.574323","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5577","2.574332","172.30.1.205","172.30.1.104","TCP","54","33906 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5578","2.576213","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5579","2.576729","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5580","2.576736","172.30.1.205","172.30.1.104","TCP","54","33906 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5581","2.578094","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5582","2.579162","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5583","2.579172","172.30.1.205","172.30.1.104","TCP","54","33906 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5584","2.580105","172.30.1.205","172.30.1.104","TCP","74","41272 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905806 TSecr=0 WS=128" "5585","2.580409","172.30.1.104","172.30.1.205","TCP","66","135 > 41272 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5586","2.580420","172.30.1.205","172.30.1.104","TCP","54","41272 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5587","2.580765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5588","2.581040","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5589","2.581049","172.30.1.205","172.30.1.104","TCP","54","41272 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5590","2.583211","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5591","2.583580","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5592","2.583586","172.30.1.205","172.30.1.104","TCP","54","41272 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5593","2.585409","172.30.1.205","172.30.1.104","TCP","54","41272 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5594","2.585521","172.30.1.205","172.30.1.104","TCP","74","33910 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905811 TSecr=0 WS=128" "5595","2.585661","172.30.1.104","172.30.1.205","TCP","54","135 > 41272 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5596","2.585684","172.30.1.104","172.30.1.205","TCP","54","135 > 41272 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5597","2.585690","172.30.1.205","172.30.1.104","TCP","54","41272 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5598","2.585810","172.30.1.104","172.30.1.205","TCP","66","49671 > 33910 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5599","2.585818","172.30.1.205","172.30.1.104","TCP","54","33910 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5600","2.586169","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5601","2.586475","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5602","2.586484","172.30.1.205","172.30.1.104","TCP","54","33910 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5603","2.588343","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5604","2.588680","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5605","2.588687","172.30.1.205","172.30.1.104","TCP","54","33910 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5606","2.590055","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5607","2.591154","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5608","2.591164","172.30.1.205","172.30.1.104","TCP","54","33910 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5609","2.592090","172.30.1.205","172.30.1.104","TCP","74","41276 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905818 TSecr=0 WS=128" "5610","2.592460","172.30.1.104","172.30.1.205","TCP","66","135 > 41276 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5611","2.592471","172.30.1.205","172.30.1.104","TCP","54","41276 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5612","2.592844","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5613","2.593172","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5614","2.593181","172.30.1.205","172.30.1.104","TCP","54","41276 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5615","2.595376","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5616","2.595774","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5617","2.595781","172.30.1.205","172.30.1.104","TCP","54","41276 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5618","2.596617","172.30.1.205","172.30.1.104","TCP","54","33870 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5619","2.596667","172.30.1.205","172.30.1.104","TCP","54","33874 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5620","2.596705","172.30.1.205","172.30.1.104","TCP","54","33878 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5621","2.596739","172.30.1.205","172.30.1.104","TCP","54","33882 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5622","2.596771","172.30.1.205","172.30.1.104","TCP","54","33886 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5623","2.596830","172.30.1.205","172.30.1.104","TCP","54","33890 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5624","2.596864","172.30.1.205","172.30.1.104","TCP","54","33894 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5625","2.596892","172.30.1.205","172.30.1.104","TCP","54","33898 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5626","2.596918","172.30.1.104","172.30.1.205","TCP","54","49671 > 33870 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5627","2.596931","172.30.1.205","172.30.1.104","TCP","54","33902 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5628","2.596936","172.30.1.104","172.30.1.205","TCP","54","49671 > 33874 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5629","2.596973","172.30.1.205","172.30.1.104","TCP","54","33906 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5630","2.596995","172.30.1.205","172.30.1.104","TCP","54","33910 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5631","2.597007","172.30.1.104","172.30.1.205","TCP","54","49671 > 33870 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5632","2.597013","172.30.1.205","172.30.1.104","TCP","54","33870 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5633","2.597027","172.30.1.104","172.30.1.205","TCP","54","49671 > 33878 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5634","2.597047","172.30.1.104","172.30.1.205","TCP","54","49671 > 33874 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5635","2.597050","172.30.1.205","172.30.1.104","TCP","54","33874 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5636","2.597066","172.30.1.104","172.30.1.205","TCP","54","49671 > 33878 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5637","2.597070","172.30.1.205","172.30.1.104","TCP","54","33878 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5638","2.597088","172.30.1.104","172.30.1.205","TCP","54","49671 > 33882 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5639","2.597131","172.30.1.205","172.30.1.104","TCP","54","33866 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5640","2.597250","172.30.1.104","172.30.1.205","TCP","54","49671 > 33886 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5641","2.597268","172.30.1.104","172.30.1.205","TCP","54","49671 > 33882 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5642","2.597273","172.30.1.205","172.30.1.104","TCP","54","33882 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5643","2.597287","172.30.1.104","172.30.1.205","TCP","54","49671 > 33886 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5644","2.597289","172.30.1.205","172.30.1.104","TCP","54","33886 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5645","2.597390","172.30.1.104","172.30.1.205","TCP","54","49671 > 33890 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5646","2.597410","172.30.1.104","172.30.1.205","TCP","54","49671 > 33890 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5647","2.597415","172.30.1.205","172.30.1.104","TCP","54","33890 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5648","2.597430","172.30.1.104","172.30.1.205","TCP","54","49671 > 33898 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5649","2.597453","172.30.1.104","172.30.1.205","TCP","54","49671 > 33894 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5650","2.597477","172.30.1.104","172.30.1.205","TCP","54","49671 > 33902 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5651","2.597498","172.30.1.104","172.30.1.205","TCP","54","49671 > 33898 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5652","2.597503","172.30.1.205","172.30.1.104","TCP","54","33898 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5653","2.597518","172.30.1.104","172.30.1.205","TCP","54","49671 > 33906 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5654","2.597536","172.30.1.104","172.30.1.205","TCP","54","49671 > 33910 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5655","2.597618","172.30.1.104","172.30.1.205","TCP","54","49671 > 33910 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5656","2.597623","172.30.1.205","172.30.1.104","TCP","54","33910 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5657","2.597631","172.30.1.104","172.30.1.205","TCP","54","49671 > 33906 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5658","2.597633","172.30.1.205","172.30.1.104","TCP","54","33906 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5659","2.597658","172.30.1.104","172.30.1.205","TCP","54","49671 > 33894 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5660","2.597661","172.30.1.205","172.30.1.104","TCP","54","33894 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5661","2.597677","172.30.1.104","172.30.1.205","TCP","54","49671 > 33902 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5662","2.597680","172.30.1.205","172.30.1.104","TCP","54","33902 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5663","2.597698","172.30.1.104","172.30.1.205","TCP","54","49671 > 33866 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5664","2.597807","172.30.1.104","172.30.1.205","TCP","54","49671 > 33866 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5665","2.597811","172.30.1.205","172.30.1.104","TCP","54","33866 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5666","2.598619","172.30.1.205","172.30.1.104","TCP","54","41276 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5667","2.598730","172.30.1.205","172.30.1.104","TCP","74","33914 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905825 TSecr=0 WS=128" "5668","2.598857","172.30.1.104","172.30.1.205","TCP","54","135 > 41276 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5669","2.598900","172.30.1.104","172.30.1.205","TCP","54","135 > 41276 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5670","2.598906","172.30.1.205","172.30.1.104","TCP","54","41276 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5671","2.599050","172.30.1.104","172.30.1.205","TCP","66","49671 > 33914 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5672","2.599059","172.30.1.205","172.30.1.104","TCP","54","33914 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5673","2.599414","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5674","2.599665","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5675","2.599673","172.30.1.205","172.30.1.104","TCP","54","33914 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5676","2.601600","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5677","2.601954","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5678","2.601961","172.30.1.205","172.30.1.104","TCP","54","33914 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5679","2.603318","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5680","2.604420","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5681","2.604429","172.30.1.205","172.30.1.104","TCP","54","33914 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5682","2.605392","172.30.1.205","172.30.1.104","TCP","74","41280 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905831 TSecr=0 WS=128" "5683","2.605674","172.30.1.104","172.30.1.205","TCP","66","135 > 41280 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5684","2.605685","172.30.1.205","172.30.1.104","TCP","54","41280 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5685","2.606031","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5686","2.606313","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5687","2.606322","172.30.1.205","172.30.1.104","TCP","54","41280 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5688","2.608491","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5689","2.608857","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5690","2.608864","172.30.1.205","172.30.1.104","TCP","54","41280 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5691","2.610675","172.30.1.205","172.30.1.104","TCP","54","41280 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5692","2.610788","172.30.1.205","172.30.1.104","TCP","74","33918 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905837 TSecr=0 WS=128" "5693","2.610940","172.30.1.104","172.30.1.205","TCP","54","135 > 41280 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5694","2.610974","172.30.1.104","172.30.1.205","TCP","54","135 > 41280 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5695","2.610980","172.30.1.205","172.30.1.104","TCP","54","41280 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5696","2.611050","172.30.1.104","172.30.1.205","TCP","66","49671 > 33918 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5697","2.611059","172.30.1.205","172.30.1.104","TCP","54","33918 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5698","2.611404","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5699","2.611670","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5700","2.611679","172.30.1.205","172.30.1.104","TCP","54","33918 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5701","2.613613","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5702","2.613949","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5703","2.613956","172.30.1.205","172.30.1.104","TCP","54","33918 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5704","2.615309","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5705","2.616351","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5706","2.616361","172.30.1.205","172.30.1.104","TCP","54","33918 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5707","2.617314","172.30.1.205","172.30.1.104","TCP","74","41284 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905843 TSecr=0 WS=128" "5708","2.617643","172.30.1.104","172.30.1.205","TCP","66","135 > 41284 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5709","2.617654","172.30.1.205","172.30.1.104","TCP","54","41284 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5710","2.617997","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5711","2.618269","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5712","2.618278","172.30.1.205","172.30.1.104","TCP","54","41284 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5713","2.620436","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5714","2.620801","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5715","2.620808","172.30.1.205","172.30.1.104","TCP","54","41284 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5716","2.622609","172.30.1.205","172.30.1.104","TCP","54","41284 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5717","2.622722","172.30.1.205","172.30.1.104","TCP","74","33922 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905849 TSecr=0 WS=128" "5718","2.622871","172.30.1.104","172.30.1.205","TCP","54","135 > 41284 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5719","2.622880","172.30.1.104","172.30.1.205","TCP","54","135 > 41284 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5720","2.622885","172.30.1.205","172.30.1.104","TCP","54","41284 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5721","2.622991","172.30.1.104","172.30.1.205","TCP","66","49671 > 33922 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5722","2.623003","172.30.1.205","172.30.1.104","TCP","54","33922 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5723","2.623377","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5724","2.623653","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5725","2.623662","172.30.1.205","172.30.1.104","TCP","54","33922 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5726","2.625540","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5727","2.625874","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5728","2.625881","172.30.1.205","172.30.1.104","TCP","54","33922 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5729","2.627238","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5730","2.628316","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5731","2.628325","172.30.1.205","172.30.1.104","TCP","54","33922 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5732","2.629288","172.30.1.205","172.30.1.104","TCP","74","41288 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905855 TSecr=0 WS=128" "5733","2.629549","172.30.1.104","172.30.1.205","TCP","66","135 > 41288 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5734","2.629560","172.30.1.205","172.30.1.104","TCP","54","41288 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5735","2.629907","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5736","2.630221","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5737","2.630230","172.30.1.205","172.30.1.104","TCP","54","41288 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5738","2.632415","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5739","2.632793","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5740","2.632800","172.30.1.205","172.30.1.104","TCP","54","41288 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5741","2.634610","172.30.1.205","172.30.1.104","TCP","54","41288 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5742","2.634727","172.30.1.205","172.30.1.104","TCP","74","33926 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905861 TSecr=0 WS=128" "5743","2.634886","172.30.1.104","172.30.1.205","TCP","54","135 > 41288 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5744","2.634896","172.30.1.104","172.30.1.205","TCP","54","135 > 41288 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5745","2.634902","172.30.1.205","172.30.1.104","TCP","54","41288 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5746","2.635025","172.30.1.104","172.30.1.205","TCP","66","49671 > 33926 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5747","2.635034","172.30.1.205","172.30.1.104","TCP","54","33926 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5748","2.635377","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5749","2.635631","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5750","2.635640","172.30.1.205","172.30.1.104","TCP","54","33926 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5751","2.637543","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5752","2.637892","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5753","2.637898","172.30.1.205","172.30.1.104","TCP","54","33926 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5754","2.639240","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5755","2.640295","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5756","2.640305","172.30.1.205","172.30.1.104","TCP","54","33926 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5757","2.641269","172.30.1.205","172.30.1.104","TCP","74","41292 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905867 TSecr=0 WS=128" "5758","2.641568","172.30.1.104","172.30.1.205","TCP","66","135 > 41292 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5759","2.641578","172.30.1.205","172.30.1.104","TCP","54","41292 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5760","2.641926","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5761","2.642241","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5762","2.642250","172.30.1.205","172.30.1.104","TCP","54","41292 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5763","2.644408","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5764","2.644764","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5765","2.644771","172.30.1.205","172.30.1.104","TCP","54","41292 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5766","2.646575","172.30.1.205","172.30.1.104","TCP","54","41292 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5767","2.646686","172.30.1.205","172.30.1.104","TCP","74","33930 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905873 TSecr=0 WS=128" "5768","2.646812","172.30.1.104","172.30.1.205","TCP","54","135 > 41292 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5769","2.646848","172.30.1.104","172.30.1.205","TCP","54","135 > 41292 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5770","2.646854","172.30.1.205","172.30.1.104","TCP","54","41292 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5771","2.646950","172.30.1.104","172.30.1.205","TCP","66","49671 > 33930 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5772","2.646958","172.30.1.205","172.30.1.104","TCP","54","33930 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5773","2.647299","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5774","2.647575","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5775","2.647584","172.30.1.205","172.30.1.104","TCP","54","33930 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5776","2.649481","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5777","2.649844","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5778","2.649850","172.30.1.205","172.30.1.104","TCP","54","33930 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5779","2.651191","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5780","2.652307","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5781","2.652316","172.30.1.205","172.30.1.104","TCP","54","33930 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5782","2.653265","172.30.1.205","172.30.1.104","TCP","74","41296 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905879 TSecr=0 WS=128" "5783","2.653572","172.30.1.104","172.30.1.205","TCP","66","135 > 41296 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5784","2.653583","172.30.1.205","172.30.1.104","TCP","54","41296 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5785","2.653929","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5786","2.654206","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5787","2.654215","172.30.1.205","172.30.1.104","TCP","54","41296 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5788","2.656369","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5789","2.656731","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5790","2.656737","172.30.1.205","172.30.1.104","TCP","54","41296 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5791","2.658556","172.30.1.205","172.30.1.104","TCP","54","41296 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5792","2.658662","172.30.1.205","172.30.1.104","TCP","74","33934 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905885 TSecr=0 WS=128" "5793","2.659129","172.30.1.104","172.30.1.205","TCP","66","49671 > 33934 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5794","2.659140","172.30.1.205","172.30.1.104","TCP","54","33934 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5795","2.659151","172.30.1.104","172.30.1.205","TCP","54","135 > 41296 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5796","2.659177","172.30.1.104","172.30.1.205","TCP","54","135 > 41296 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5797","2.659182","172.30.1.205","172.30.1.104","TCP","54","41296 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5798","2.659519","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5799","2.659790","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5800","2.659799","172.30.1.205","172.30.1.104","TCP","54","33934 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5801","2.661713","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5802","2.662068","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5803","2.662075","172.30.1.205","172.30.1.104","TCP","54","33934 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5804","2.663407","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5805","2.664506","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5806","2.664516","172.30.1.205","172.30.1.104","TCP","54","33934 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5807","2.665459","172.30.1.205","172.30.1.104","TCP","74","41300 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905891 TSecr=0 WS=128" "5808","2.665740","172.30.1.104","172.30.1.205","TCP","66","135 > 41300 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5809","2.665751","172.30.1.205","172.30.1.104","TCP","54","41300 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5810","2.666097","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5811","2.666385","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5812","2.666394","172.30.1.205","172.30.1.104","TCP","54","41300 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5813","2.668579","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5814","2.671123","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5815","2.671130","172.30.1.205","172.30.1.104","TCP","54","41300 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5816","2.672968","172.30.1.205","172.30.1.104","TCP","54","41300 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5817","2.673079","172.30.1.205","172.30.1.104","TCP","74","33938 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905899 TSecr=0 WS=128" "5818","2.673258","172.30.1.104","172.30.1.205","TCP","54","135 > 41300 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5819","2.673268","172.30.1.104","172.30.1.205","TCP","54","135 > 41300 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5820","2.673274","172.30.1.205","172.30.1.104","TCP","54","41300 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5821","2.673350","172.30.1.104","172.30.1.205","TCP","66","49671 > 33938 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5822","2.673359","172.30.1.205","172.30.1.104","TCP","54","33938 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5823","2.673721","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5824","2.674015","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5825","2.674024","172.30.1.205","172.30.1.104","TCP","54","33938 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5826","2.675921","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5827","2.676476","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5828","2.676483","172.30.1.205","172.30.1.104","TCP","54","33938 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5829","2.677860","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5830","2.678956","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5831","2.678965","172.30.1.205","172.30.1.104","TCP","54","33938 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5832","2.679904","172.30.1.205","172.30.1.104","TCP","74","41304 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905906 TSecr=0 WS=128" "5833","2.680212","172.30.1.104","172.30.1.205","TCP","66","135 > 41304 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5834","2.680223","172.30.1.205","172.30.1.104","TCP","54","41304 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5835","2.680572","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5836","2.680858","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5837","2.680868","172.30.1.205","172.30.1.104","TCP","54","41304 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5838","2.683054","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5839","2.683648","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5840","2.683654","172.30.1.205","172.30.1.104","TCP","54","41304 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5841","2.685482","172.30.1.205","172.30.1.104","TCP","54","41304 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5842","2.685593","172.30.1.205","172.30.1.104","TCP","74","33942 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905912 TSecr=0 WS=128" "5843","2.685781","172.30.1.104","172.30.1.205","TCP","54","135 > 41304 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5844","2.685824","172.30.1.104","172.30.1.205","TCP","54","135 > 41304 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5845","2.685829","172.30.1.205","172.30.1.104","TCP","54","41304 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5846","2.685910","172.30.1.104","172.30.1.205","TCP","66","49671 > 33942 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5847","2.685918","172.30.1.205","172.30.1.104","TCP","54","33942 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5848","2.686271","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5849","2.686550","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5850","2.686558","172.30.1.205","172.30.1.104","TCP","54","33942 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5851","2.688440","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5852","2.688786","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5853","2.688793","172.30.1.205","172.30.1.104","TCP","54","33942 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5854","2.690145","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5855","2.691115","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5856","2.691127","172.30.1.205","172.30.1.104","TCP","54","33942 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5857","2.692078","172.30.1.205","172.30.1.104","TCP","74","41308 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905918 TSecr=0 WS=128" "5858","2.692408","172.30.1.104","172.30.1.205","TCP","66","135 > 41308 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5859","2.692419","172.30.1.205","172.30.1.104","TCP","54","41308 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5860","2.692765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5861","2.693030","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5862","2.693039","172.30.1.205","172.30.1.104","TCP","54","41308 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5863","2.695197","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5864","2.695606","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5865","2.695613","172.30.1.205","172.30.1.104","TCP","54","41308 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5866","2.697431","172.30.1.205","172.30.1.104","TCP","54","41308 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5867","2.697542","172.30.1.205","172.30.1.104","TCP","74","33946 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905923 TSecr=0 WS=128" "5868","2.697700","172.30.1.104","172.30.1.205","TCP","54","135 > 41308 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5869","2.697708","172.30.1.104","172.30.1.205","TCP","54","135 > 41308 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5870","2.697713","172.30.1.205","172.30.1.104","TCP","54","41308 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5871","2.697810","172.30.1.104","172.30.1.205","TCP","66","49671 > 33946 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5872","2.697819","172.30.1.205","172.30.1.104","TCP","54","33946 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5873","2.698166","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5874","2.698597","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5875","2.698606","172.30.1.205","172.30.1.104","TCP","54","33946 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5876","2.700505","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5877","2.700822","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5878","2.700829","172.30.1.205","172.30.1.104","TCP","54","33946 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5879","2.702175","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5880","2.703302","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5881","2.703311","172.30.1.205","172.30.1.104","TCP","54","33946 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5882","2.704233","172.30.1.205","172.30.1.104","TCP","74","41312 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905930 TSecr=0 WS=128" "5883","2.704530","172.30.1.104","172.30.1.205","TCP","66","135 > 41312 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5884","2.704540","172.30.1.205","172.30.1.104","TCP","54","41312 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5885","2.704915","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5886","2.705224","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5887","2.705233","172.30.1.205","172.30.1.104","TCP","54","41312 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5888","2.707387","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5889","2.707756","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5890","2.707763","172.30.1.205","172.30.1.104","TCP","54","41312 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5891","2.709578","172.30.1.205","172.30.1.104","TCP","54","41312 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5892","2.709687","172.30.1.205","172.30.1.104","TCP","74","33950 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905936 TSecr=0 WS=128" "5893","2.709829","172.30.1.104","172.30.1.205","TCP","54","135 > 41312 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5894","2.709870","172.30.1.104","172.30.1.205","TCP","54","135 > 41312 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5895","2.709875","172.30.1.205","172.30.1.104","TCP","54","41312 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5896","2.709949","172.30.1.104","172.30.1.205","TCP","66","49671 > 33950 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5897","2.709957","172.30.1.205","172.30.1.104","TCP","54","33950 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5898","2.710304","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5899","2.710576","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5900","2.710585","172.30.1.205","172.30.1.104","TCP","54","33950 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5901","2.712437","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5902","2.712811","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5903","2.712818","172.30.1.205","172.30.1.104","TCP","54","33950 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5904","2.714168","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5905","2.718362","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5906","2.718372","172.30.1.205","172.30.1.104","TCP","54","33950 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5907","2.719305","172.30.1.205","172.30.1.104","TCP","74","41316 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905945 TSecr=0 WS=128" "5908","2.719599","172.30.1.104","172.30.1.205","TCP","66","135 > 41316 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5909","2.719610","172.30.1.205","172.30.1.104","TCP","54","41316 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5910","2.719994","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5911","2.720282","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5912","2.720291","172.30.1.205","172.30.1.104","TCP","54","41316 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5913","2.722641","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5914","2.723045","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5915","2.723052","172.30.1.205","172.30.1.104","TCP","54","41316 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5916","2.724861","172.30.1.205","172.30.1.104","TCP","54","41316 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5917","2.724969","172.30.1.205","172.30.1.104","TCP","74","33954 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905951 TSecr=0 WS=128" "5918","2.725114","172.30.1.104","172.30.1.205","TCP","54","135 > 41316 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5919","2.725144","172.30.1.104","172.30.1.205","TCP","54","135 > 41316 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5920","2.725149","172.30.1.205","172.30.1.104","TCP","54","41316 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5921","2.725250","172.30.1.104","172.30.1.205","TCP","66","49671 > 33954 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5922","2.725258","172.30.1.205","172.30.1.104","TCP","54","33954 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5923","2.725603","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5924","2.725871","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5925","2.725880","172.30.1.205","172.30.1.104","TCP","54","33954 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5926","2.727754","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5927","2.728099","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5928","2.728105","172.30.1.205","172.30.1.104","TCP","54","33954 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5929","2.729468","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5930","2.730604","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5931","2.730613","172.30.1.205","172.30.1.104","TCP","54","33954 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5932","2.731533","172.30.1.205","172.30.1.104","TCP","74","41320 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905957 TSecr=0 WS=128" "5933","2.731822","172.30.1.104","172.30.1.205","TCP","66","135 > 41320 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5934","2.731833","172.30.1.205","172.30.1.104","TCP","54","41320 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5935","2.732178","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5936","2.732436","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5937","2.732445","172.30.1.205","172.30.1.104","TCP","54","41320 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5938","2.734640","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5939","2.735018","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5940","2.735024","172.30.1.205","172.30.1.104","TCP","54","41320 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5941","2.736856","172.30.1.205","172.30.1.104","TCP","54","41320 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "5942","2.736962","172.30.1.205","172.30.1.104","TCP","74","33958 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905963 TSecr=0 WS=128" "5943","2.737194","172.30.1.104","172.30.1.205","TCP","54","135 > 41320 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5944","2.737220","172.30.1.104","172.30.1.205","TCP","54","135 > 41320 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "5945","2.737225","172.30.1.205","172.30.1.104","TCP","54","41320 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "5946","2.737247","172.30.1.104","172.30.1.205","TCP","66","49671 > 33958 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5947","2.737255","172.30.1.205","172.30.1.104","TCP","54","33958 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5948","2.737598","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "5949","2.738672","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5950","2.738687","172.30.1.205","172.30.1.104","TCP","54","33958 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5951","2.740634","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "5952","2.741016","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "5953","2.741023","172.30.1.205","172.30.1.104","TCP","54","33958 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "5954","2.742383","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "5955","2.745668","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "5956","2.745679","172.30.1.205","172.30.1.104","TCP","54","33958 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "5957","2.746634","172.30.1.205","172.30.1.104","TCP","74","41324 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905973 TSecr=0 WS=128" "5958","2.746976","172.30.1.104","172.30.1.205","TCP","66","135 > 41324 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "5959","2.746987","172.30.1.205","172.30.1.104","TCP","54","41324 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "5960","2.747334","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "5961","2.747645","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "5962","2.747654","172.30.1.205","172.30.1.104","TCP","54","41324 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "5963","2.749867","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "5964","2.750243","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "5965","2.750251","172.30.1.205","172.30.1.104","TCP","54","41324 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "5966","2.751122","172.30.1.205","172.30.1.104","TCP","54","33918 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5967","2.751171","172.30.1.205","172.30.1.104","TCP","54","33922 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5968","2.751207","172.30.1.205","172.30.1.104","TCP","54","33926 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5969","2.751241","172.30.1.205","172.30.1.104","TCP","54","33930 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5970","2.751272","172.30.1.205","172.30.1.104","TCP","54","33934 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5971","2.751300","172.30.1.205","172.30.1.104","TCP","54","33938 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5972","2.751327","172.30.1.205","172.30.1.104","TCP","54","33942 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5973","2.751359","172.30.1.205","172.30.1.104","TCP","54","33946 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5974","2.751391","172.30.1.205","172.30.1.104","TCP","54","33950 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5975","2.751403","172.30.1.104","172.30.1.205","TCP","54","49671 > 33918 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5976","2.751425","172.30.1.104","172.30.1.205","TCP","54","49671 > 33922 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5977","2.751453","172.30.1.205","172.30.1.104","TCP","54","33954 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5978","2.751481","172.30.1.205","172.30.1.104","TCP","54","33958 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5979","2.751550","172.30.1.205","172.30.1.104","TCP","54","33914 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "5980","2.751561","172.30.1.104","172.30.1.205","TCP","54","49671 > 33918 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5981","2.751567","172.30.1.205","172.30.1.104","TCP","54","33918 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5982","2.751577","172.30.1.104","172.30.1.205","TCP","54","49671 > 33926 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5983","2.751611","172.30.1.104","172.30.1.205","TCP","54","49671 > 33922 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5984","2.751616","172.30.1.205","172.30.1.104","TCP","54","33922 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5985","2.751647","172.30.1.104","172.30.1.205","TCP","54","49671 > 33926 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5986","2.751650","172.30.1.205","172.30.1.104","TCP","54","33926 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5987","2.751669","172.30.1.104","172.30.1.205","TCP","54","49671 > 33930 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5988","2.751691","172.30.1.104","172.30.1.205","TCP","54","49671 > 33934 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5989","2.751804","172.30.1.104","172.30.1.205","TCP","54","49671 > 33938 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5990","2.751820","172.30.1.104","172.30.1.205","TCP","54","49671 > 33930 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5991","2.751825","172.30.1.205","172.30.1.104","TCP","54","33930 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5992","2.751841","172.30.1.104","172.30.1.205","TCP","54","49671 > 33942 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5993","2.751864","172.30.1.104","172.30.1.205","TCP","54","49671 > 33942 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5994","2.751868","172.30.1.205","172.30.1.104","TCP","54","33942 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5995","2.751886","172.30.1.104","172.30.1.205","TCP","54","49671 > 33934 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5996","2.751889","172.30.1.205","172.30.1.104","TCP","54","33934 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5997","2.751906","172.30.1.104","172.30.1.205","TCP","54","49671 > 33938 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "5998","2.751909","172.30.1.205","172.30.1.104","TCP","54","33938 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "5999","2.751925","172.30.1.104","172.30.1.205","TCP","54","49671 > 33946 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6000","2.751946","172.30.1.104","172.30.1.205","TCP","54","49671 > 33950 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6001","2.751966","172.30.1.104","172.30.1.205","TCP","54","49671 > 33954 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6002","2.752073","172.30.1.104","172.30.1.205","TCP","54","49671 > 33946 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6003","2.752078","172.30.1.205","172.30.1.104","TCP","54","33946 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6004","2.752092","172.30.1.104","172.30.1.205","TCP","54","49671 > 33958 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6005","2.752116","172.30.1.104","172.30.1.205","TCP","54","49671 > 33958 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6006","2.752119","172.30.1.205","172.30.1.104","TCP","54","33958 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6007","2.752136","172.30.1.104","172.30.1.205","TCP","54","49671 > 33950 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6008","2.752139","172.30.1.205","172.30.1.104","TCP","54","33950 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6009","2.752156","172.30.1.104","172.30.1.205","TCP","54","49671 > 33954 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6010","2.752159","172.30.1.205","172.30.1.104","TCP","54","33954 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6011","2.752176","172.30.1.104","172.30.1.205","TCP","54","49671 > 33914 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6012","2.752284","172.30.1.104","172.30.1.205","TCP","54","49671 > 33914 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6013","2.752287","172.30.1.205","172.30.1.104","TCP","54","33914 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6014","2.753119","172.30.1.205","172.30.1.104","TCP","54","41324 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6015","2.753229","172.30.1.205","172.30.1.104","TCP","74","33962 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905979 TSecr=0 WS=128" "6016","2.753367","172.30.1.104","172.30.1.205","TCP","54","135 > 41324 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6017","2.753388","172.30.1.104","172.30.1.205","TCP","54","135 > 41324 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6018","2.753394","172.30.1.205","172.30.1.104","TCP","54","41324 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6019","2.753493","172.30.1.104","172.30.1.205","TCP","66","49671 > 33962 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6020","2.753501","172.30.1.205","172.30.1.104","TCP","54","33962 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6021","2.753856","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6022","2.754148","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6023","2.754158","172.30.1.205","172.30.1.104","TCP","54","33962 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6024","2.756045","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6025","2.756413","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6026","2.756420","172.30.1.205","172.30.1.104","TCP","54","33962 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6027","2.757791","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6028","2.758830","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6029","2.758839","172.30.1.205","172.30.1.104","TCP","54","33962 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6030","2.759786","172.30.1.205","172.30.1.104","TCP","74","41328 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905986 TSecr=0 WS=128" "6031","2.760084","172.30.1.104","172.30.1.205","TCP","66","135 > 41328 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6032","2.760095","172.30.1.205","172.30.1.104","TCP","54","41328 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6033","2.760443","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6034","2.760726","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6035","2.760735","172.30.1.205","172.30.1.104","TCP","54","41328 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6036","2.762928","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6037","2.763298","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6038","2.763305","172.30.1.205","172.30.1.104","TCP","54","41328 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6039","2.765130","172.30.1.205","172.30.1.104","TCP","54","41328 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6040","2.765241","172.30.1.205","172.30.1.104","TCP","74","33966 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905991 TSecr=0 WS=128" "6041","2.765401","172.30.1.104","172.30.1.205","TCP","54","135 > 41328 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6042","2.765416","172.30.1.104","172.30.1.205","TCP","54","135 > 41328 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6043","2.765422","172.30.1.205","172.30.1.104","TCP","54","41328 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6044","2.765543","172.30.1.104","172.30.1.205","TCP","66","49671 > 33966 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6045","2.765551","172.30.1.205","172.30.1.104","TCP","54","33966 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6046","2.765894","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6047","2.766184","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6048","2.766193","172.30.1.205","172.30.1.104","TCP","54","33966 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6049","2.768062","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6050","2.768455","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6051","2.768461","172.30.1.205","172.30.1.104","TCP","54","33966 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6052","2.769824","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6053","2.770918","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6054","2.770927","172.30.1.205","172.30.1.104","TCP","54","33966 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6055","2.771852","172.30.1.205","172.30.1.104","TCP","74","41332 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499905998 TSecr=0 WS=128" "6056","2.772150","172.30.1.104","172.30.1.205","TCP","66","135 > 41332 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6057","2.772161","172.30.1.205","172.30.1.104","TCP","54","41332 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6058","2.772507","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6059","2.772772","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6060","2.772791","172.30.1.205","172.30.1.104","TCP","54","41332 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6061","2.774966","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6062","2.775373","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6063","2.775379","172.30.1.205","172.30.1.104","TCP","54","41332 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6064","2.777228","172.30.1.205","172.30.1.104","TCP","54","41332 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6065","2.777337","172.30.1.205","172.30.1.104","TCP","74","33970 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906003 TSecr=0 WS=128" "6066","2.777504","172.30.1.104","172.30.1.205","TCP","54","135 > 41332 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6067","2.777551","172.30.1.104","172.30.1.205","TCP","54","135 > 41332 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6068","2.777556","172.30.1.205","172.30.1.104","TCP","54","41332 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6069","2.777658","172.30.1.104","172.30.1.205","TCP","66","49671 > 33970 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6070","2.777666","172.30.1.205","172.30.1.104","TCP","54","33970 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6071","2.778010","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6072","2.778322","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6073","2.778332","172.30.1.205","172.30.1.104","TCP","54","33970 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6074","2.780173","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6075","2.780570","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6076","2.780576","172.30.1.205","172.30.1.104","TCP","54","33970 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6077","2.781937","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6078","2.783043","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6079","2.783053","172.30.1.205","172.30.1.104","TCP","54","33970 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6080","2.783986","172.30.1.205","172.30.1.104","TCP","74","41336 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906010 TSecr=0 WS=128" "6081","2.784307","172.30.1.104","172.30.1.205","TCP","66","135 > 41336 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6082","2.784319","172.30.1.205","172.30.1.104","TCP","54","41336 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6083","2.784671","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6084","2.784985","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6085","2.784994","172.30.1.205","172.30.1.104","TCP","54","41336 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6086","2.787170","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6087","2.787597","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6088","2.787604","172.30.1.205","172.30.1.104","TCP","54","41336 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6089","2.789428","172.30.1.205","172.30.1.104","TCP","54","41336 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6090","2.789539","172.30.1.205","172.30.1.104","TCP","74","33974 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906015 TSecr=0 WS=128" "6091","2.789715","172.30.1.104","172.30.1.205","TCP","54","135 > 41336 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6092","2.789769","172.30.1.104","172.30.1.205","TCP","54","135 > 41336 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6093","2.789775","172.30.1.205","172.30.1.104","TCP","54","41336 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6094","2.789819","172.30.1.104","172.30.1.205","TCP","66","49671 > 33974 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6095","2.789827","172.30.1.205","172.30.1.104","TCP","54","33974 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6096","2.790173","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6097","2.790465","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6098","2.790473","172.30.1.205","172.30.1.104","TCP","54","33974 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6099","2.792316","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6100","2.792770","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6101","2.792786","172.30.1.205","172.30.1.104","TCP","54","33974 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6102","2.794147","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6103","2.795240","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6104","2.795249","172.30.1.205","172.30.1.104","TCP","54","33974 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6105","2.796167","172.30.1.205","172.30.1.104","TCP","74","41340 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906022 TSecr=0 WS=128" "6106","2.796467","172.30.1.104","172.30.1.205","TCP","66","135 > 41340 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6107","2.796483","172.30.1.205","172.30.1.104","TCP","54","41340 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6108","2.796861","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6109","2.797185","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6110","2.797194","172.30.1.205","172.30.1.104","TCP","54","41340 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6111","2.799371","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6112","2.799780","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6113","2.799790","172.30.1.205","172.30.1.104","TCP","54","41340 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6114","2.801921","172.30.1.205","172.30.1.104","TCP","54","41340 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6115","2.802040","172.30.1.205","172.30.1.104","TCP","74","33978 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906028 TSecr=0 WS=128" "6116","2.802239","172.30.1.104","172.30.1.205","TCP","54","135 > 41340 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6117","2.802249","172.30.1.104","172.30.1.205","TCP","54","135 > 41340 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6118","2.802254","172.30.1.205","172.30.1.104","TCP","54","41340 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6119","2.802346","172.30.1.104","172.30.1.205","TCP","66","49671 > 33978 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6120","2.802355","172.30.1.205","172.30.1.104","TCP","54","33978 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6121","2.802735","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6122","2.803097","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6123","2.803111","172.30.1.205","172.30.1.104","TCP","54","33978 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6124","2.805082","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6125","2.805510","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6126","2.805524","172.30.1.205","172.30.1.104","TCP","54","33978 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6127","2.807091","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6128","2.808457","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6129","2.808466","172.30.1.205","172.30.1.104","TCP","54","33978 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6130","2.809447","172.30.1.205","172.30.1.104","TCP","74","41344 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906035 TSecr=0 WS=128" "6131","2.809746","172.30.1.104","172.30.1.205","TCP","66","135 > 41344 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6132","2.809759","172.30.1.205","172.30.1.104","TCP","54","41344 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6133","2.810121","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6134","2.810419","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6135","2.810428","172.30.1.205","172.30.1.104","TCP","54","41344 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6136","2.812595","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6137","2.812994","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6138","2.813002","172.30.1.205","172.30.1.104","TCP","54","41344 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6139","2.814811","172.30.1.205","172.30.1.104","TCP","54","41344 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6140","2.814922","172.30.1.205","172.30.1.104","TCP","74","33982 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906041 TSecr=0 WS=128" "6141","2.815084","172.30.1.104","172.30.1.205","TCP","54","135 > 41344 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6142","2.815112","172.30.1.104","172.30.1.205","TCP","54","135 > 41344 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6143","2.815118","172.30.1.205","172.30.1.104","TCP","54","41344 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6144","2.815220","172.30.1.104","172.30.1.205","TCP","66","49671 > 33982 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6145","2.815229","172.30.1.205","172.30.1.104","TCP","54","33982 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6146","2.815578","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6147","2.815878","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6148","2.815886","172.30.1.205","172.30.1.104","TCP","54","33982 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6149","2.817778","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6150","2.818182","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6151","2.818189","172.30.1.205","172.30.1.104","TCP","54","33982 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6152","2.819529","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6153","2.820628","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6154","2.820637","172.30.1.205","172.30.1.104","TCP","54","33982 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6155","2.821587","172.30.1.205","172.30.1.104","TCP","74","41348 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906048 TSecr=0 WS=128" "6156","2.821898","172.30.1.104","172.30.1.205","TCP","66","135 > 41348 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6157","2.821909","172.30.1.205","172.30.1.104","TCP","54","41348 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6158","2.822261","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6159","2.822629","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6160","2.822639","172.30.1.205","172.30.1.104","TCP","54","41348 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6161","2.824852","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6162","2.825243","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6163","2.825249","172.30.1.205","172.30.1.104","TCP","54","41348 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6164","2.827041","172.30.1.205","172.30.1.104","TCP","54","41348 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6165","2.827150","172.30.1.205","172.30.1.104","TCP","74","33986 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906053 TSecr=0 WS=128" "6166","2.827375","172.30.1.104","172.30.1.205","TCP","54","135 > 41348 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6167","2.827384","172.30.1.104","172.30.1.205","TCP","54","135 > 41348 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6168","2.827389","172.30.1.205","172.30.1.104","TCP","54","41348 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6169","2.827475","172.30.1.104","172.30.1.205","TCP","66","49671 > 33986 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6170","2.827483","172.30.1.205","172.30.1.104","TCP","54","33986 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6171","2.827846","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6172","2.828146","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6173","2.828154","172.30.1.205","172.30.1.104","TCP","54","33986 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6174","2.830039","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6175","2.830407","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6176","2.830414","172.30.1.205","172.30.1.104","TCP","54","33986 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6177","2.831762","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6178","2.832981","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6179","2.832990","172.30.1.205","172.30.1.104","TCP","54","33986 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6180","2.833921","172.30.1.205","172.30.1.104","TCP","74","41352 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906060 TSecr=0 WS=128" "6181","2.834223","172.30.1.104","172.30.1.205","TCP","66","135 > 41352 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6182","2.834234","172.30.1.205","172.30.1.104","TCP","54","41352 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6183","2.834582","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6184","2.834887","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6185","2.834897","172.30.1.205","172.30.1.104","TCP","54","41352 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6186","2.837100","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6187","2.837493","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6188","2.837500","172.30.1.205","172.30.1.104","TCP","54","41352 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6189","2.839307","172.30.1.205","172.30.1.104","TCP","54","41352 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6190","2.839416","172.30.1.205","172.30.1.104","TCP","74","33990 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906065 TSecr=0 WS=128" "6191","2.839646","172.30.1.104","172.30.1.205","TCP","54","135 > 41352 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6192","2.839704","172.30.1.104","172.30.1.205","TCP","66","49671 > 33990 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6193","2.839713","172.30.1.205","172.30.1.104","TCP","54","33990 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6194","2.839756","172.30.1.104","172.30.1.205","TCP","54","135 > 41352 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6195","2.839762","172.30.1.205","172.30.1.104","TCP","54","41352 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6196","2.840075","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6197","2.840421","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6198","2.840430","172.30.1.205","172.30.1.104","TCP","54","33990 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6199","2.842347","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6200","2.842814","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6201","2.842820","172.30.1.205","172.30.1.104","TCP","54","33990 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6202","2.844168","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6203","2.845278","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6204","2.845291","172.30.1.205","172.30.1.104","TCP","54","33990 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6205","2.846331","172.30.1.205","172.30.1.104","TCP","74","41356 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906072 TSecr=0 WS=128" "6206","2.846714","172.30.1.104","172.30.1.205","TCP","66","135 > 41356 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6207","2.846729","172.30.1.205","172.30.1.104","TCP","54","41356 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6208","2.847092","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6209","2.847415","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6210","2.847425","172.30.1.205","172.30.1.104","TCP","54","41356 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6211","2.849641","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6212","2.850066","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6213","2.850073","172.30.1.205","172.30.1.104","TCP","54","41356 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6214","2.851874","172.30.1.205","172.30.1.104","TCP","54","41356 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6215","2.851988","172.30.1.205","172.30.1.104","TCP","74","33994 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906078 TSecr=0 WS=128" "6216","2.852216","172.30.1.104","172.30.1.205","TCP","54","135 > 41356 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6217","2.852227","172.30.1.104","172.30.1.205","TCP","54","135 > 41356 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6218","2.852233","172.30.1.205","172.30.1.104","TCP","54","41356 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6219","2.852338","172.30.1.104","172.30.1.205","TCP","66","49671 > 33994 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6220","2.852347","172.30.1.205","172.30.1.104","TCP","54","33994 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6221","2.852699","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6222","2.853027","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6223","2.853037","172.30.1.205","172.30.1.104","TCP","54","33994 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6224","2.854915","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6225","2.855375","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6226","2.855381","172.30.1.205","172.30.1.104","TCP","54","33994 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6227","2.856718","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6228","2.857845","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6229","2.857855","172.30.1.205","172.30.1.104","TCP","54","33994 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6230","2.858797","172.30.1.205","172.30.1.104","TCP","74","41360 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906085 TSecr=0 WS=128" "6231","2.859138","172.30.1.104","172.30.1.205","TCP","66","135 > 41360 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6232","2.859149","172.30.1.205","172.30.1.104","TCP","54","41360 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6233","2.859502","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6234","2.859822","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6235","2.859831","172.30.1.205","172.30.1.104","TCP","54","41360 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6236","2.862043","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6237","2.862442","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6238","2.862449","172.30.1.205","172.30.1.104","TCP","54","41360 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6239","2.864262","172.30.1.205","172.30.1.104","TCP","54","41360 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6240","2.864375","172.30.1.205","172.30.1.104","TCP","74","33998 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906090 TSecr=0 WS=128" "6241","2.864568","172.30.1.104","172.30.1.205","TCP","54","135 > 41360 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6242","2.864686","172.30.1.104","172.30.1.205","TCP","54","135 > 41360 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6243","2.864692","172.30.1.205","172.30.1.104","TCP","54","41360 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6244","2.864697","172.30.1.104","172.30.1.205","TCP","66","49671 > 33998 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6245","2.864705","172.30.1.205","172.30.1.104","TCP","54","33998 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6246","2.865081","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6247","2.865383","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6248","2.865393","172.30.1.205","172.30.1.104","TCP","54","33998 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6249","2.867249","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6250","2.867715","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6251","2.867722","172.30.1.205","172.30.1.104","TCP","54","33998 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6252","2.869105","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6253","2.871795","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6254","2.871805","172.30.1.205","172.30.1.104","TCP","54","33998 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6255","2.872774","172.30.1.205","172.30.1.104","TCP","74","41364 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906099 TSecr=0 WS=128" "6256","2.873081","172.30.1.104","172.30.1.205","TCP","66","135 > 41364 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6257","2.873092","172.30.1.205","172.30.1.104","TCP","54","41364 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6258","2.873447","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6259","2.873799","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6260","2.873808","172.30.1.205","172.30.1.104","TCP","54","41364 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6261","2.875997","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6262","2.876383","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6263","2.876390","172.30.1.205","172.30.1.104","TCP","54","41364 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6264","2.878202","172.30.1.205","172.30.1.104","TCP","54","41364 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6265","2.878314","172.30.1.205","172.30.1.104","TCP","74","34002 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906104 TSecr=0 WS=128" "6266","2.878541","172.30.1.104","172.30.1.205","TCP","54","135 > 41364 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6267","2.878551","172.30.1.104","172.30.1.205","TCP","54","135 > 41364 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6268","2.878557","172.30.1.205","172.30.1.104","TCP","54","41364 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6269","2.878689","172.30.1.104","172.30.1.205","TCP","66","49671 > 34002 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6270","2.878698","172.30.1.205","172.30.1.104","TCP","54","34002 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6271","2.879045","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6272","2.879379","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6273","2.879388","172.30.1.205","172.30.1.104","TCP","54","34002 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6274","2.881310","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6275","2.881675","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6276","2.881682","172.30.1.205","172.30.1.104","TCP","54","34002 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6277","2.883027","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6278","2.884130","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6279","2.884140","172.30.1.205","172.30.1.104","TCP","54","34002 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6280","2.885101","172.30.1.205","172.30.1.104","TCP","74","41368 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906111 TSecr=0 WS=128" "6281","2.885431","172.30.1.104","172.30.1.205","TCP","66","135 > 41368 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6282","2.885442","172.30.1.205","172.30.1.104","TCP","54","41368 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6283","2.885790","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6284","2.886099","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6285","2.886108","172.30.1.205","172.30.1.104","TCP","54","41368 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6286","2.888264","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6287","2.888681","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6288","2.888687","172.30.1.205","172.30.1.104","TCP","54","41368 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6289","2.890506","172.30.1.205","172.30.1.104","TCP","54","41368 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6290","2.890618","172.30.1.205","172.30.1.104","TCP","74","34006 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906117 TSecr=0 WS=128" "6291","2.890837","172.30.1.104","172.30.1.205","TCP","54","135 > 41368 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6292","2.890846","172.30.1.104","172.30.1.205","TCP","54","135 > 41368 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6293","2.890851","172.30.1.205","172.30.1.104","TCP","54","41368 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6294","2.890963","172.30.1.104","172.30.1.205","TCP","66","49671 > 34006 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6295","2.890971","172.30.1.205","172.30.1.104","TCP","54","34006 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6296","2.891316","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6297","2.891653","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6298","2.891662","172.30.1.205","172.30.1.104","TCP","54","34006 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6299","2.893556","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6300","2.893991","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6301","2.893998","172.30.1.205","172.30.1.104","TCP","54","34006 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6302","2.895332","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6303","2.896581","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6304","2.896593","172.30.1.205","172.30.1.104","TCP","54","34006 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6305","2.897568","172.30.1.205","172.30.1.104","TCP","74","41372 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906123 TSecr=0 WS=128" "6306","2.897910","172.30.1.104","172.30.1.205","TCP","66","135 > 41372 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6307","2.897920","172.30.1.205","172.30.1.104","TCP","54","41372 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6308","2.898273","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6309","2.898580","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6310","2.898588","172.30.1.205","172.30.1.104","TCP","54","41372 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6311","2.900748","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6312","2.901171","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6313","2.901178","172.30.1.205","172.30.1.104","TCP","54","41372 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6314","2.902016","172.30.1.205","172.30.1.104","TCP","54","33966 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "6315","2.902068","172.30.1.205","172.30.1.104","TCP","54","33970 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "6316","2.902102","172.30.1.205","172.30.1.104","TCP","54","33974 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "6317","2.902131","172.30.1.205","172.30.1.104","TCP","54","33978 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "6318","2.902155","172.30.1.205","172.30.1.104","TCP","54","33982 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "6319","2.902182","172.30.1.205","172.30.1.104","TCP","54","33986 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "6320","2.902210","172.30.1.205","172.30.1.104","TCP","54","33990 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "6321","2.902237","172.30.1.205","172.30.1.104","TCP","54","33994 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "6322","2.902260","172.30.1.205","172.30.1.104","TCP","54","33998 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "6323","2.902286","172.30.1.205","172.30.1.104","TCP","54","34002 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "6324","2.902312","172.30.1.205","172.30.1.104","TCP","54","34006 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "6325","2.902379","172.30.1.205","172.30.1.104","TCP","54","33962 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "6326","2.903119","172.30.1.104","172.30.1.205","TCP","54","49671 > 33966 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6327","2.903129","172.30.1.104","172.30.1.205","TCP","54","49671 > 33970 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6328","2.903133","172.30.1.104","172.30.1.205","TCP","54","49671 > 33974 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6329","2.903135","172.30.1.104","172.30.1.205","TCP","54","49671 > 33966 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6330","2.903141","172.30.1.205","172.30.1.104","TCP","54","33966 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6331","2.903149","172.30.1.104","172.30.1.205","TCP","54","49671 > 33970 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6332","2.903151","172.30.1.205","172.30.1.104","TCP","54","33970 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6333","2.903153","172.30.1.104","172.30.1.205","TCP","54","49671 > 33978 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6334","2.903156","172.30.1.104","172.30.1.205","TCP","54","49671 > 33974 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6335","2.903159","172.30.1.205","172.30.1.104","TCP","54","33974 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6336","2.903160","172.30.1.104","172.30.1.205","TCP","54","49671 > 33982 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6337","2.903166","172.30.1.104","172.30.1.205","TCP","54","49671 > 33986 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6338","2.903169","172.30.1.104","172.30.1.205","TCP","54","49671 > 33986 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6339","2.903171","172.30.1.205","172.30.1.104","TCP","54","33986 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6340","2.903172","172.30.1.104","172.30.1.205","TCP","54","49671 > 33990 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6341","2.903175","172.30.1.104","172.30.1.205","TCP","54","49671 > 33994 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6342","2.903178","172.30.1.104","172.30.1.205","TCP","54","49671 > 33994 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6343","2.903180","172.30.1.205","172.30.1.104","TCP","54","33994 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6344","2.903181","172.30.1.104","172.30.1.205","TCP","54","49671 > 33990 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6345","2.903183","172.30.1.205","172.30.1.104","TCP","54","33990 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6346","2.903186","172.30.1.104","172.30.1.205","TCP","54","49671 > 33978 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6347","2.903188","172.30.1.205","172.30.1.104","TCP","54","33978 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6348","2.903189","172.30.1.104","172.30.1.205","TCP","54","49671 > 33982 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6349","2.903191","172.30.1.205","172.30.1.104","TCP","54","33982 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6350","2.903192","172.30.1.104","172.30.1.205","TCP","54","49671 > 33998 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6351","2.903198","172.30.1.104","172.30.1.205","TCP","54","49671 > 34002 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6352","2.903200","172.30.1.104","172.30.1.205","TCP","54","49671 > 34006 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6353","2.903202","172.30.1.104","172.30.1.205","TCP","54","49671 > 33998 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6354","2.903205","172.30.1.205","172.30.1.104","TCP","54","33998 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6355","2.903206","172.30.1.104","172.30.1.205","TCP","54","49671 > 34002 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6356","2.903208","172.30.1.205","172.30.1.104","TCP","54","34002 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6357","2.903209","172.30.1.104","172.30.1.205","TCP","54","49671 > 34006 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6358","2.903211","172.30.1.205","172.30.1.104","TCP","54","34006 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6359","2.903610","172.30.1.104","172.30.1.205","TCP","54","49671 > 33962 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6360","2.903617","172.30.1.104","172.30.1.205","TCP","54","49671 > 33962 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6361","2.903622","172.30.1.205","172.30.1.104","TCP","54","33962 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6362","2.903813","172.30.1.205","172.30.1.104","TCP","54","41372 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6363","2.903923","172.30.1.205","172.30.1.104","TCP","74","34010 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906130 TSecr=0 WS=128" "6364","2.904118","172.30.1.104","172.30.1.205","TCP","54","135 > 41372 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6365","2.904126","172.30.1.104","172.30.1.205","TCP","54","135 > 41372 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6366","2.904131","172.30.1.205","172.30.1.104","TCP","54","41372 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6367","2.904233","172.30.1.104","172.30.1.205","TCP","66","49671 > 34010 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6368","2.904242","172.30.1.205","172.30.1.104","TCP","54","34010 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6369","2.904593","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6370","2.904899","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6371","2.904908","172.30.1.205","172.30.1.104","TCP","54","34010 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6372","2.906790","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6373","2.907193","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6374","2.907200","172.30.1.205","172.30.1.104","TCP","54","34010 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6375","2.908555","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6376","2.909761","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6377","2.909770","172.30.1.205","172.30.1.104","TCP","54","34010 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6378","2.910714","172.30.1.205","172.30.1.104","TCP","74","41376 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906137 TSecr=0 WS=128" "6379","2.911035","172.30.1.104","172.30.1.205","TCP","66","135 > 41376 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6380","2.911046","172.30.1.205","172.30.1.104","TCP","54","41376 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6381","2.911399","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6382","2.911697","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6383","2.911706","172.30.1.205","172.30.1.104","TCP","54","41376 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6384","2.913906","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6385","2.914321","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6386","2.914327","172.30.1.205","172.30.1.104","TCP","54","41376 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6387","2.916130","172.30.1.205","172.30.1.104","TCP","54","41376 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6388","2.916241","172.30.1.205","172.30.1.104","TCP","74","34014 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906142 TSecr=0 WS=128" "6389","2.916449","172.30.1.104","172.30.1.205","TCP","54","135 > 41376 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6390","2.916458","172.30.1.104","172.30.1.205","TCP","54","135 > 41376 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6391","2.916463","172.30.1.205","172.30.1.104","TCP","54","41376 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6392","2.916565","172.30.1.104","172.30.1.205","TCP","66","49671 > 34014 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6393","2.916574","172.30.1.205","172.30.1.104","TCP","54","34014 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6394","2.916953","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6395","2.917320","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6396","2.917334","172.30.1.205","172.30.1.104","TCP","54","34014 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6397","2.919284","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6398","2.919700","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6399","2.919707","172.30.1.205","172.30.1.104","TCP","54","34014 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6400","2.921107","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6401","2.922312","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6402","2.922323","172.30.1.205","172.30.1.104","TCP","54","34014 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6403","2.923281","172.30.1.205","172.30.1.104","TCP","74","41380 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906149 TSecr=0 WS=128" "6404","2.923618","172.30.1.104","172.30.1.205","TCP","66","135 > 41380 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6405","2.923629","172.30.1.205","172.30.1.104","TCP","54","41380 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6406","2.923974","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6407","2.924270","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6408","2.924286","172.30.1.205","172.30.1.104","TCP","54","41380 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6409","2.926493","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6410","2.926930","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6411","2.926938","172.30.1.205","172.30.1.104","TCP","54","41380 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6412","2.928793","172.30.1.205","172.30.1.104","TCP","54","41380 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6413","2.928907","172.30.1.205","172.30.1.104","TCP","74","34018 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906155 TSecr=0 WS=128" "6414","2.929128","172.30.1.104","172.30.1.205","TCP","54","135 > 41380 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6415","2.929137","172.30.1.104","172.30.1.205","TCP","54","135 > 41380 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6416","2.929142","172.30.1.205","172.30.1.104","TCP","54","41380 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6417","2.929251","172.30.1.104","172.30.1.205","TCP","66","49671 > 34018 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6418","2.929260","172.30.1.205","172.30.1.104","TCP","54","34018 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6419","2.929606","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6420","2.929927","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6421","2.929936","172.30.1.205","172.30.1.104","TCP","54","34018 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6422","2.931807","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6423","2.932214","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6424","2.932220","172.30.1.205","172.30.1.104","TCP","54","34018 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6425","2.933597","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6426","2.934910","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6427","2.934921","172.30.1.205","172.30.1.104","TCP","54","34018 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6428","2.935875","172.30.1.205","172.30.1.104","TCP","74","41384 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906162 TSecr=0 WS=128" "6429","2.936193","172.30.1.104","172.30.1.205","TCP","66","135 > 41384 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6430","2.936203","172.30.1.205","172.30.1.104","TCP","54","41384 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6431","2.936550","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6432","2.936853","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6433","2.936863","172.30.1.205","172.30.1.104","TCP","54","41384 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6434","2.939041","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6435","2.939466","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6436","2.939473","172.30.1.205","172.30.1.104","TCP","54","41384 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6437","2.941290","172.30.1.205","172.30.1.104","TCP","54","41384 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6438","2.941402","172.30.1.205","172.30.1.104","TCP","74","34022 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906167 TSecr=0 WS=128" "6439","2.941601","172.30.1.104","172.30.1.205","TCP","54","135 > 41384 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6440","2.941610","172.30.1.104","172.30.1.205","TCP","54","135 > 41384 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6441","2.941615","172.30.1.205","172.30.1.104","TCP","54","41384 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6442","2.941761","172.30.1.104","172.30.1.205","TCP","66","49671 > 34022 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6443","2.941769","172.30.1.205","172.30.1.104","TCP","54","34022 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6444","2.942133","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6445","2.942659","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6446","2.942668","172.30.1.205","172.30.1.104","TCP","54","34022 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6447","2.944521","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6448","2.944927","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6449","2.944934","172.30.1.205","172.30.1.104","TCP","54","34022 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6450","2.946288","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6451","2.947474","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6452","2.947485","172.30.1.205","172.30.1.104","TCP","54","34022 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6453","2.948431","172.30.1.205","172.30.1.104","TCP","74","41388 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906174 TSecr=0 WS=128" "6454","2.948764","172.30.1.104","172.30.1.205","TCP","66","135 > 41388 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6455","2.948784","172.30.1.205","172.30.1.104","TCP","54","41388 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6456","2.949137","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6457","2.949455","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6458","2.949465","172.30.1.205","172.30.1.104","TCP","54","41388 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6459","2.951741","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6460","2.952185","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6461","2.952193","172.30.1.205","172.30.1.104","TCP","54","41388 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6462","2.954033","172.30.1.205","172.30.1.104","TCP","54","41388 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6463","2.954152","172.30.1.205","172.30.1.104","TCP","74","34026 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906180 TSecr=0 WS=128" "6464","2.954363","172.30.1.104","172.30.1.205","TCP","54","135 > 41388 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6465","2.954373","172.30.1.104","172.30.1.205","TCP","54","135 > 41388 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6466","2.954379","172.30.1.205","172.30.1.104","TCP","54","41388 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6467","2.954469","172.30.1.104","172.30.1.205","TCP","66","49671 > 34026 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6468","2.954478","172.30.1.205","172.30.1.104","TCP","54","34026 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6469","2.954823","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6470","2.955162","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6471","2.955171","172.30.1.205","172.30.1.104","TCP","54","34026 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6472","2.957071","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6473","2.957483","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6474","2.957489","172.30.1.205","172.30.1.104","TCP","54","34026 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6475","2.958826","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6476","2.960122","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6477","2.960137","172.30.1.205","172.30.1.104","TCP","54","34026 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6478","2.961176","172.30.1.205","172.30.1.104","TCP","74","41392 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906187 TSecr=0 WS=128" "6479","2.961542","172.30.1.104","172.30.1.205","TCP","66","135 > 41392 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6480","2.961553","172.30.1.205","172.30.1.104","TCP","54","41392 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6481","2.961905","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6482","2.962219","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6483","2.962229","172.30.1.205","172.30.1.104","TCP","54","41392 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6484","2.964416","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6485","2.964843","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6486","2.964851","172.30.1.205","172.30.1.104","TCP","54","41392 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6487","2.966669","172.30.1.205","172.30.1.104","TCP","54","41392 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6488","2.966784","172.30.1.205","172.30.1.104","TCP","74","34030 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906193 TSecr=0 WS=128" "6489","2.967023","172.30.1.104","172.30.1.205","TCP","54","135 > 41392 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6490","2.967041","172.30.1.104","172.30.1.205","TCP","54","135 > 41392 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6491","2.967051","172.30.1.205","172.30.1.104","TCP","54","41392 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6492","2.967142","172.30.1.104","172.30.1.205","TCP","66","49671 > 34030 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6493","2.967159","172.30.1.205","172.30.1.104","TCP","54","34030 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6494","2.967668","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6495","2.967983","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6496","2.967992","172.30.1.205","172.30.1.104","TCP","54","34030 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6497","2.969895","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6498","2.970283","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6499","2.970290","172.30.1.205","172.30.1.104","TCP","54","34030 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6500","2.971637","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6501","2.973982","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6502","2.973992","172.30.1.205","172.30.1.104","TCP","54","34030 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6503","2.974938","172.30.1.205","172.30.1.104","TCP","74","41396 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906201 TSecr=0 WS=128" "6504","2.975269","172.30.1.104","172.30.1.205","TCP","66","135 > 41396 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6505","2.975282","172.30.1.205","172.30.1.104","TCP","54","41396 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6506","2.975644","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6507","2.975963","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6508","2.975973","172.30.1.205","172.30.1.104","TCP","54","41396 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6509","2.978196","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6510","2.978622","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6511","2.978629","172.30.1.205","172.30.1.104","TCP","54","41396 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6512","2.980435","172.30.1.205","172.30.1.104","TCP","54","41396 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6513","2.980546","172.30.1.205","172.30.1.104","TCP","74","34034 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906206 TSecr=0 WS=128" "6514","2.980720","172.30.1.104","172.30.1.205","TCP","54","135 > 41396 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6515","2.980755","172.30.1.104","172.30.1.205","TCP","54","135 > 41396 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6516","2.980761","172.30.1.205","172.30.1.104","TCP","54","41396 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6517","2.980874","172.30.1.104","172.30.1.205","TCP","66","49671 > 34034 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6518","2.980883","172.30.1.205","172.30.1.104","TCP","54","34034 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6519","2.981245","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6520","2.981994","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6521","2.982003","172.30.1.205","172.30.1.104","TCP","54","34034 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6522","2.983871","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6523","2.984243","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6524","2.984256","172.30.1.205","172.30.1.104","TCP","54","34034 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6525","2.985725","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6526","2.987990","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6527","2.988001","172.30.1.205","172.30.1.104","TCP","54","34034 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6528","2.988985","172.30.1.205","172.30.1.104","TCP","74","41400 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906215 TSecr=0 WS=128" "6529","2.989321","172.30.1.104","172.30.1.205","TCP","66","135 > 41400 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6530","2.989332","172.30.1.205","172.30.1.104","TCP","54","41400 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6531","2.989692","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6532","2.990019","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6533","2.990032","172.30.1.205","172.30.1.104","TCP","54","41400 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6534","2.992277","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6535","2.992677","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6536","2.992684","172.30.1.205","172.30.1.104","TCP","54","41400 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6537","2.994521","172.30.1.205","172.30.1.104","TCP","54","41400 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6538","2.994634","172.30.1.205","172.30.1.104","TCP","74","34038 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906221 TSecr=0 WS=128" "6539","2.994872","172.30.1.104","172.30.1.205","TCP","54","135 > 41400 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6540","2.994882","172.30.1.104","172.30.1.205","TCP","54","135 > 41400 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6541","2.994887","172.30.1.205","172.30.1.104","TCP","54","41400 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6542","2.994971","172.30.1.104","172.30.1.205","TCP","66","49671 > 34038 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6543","2.994980","172.30.1.205","172.30.1.104","TCP","54","34038 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6544","2.995327","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6545","2.995693","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6546","2.995702","172.30.1.205","172.30.1.104","TCP","54","34038 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6547","2.997598","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6548","2.997965","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6549","2.997971","172.30.1.205","172.30.1.104","TCP","54","34038 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6550","2.999316","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6551","3.000514","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6552","3.000524","172.30.1.205","172.30.1.104","TCP","54","34038 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6553","3.001492","172.30.1.205","172.30.1.104","TCP","74","41404 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906227 TSecr=0 WS=128" "6554","3.001774","172.30.1.104","172.30.1.205","TCP","66","135 > 41404 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6555","3.001785","172.30.1.205","172.30.1.104","TCP","54","41404 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6556","3.002132","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6557","3.002430","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6558","3.002439","172.30.1.205","172.30.1.104","TCP","54","41404 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6559","3.004589","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6560","3.005007","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6561","3.005014","172.30.1.205","172.30.1.104","TCP","54","41404 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6562","3.006839","172.30.1.205","172.30.1.104","TCP","54","41404 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6563","3.006948","172.30.1.205","172.30.1.104","TCP","74","34042 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906233 TSecr=0 WS=128" "6564","3.007131","172.30.1.104","172.30.1.205","TCP","54","135 > 41404 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6565","3.007171","172.30.1.104","172.30.1.205","TCP","54","135 > 41404 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6566","3.007177","172.30.1.205","172.30.1.104","TCP","54","41404 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6567","3.007261","172.30.1.104","172.30.1.205","TCP","66","49671 > 34042 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6568","3.007269","172.30.1.205","172.30.1.104","TCP","54","34042 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6569","3.007615","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6570","3.009035","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6571","3.009044","172.30.1.205","172.30.1.104","TCP","54","34042 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6572","3.010915","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6573","3.011319","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6574","3.011325","172.30.1.205","172.30.1.104","TCP","54","34042 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6575","3.012665","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6576","3.013836","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6577","3.013845","172.30.1.205","172.30.1.104","TCP","54","34042 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6578","3.014815","172.30.1.205","172.30.1.104","TCP","74","41408 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906241 TSecr=0 WS=128" "6579","3.015151","172.30.1.104","172.30.1.205","TCP","66","135 > 41408 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6580","3.015163","172.30.1.205","172.30.1.104","TCP","54","41408 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6581","3.015515","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6582","3.015818","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6583","3.015827","172.30.1.205","172.30.1.104","TCP","54","41408 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6584","3.018048","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6585","3.018461","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6586","3.018468","172.30.1.205","172.30.1.104","TCP","54","41408 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6587","3.020263","172.30.1.205","172.30.1.104","TCP","54","41408 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6588","3.020378","172.30.1.205","172.30.1.104","TCP","74","34046 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906246 TSecr=0 WS=128" "6589","3.020608","172.30.1.104","172.30.1.205","TCP","54","135 > 41408 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6590","3.020618","172.30.1.104","172.30.1.205","TCP","54","135 > 41408 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6591","3.020624","172.30.1.205","172.30.1.104","TCP","54","41408 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6592","3.020730","172.30.1.104","172.30.1.205","TCP","66","49671 > 34046 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6593","3.020739","172.30.1.205","172.30.1.104","TCP","54","34046 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6594","3.021103","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6595","3.021416","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6596","3.021429","172.30.1.205","172.30.1.104","TCP","54","34046 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6597","3.023339","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6598","3.023752","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6599","3.023759","172.30.1.205","172.30.1.104","TCP","54","34046 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6600","3.025204","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6601","3.026328","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6602","3.026340","172.30.1.205","172.30.1.104","TCP","54","34046 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6603","3.027283","172.30.1.205","172.30.1.104","TCP","74","41412 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906253 TSecr=0 WS=128" "6604","3.027602","172.30.1.104","172.30.1.205","TCP","66","135 > 41412 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6605","3.027613","172.30.1.205","172.30.1.104","TCP","54","41412 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6606","3.027965","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6607","3.028266","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6608","3.028275","172.30.1.205","172.30.1.104","TCP","54","41412 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6609","3.030482","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6610","3.030935","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6611","3.030943","172.30.1.205","172.30.1.104","TCP","54","41412 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6612","3.032772","172.30.1.205","172.30.1.104","TCP","54","41412 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6613","3.032881","172.30.1.205","172.30.1.104","TCP","74","34050 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906259 TSecr=0 WS=128" "6614","3.033058","172.30.1.104","172.30.1.205","TCP","54","135 > 41412 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6615","3.033103","172.30.1.104","172.30.1.205","TCP","54","135 > 41412 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6616","3.033109","172.30.1.205","172.30.1.104","TCP","54","41412 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6617","3.033206","172.30.1.104","172.30.1.205","TCP","66","49671 > 34050 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6618","3.033214","172.30.1.205","172.30.1.104","TCP","54","34050 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6619","3.033560","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6620","3.033866","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6621","3.033875","172.30.1.205","172.30.1.104","TCP","54","34050 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6622","3.035750","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6623","3.036133","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6624","3.036139","172.30.1.205","172.30.1.104","TCP","54","34050 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6625","3.037498","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6626","3.038600","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6627","3.038609","172.30.1.205","172.30.1.104","TCP","54","34050 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6628","3.039529","172.30.1.205","172.30.1.104","TCP","74","41416 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906265 TSecr=0 WS=128" "6629","3.039823","172.30.1.104","172.30.1.205","TCP","66","135 > 41416 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6630","3.039833","172.30.1.205","172.30.1.104","TCP","54","41416 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6631","3.040177","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6632","3.040494","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6633","3.040503","172.30.1.205","172.30.1.104","TCP","54","41416 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6634","3.042688","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6635","3.043093","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6636","3.043100","172.30.1.205","172.30.1.104","TCP","54","41416 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6637","3.044917","172.30.1.205","172.30.1.104","TCP","54","41416 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6638","3.045025","172.30.1.205","172.30.1.104","TCP","74","34054 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906271 TSecr=0 WS=128" "6639","3.045255","172.30.1.104","172.30.1.205","TCP","54","135 > 41416 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6640","3.045263","172.30.1.104","172.30.1.205","TCP","54","135 > 41416 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6641","3.045268","172.30.1.205","172.30.1.104","TCP","54","41416 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6642","3.045385","172.30.1.104","172.30.1.205","TCP","66","49671 > 34054 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6643","3.045393","172.30.1.205","172.30.1.104","TCP","54","34054 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6644","3.045735","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6645","3.048155","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6646","3.048162","172.30.1.205","172.30.1.104","TCP","54","34054 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6647","3.050033","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6648","3.050569","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6649","3.050575","172.30.1.205","172.30.1.104","TCP","54","34054 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6650","3.051904","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6651","3.053052","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6652","3.053062","172.30.1.205","172.30.1.104","TCP","54","34054 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6653","3.053993","172.30.1.205","172.30.1.104","TCP","74","41420 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906280 TSecr=0 WS=128" "6654","3.054308","172.30.1.104","172.30.1.205","TCP","66","135 > 41420 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6655","3.054319","172.30.1.205","172.30.1.104","TCP","54","41420 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6656","3.054672","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6657","3.054968","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6658","3.054977","172.30.1.205","172.30.1.104","TCP","54","41420 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6659","3.057172","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6660","3.057543","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6661","3.057550","172.30.1.205","172.30.1.104","TCP","54","41420 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6662","3.058388","172.30.1.205","172.30.1.104","TCP","54","34014 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "6663","3.058436","172.30.1.205","172.30.1.104","TCP","54","34018 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "6664","3.058471","172.30.1.205","172.30.1.104","TCP","54","34022 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "6665","3.058505","172.30.1.205","172.30.1.104","TCP","54","34026 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "6666","3.058533","172.30.1.205","172.30.1.104","TCP","54","34030 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "6667","3.058560","172.30.1.205","172.30.1.104","TCP","54","34034 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "6668","3.058586","172.30.1.205","172.30.1.104","TCP","54","34038 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "6669","3.058618","172.30.1.205","172.30.1.104","TCP","54","34042 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "6670","3.058641","172.30.1.205","172.30.1.104","TCP","54","34046 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "6671","3.058666","172.30.1.205","172.30.1.104","TCP","54","34050 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "6672","3.058692","172.30.1.205","172.30.1.104","TCP","54","34054 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "6673","3.058760","172.30.1.205","172.30.1.104","TCP","54","34010 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "6674","3.058785","172.30.1.104","172.30.1.205","TCP","54","49671 > 34014 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6675","3.058811","172.30.1.104","172.30.1.205","TCP","54","49671 > 34018 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6676","3.058838","172.30.1.104","172.30.1.205","TCP","54","49671 > 34014 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6677","3.058844","172.30.1.205","172.30.1.104","TCP","54","34014 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6678","3.058864","172.30.1.104","172.30.1.205","TCP","54","49671 > 34018 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6679","3.058868","172.30.1.205","172.30.1.104","TCP","54","34018 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6680","3.059075","172.30.1.104","172.30.1.205","TCP","54","49671 > 34022 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6681","3.059098","172.30.1.104","172.30.1.205","TCP","54","49671 > 34026 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6682","3.059126","172.30.1.104","172.30.1.205","TCP","54","49671 > 34030 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6683","3.059154","172.30.1.104","172.30.1.205","TCP","54","49671 > 34034 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6684","3.059460","172.30.1.104","172.30.1.205","TCP","54","49671 > 34038 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6685","3.059467","172.30.1.104","172.30.1.205","TCP","54","49671 > 34042 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6686","3.059470","172.30.1.104","172.30.1.205","TCP","54","49671 > 34046 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6687","3.059472","172.30.1.104","172.30.1.205","TCP","54","49671 > 34050 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6688","3.059474","172.30.1.104","172.30.1.205","TCP","54","49671 > 34054 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6689","3.059476","172.30.1.104","172.30.1.205","TCP","54","49671 > 34054 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6690","3.059482","172.30.1.205","172.30.1.104","TCP","54","34054 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6691","3.059488","172.30.1.104","172.30.1.205","TCP","54","49671 > 34050 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6692","3.059490","172.30.1.205","172.30.1.104","TCP","54","34050 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6693","3.059491","172.30.1.104","172.30.1.205","TCP","54","49671 > 34046 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6694","3.059493","172.30.1.205","172.30.1.104","TCP","54","34046 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6695","3.059494","172.30.1.104","172.30.1.205","TCP","54","49671 > 34042 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6696","3.059496","172.30.1.205","172.30.1.104","TCP","54","34042 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6697","3.059497","172.30.1.104","172.30.1.205","TCP","54","49671 > 34038 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6698","3.059499","172.30.1.205","172.30.1.104","TCP","54","34038 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6699","3.059500","172.30.1.104","172.30.1.205","TCP","54","49671 > 34034 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6700","3.059502","172.30.1.205","172.30.1.104","TCP","54","34034 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6701","3.059503","172.30.1.104","172.30.1.205","TCP","54","49671 > 34022 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6702","3.059505","172.30.1.205","172.30.1.104","TCP","54","34022 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6703","3.059506","172.30.1.104","172.30.1.205","TCP","54","49671 > 34026 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6704","3.059507","172.30.1.205","172.30.1.104","TCP","54","34026 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6705","3.059509","172.30.1.104","172.30.1.205","TCP","54","49671 > 34030 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6706","3.059510","172.30.1.205","172.30.1.104","TCP","54","34030 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6707","3.059528","172.30.1.104","172.30.1.205","TCP","54","49671 > 34010 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6708","3.059710","172.30.1.104","172.30.1.205","TCP","54","49671 > 34010 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "6709","3.059714","172.30.1.205","172.30.1.104","TCP","54","34010 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "6710","3.060224","172.30.1.205","172.30.1.104","TCP","54","41420 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6711","3.060346","172.30.1.205","172.30.1.104","TCP","74","34058 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906286 TSecr=0 WS=128" "6712","3.060483","172.30.1.104","172.30.1.205","TCP","54","135 > 41420 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6713","3.060490","172.30.1.104","172.30.1.205","TCP","54","135 > 41420 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6714","3.060495","172.30.1.205","172.30.1.104","TCP","54","41420 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6715","3.060628","172.30.1.104","172.30.1.205","TCP","66","49671 > 34058 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6716","3.060636","172.30.1.205","172.30.1.104","TCP","54","34058 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6717","3.061017","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6718","3.061279","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6719","3.061287","172.30.1.205","172.30.1.104","TCP","54","34058 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6720","3.063138","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6721","3.063498","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6722","3.063505","172.30.1.205","172.30.1.104","TCP","54","34058 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6723","3.064867","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6724","3.066028","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6725","3.066037","172.30.1.205","172.30.1.104","TCP","54","34058 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6726","3.066953","172.30.1.205","172.30.1.104","TCP","74","41424 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906293 TSecr=0 WS=128" "6727","3.067271","172.30.1.104","172.30.1.205","TCP","66","135 > 41424 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6728","3.067281","172.30.1.205","172.30.1.104","TCP","54","41424 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6729","3.067631","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6730","3.067901","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6731","3.067910","172.30.1.205","172.30.1.104","TCP","54","41424 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6732","3.070108","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6733","3.070507","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6734","3.070514","172.30.1.205","172.30.1.104","TCP","54","41424 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6735","3.072315","172.30.1.205","172.30.1.104","TCP","54","41424 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6736","3.072431","172.30.1.205","172.30.1.104","TCP","74","34062 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906298 TSecr=0 WS=128" "6737","3.072592","172.30.1.104","172.30.1.205","TCP","54","135 > 41424 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6738","3.072640","172.30.1.104","172.30.1.205","TCP","54","135 > 41424 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6739","3.072646","172.30.1.205","172.30.1.104","TCP","54","41424 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6740","3.072747","172.30.1.104","172.30.1.205","TCP","66","49671 > 34062 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6741","3.072755","172.30.1.205","172.30.1.104","TCP","54","34062 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6742","3.073117","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6743","3.073392","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6744","3.073401","172.30.1.205","172.30.1.104","TCP","54","34062 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6745","3.075257","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6746","3.075635","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6747","3.075642","172.30.1.205","172.30.1.104","TCP","54","34062 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6748","3.076999","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6749","3.078163","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6750","3.078172","172.30.1.205","172.30.1.104","TCP","54","34062 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6751","3.079092","172.30.1.205","172.30.1.104","TCP","74","41428 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906305 TSecr=0 WS=128" "6752","3.079374","172.30.1.104","172.30.1.205","TCP","66","135 > 41428 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6753","3.079384","172.30.1.205","172.30.1.104","TCP","54","41428 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6754","3.079726","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6755","3.079990","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6756","3.079998","172.30.1.205","172.30.1.104","TCP","54","41428 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6757","3.082186","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6758","3.082585","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6759","3.082591","172.30.1.205","172.30.1.104","TCP","54","41428 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6760","3.084414","172.30.1.205","172.30.1.104","TCP","54","41428 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6761","3.084524","172.30.1.205","172.30.1.104","TCP","74","34066 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906310 TSecr=0 WS=128" "6762","3.084717","172.30.1.104","172.30.1.205","TCP","54","135 > 41428 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6763","3.084743","172.30.1.104","172.30.1.205","TCP","54","135 > 41428 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6764","3.084748","172.30.1.205","172.30.1.104","TCP","54","41428 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6765","3.084807","172.30.1.104","172.30.1.205","TCP","66","49671 > 34066 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6766","3.084816","172.30.1.205","172.30.1.104","TCP","54","34066 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6767","3.085185","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6768","3.087621","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6769","3.087628","172.30.1.205","172.30.1.104","TCP","54","34066 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6770","3.089512","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6771","3.089867","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6772","3.089873","172.30.1.205","172.30.1.104","TCP","54","34066 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6773","3.091204","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6774","3.093452","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6775","3.093462","172.30.1.205","172.30.1.104","TCP","54","34066 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6776","3.094432","172.30.1.205","172.30.1.104","TCP","74","41432 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906320 TSecr=0 WS=128" "6777","3.094723","172.30.1.104","172.30.1.205","TCP","66","135 > 41432 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6778","3.094734","172.30.1.205","172.30.1.104","TCP","54","41432 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6779","3.095081","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6780","3.095373","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6781","3.095382","172.30.1.205","172.30.1.104","TCP","54","41432 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6782","3.097569","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6783","3.098019","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6784","3.098026","172.30.1.205","172.30.1.104","TCP","54","41432 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6785","3.099818","172.30.1.205","172.30.1.104","TCP","54","41432 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6786","3.099930","172.30.1.205","172.30.1.104","TCP","74","34070 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906326 TSecr=0 WS=128" "6787","3.100141","172.30.1.104","172.30.1.205","TCP","54","135 > 41432 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6788","3.100151","172.30.1.104","172.30.1.205","TCP","54","135 > 41432 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6789","3.100157","172.30.1.205","172.30.1.104","TCP","54","41432 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6790","3.100257","172.30.1.104","172.30.1.205","TCP","66","49671 > 34070 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6791","3.100265","172.30.1.205","172.30.1.104","TCP","54","34070 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6792","3.100606","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6793","3.100938","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6794","3.100947","172.30.1.205","172.30.1.104","TCP","54","34070 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6795","3.102793","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6796","3.103322","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6797","3.103326","172.30.1.205","172.30.1.104","TCP","54","34070 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6798","3.104656","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6799","3.105879","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6800","3.105888","172.30.1.205","172.30.1.104","TCP","54","34070 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6801","3.106832","172.30.1.205","172.30.1.104","TCP","74","41436 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906333 TSecr=0 WS=128" "6802","3.107212","172.30.1.104","172.30.1.205","TCP","66","135 > 41436 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6803","3.107222","172.30.1.205","172.30.1.104","TCP","54","41436 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6804","3.107572","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6805","3.107895","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6806","3.107904","172.30.1.205","172.30.1.104","TCP","54","41436 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6807","3.110106","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6808","3.110524","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6809","3.110531","172.30.1.205","172.30.1.104","TCP","54","41436 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6810","3.112326","172.30.1.205","172.30.1.104","TCP","54","41436 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6811","3.112437","172.30.1.205","172.30.1.104","TCP","74","34074 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906338 TSecr=0 WS=128" "6812","3.112666","172.30.1.104","172.30.1.205","TCP","54","135 > 41436 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6813","3.112675","172.30.1.104","172.30.1.205","TCP","54","135 > 41436 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6814","3.112682","172.30.1.205","172.30.1.104","TCP","54","41436 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6815","3.112783","172.30.1.104","172.30.1.205","TCP","66","49671 > 34074 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6816","3.112792","172.30.1.205","172.30.1.104","TCP","54","34074 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6817","3.113139","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6818","3.113450","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6819","3.113459","172.30.1.205","172.30.1.104","TCP","54","34074 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6820","3.115335","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6821","3.115746","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6822","3.115753","172.30.1.205","172.30.1.104","TCP","54","34074 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6823","3.117120","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6824","3.118312","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6825","3.118322","172.30.1.205","172.30.1.104","TCP","54","34074 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6826","3.119255","172.30.1.205","172.30.1.104","TCP","74","41440 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906345 TSecr=0 WS=128" "6827","3.119621","172.30.1.104","172.30.1.205","TCP","66","135 > 41440 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6828","3.119631","172.30.1.205","172.30.1.104","TCP","54","41440 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6829","3.119973","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6830","3.120289","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6831","3.120302","172.30.1.205","172.30.1.104","TCP","54","41440 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6832","3.122596","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6833","3.123012","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6834","3.123019","172.30.1.205","172.30.1.104","TCP","54","41440 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6835","3.124868","172.30.1.205","172.30.1.104","TCP","54","41440 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6836","3.124985","172.30.1.205","172.30.1.104","TCP","74","34078 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906351 TSecr=0 WS=128" "6837","3.125178","172.30.1.104","172.30.1.205","TCP","54","135 > 41440 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6838","3.125188","172.30.1.104","172.30.1.205","TCP","54","135 > 41440 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6839","3.125194","172.30.1.205","172.30.1.104","TCP","54","41440 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6840","3.125296","172.30.1.104","172.30.1.205","TCP","66","49671 > 34078 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6841","3.125304","172.30.1.205","172.30.1.104","TCP","54","34078 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6842","3.125647","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6843","3.125940","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6844","3.125949","172.30.1.205","172.30.1.104","TCP","54","34078 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6845","3.127831","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6846","3.129434","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6847","3.129441","172.30.1.205","172.30.1.104","TCP","54","34078 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6848","3.130793","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6849","3.131944","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6850","3.131954","172.30.1.205","172.30.1.104","TCP","54","34078 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6851","3.132904","172.30.1.205","172.30.1.104","TCP","74","41444 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906359 TSecr=0 WS=128" "6852","3.133203","172.30.1.104","172.30.1.205","TCP","66","135 > 41444 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6853","3.133214","172.30.1.205","172.30.1.104","TCP","54","41444 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6854","3.133557","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6855","3.133845","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6856","3.133858","172.30.1.205","172.30.1.104","TCP","54","41444 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6857","3.136053","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6858","3.136437","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6859","3.136443","172.30.1.205","172.30.1.104","TCP","54","41444 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6860","3.138259","172.30.1.205","172.30.1.104","TCP","54","41444 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6861","3.138370","172.30.1.205","172.30.1.104","TCP","74","34082 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906364 TSecr=0 WS=128" "6862","3.138586","172.30.1.104","172.30.1.205","TCP","54","135 > 41444 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6863","3.138595","172.30.1.104","172.30.1.205","TCP","54","135 > 41444 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6864","3.138601","172.30.1.205","172.30.1.104","TCP","54","41444 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6865","3.138701","172.30.1.104","172.30.1.205","TCP","66","49671 > 34082 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6866","3.138709","172.30.1.205","172.30.1.104","TCP","54","34082 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6867","3.139059","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6868","3.139366","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6869","3.139375","172.30.1.205","172.30.1.104","TCP","54","34082 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6870","3.141264","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6871","3.141736","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6872","3.141742","172.30.1.205","172.30.1.104","TCP","54","34082 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6873","3.143097","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6874","3.144249","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6875","3.144263","172.30.1.205","172.30.1.104","TCP","54","34082 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6876","3.145305","172.30.1.205","172.30.1.104","TCP","74","41448 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906371 TSecr=0 WS=128" "6877","3.145641","172.30.1.104","172.30.1.205","TCP","66","135 > 41448 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6878","3.145652","172.30.1.205","172.30.1.104","TCP","54","41448 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6879","3.146013","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6880","3.146308","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6881","3.146318","172.30.1.205","172.30.1.104","TCP","54","41448 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6882","3.148504","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6883","3.148908","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6884","3.148916","172.30.1.205","172.30.1.104","TCP","54","41448 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6885","3.150737","172.30.1.205","172.30.1.104","TCP","54","41448 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6886","3.150849","172.30.1.205","172.30.1.104","TCP","74","34086 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906377 TSecr=0 WS=128" "6887","3.151012","172.30.1.104","172.30.1.205","TCP","54","135 > 41448 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6888","3.151055","172.30.1.104","172.30.1.205","TCP","54","135 > 41448 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6889","3.151061","172.30.1.205","172.30.1.104","TCP","54","41448 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6890","3.151113","172.30.1.104","172.30.1.205","TCP","66","49671 > 34086 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6891","3.151122","172.30.1.205","172.30.1.104","TCP","54","34086 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6892","3.151472","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6893","3.151767","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6894","3.151777","172.30.1.205","172.30.1.104","TCP","54","34086 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6895","3.153660","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6896","3.154038","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6897","3.154042","172.30.1.205","172.30.1.104","TCP","54","34086 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6898","3.155397","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6899","3.156607","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6900","3.156617","172.30.1.205","172.30.1.104","TCP","54","34086 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6901","3.157580","172.30.1.205","172.30.1.104","TCP","74","41452 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906384 TSecr=0 WS=128" "6902","3.157912","172.30.1.104","172.30.1.205","TCP","66","135 > 41452 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6903","3.157923","172.30.1.205","172.30.1.104","TCP","54","41452 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6904","3.158278","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6905","3.158633","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6906","3.158642","172.30.1.205","172.30.1.104","TCP","54","41452 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6907","3.160816","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6908","3.161203","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6909","3.161209","172.30.1.205","172.30.1.104","TCP","54","41452 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6910","3.162998","172.30.1.205","172.30.1.104","TCP","54","41452 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6911","3.163110","172.30.1.205","172.30.1.104","TCP","74","34090 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906389 TSecr=0 WS=128" "6912","3.163284","172.30.1.104","172.30.1.205","TCP","54","135 > 41452 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6913","3.163316","172.30.1.104","172.30.1.205","TCP","54","135 > 41452 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6914","3.163322","172.30.1.205","172.30.1.104","TCP","54","41452 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6915","3.163414","172.30.1.104","172.30.1.205","TCP","66","49671 > 34090 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6916","3.163423","172.30.1.205","172.30.1.104","TCP","54","34090 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6917","3.163765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6918","3.164084","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6919","3.164092","172.30.1.205","172.30.1.104","TCP","54","34090 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6920","3.165981","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6921","3.166363","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6922","3.166370","172.30.1.205","172.30.1.104","TCP","54","34090 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6923","3.167702","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6924","3.168850","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6925","3.168860","172.30.1.205","172.30.1.104","TCP","54","34090 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6926","3.169793","172.30.1.205","172.30.1.104","TCP","74","41456 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906396 TSecr=0 WS=128" "6927","3.170085","172.30.1.104","172.30.1.205","TCP","66","135 > 41456 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6928","3.170096","172.30.1.205","172.30.1.104","TCP","54","41456 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6929","3.170440","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6930","3.170732","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6931","3.170741","172.30.1.205","172.30.1.104","TCP","54","41456 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6932","3.172931","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6933","3.173317","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6934","3.173323","172.30.1.205","172.30.1.104","TCP","54","41456 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6935","3.175125","172.30.1.205","172.30.1.104","TCP","54","41456 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6936","3.175237","172.30.1.205","172.30.1.104","TCP","74","34094 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906401 TSecr=0 WS=128" "6937","3.175465","172.30.1.104","172.30.1.205","TCP","54","135 > 41456 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6938","3.175474","172.30.1.104","172.30.1.205","TCP","54","135 > 41456 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6939","3.175480","172.30.1.205","172.30.1.104","TCP","54","41456 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6940","3.175562","172.30.1.104","172.30.1.205","TCP","66","49671 > 34094 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6941","3.175571","172.30.1.205","172.30.1.104","TCP","54","34094 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6942","3.175913","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6943","3.176197","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6944","3.176206","172.30.1.205","172.30.1.104","TCP","54","34094 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6945","3.178098","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6946","3.178483","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6947","3.178489","172.30.1.205","172.30.1.104","TCP","54","34094 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6948","3.179822","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6949","3.180950","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6950","3.180960","172.30.1.205","172.30.1.104","TCP","54","34094 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6951","3.181890","172.30.1.205","172.30.1.104","TCP","74","41460 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906408 TSecr=0 WS=128" "6952","3.182225","172.30.1.104","172.30.1.205","TCP","66","135 > 41460 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6953","3.182236","172.30.1.205","172.30.1.104","TCP","54","41460 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6954","3.182585","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6955","3.182875","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6956","3.182884","172.30.1.205","172.30.1.104","TCP","54","41460 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6957","3.185092","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6958","3.185465","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6959","3.185472","172.30.1.205","172.30.1.104","TCP","54","41460 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6960","3.187264","172.30.1.205","172.30.1.104","TCP","54","41460 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6961","3.187377","172.30.1.205","172.30.1.104","TCP","74","34098 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906413 TSecr=0 WS=128" "6962","3.187536","172.30.1.104","172.30.1.205","TCP","54","135 > 41460 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6963","3.187553","172.30.1.104","172.30.1.205","TCP","54","135 > 41460 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6964","3.187558","172.30.1.205","172.30.1.104","TCP","54","41460 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6965","3.187637","172.30.1.104","172.30.1.205","TCP","66","49671 > 34098 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6966","3.187646","172.30.1.205","172.30.1.104","TCP","54","34098 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6967","3.188000","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6968","3.188276","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6969","3.188285","172.30.1.205","172.30.1.104","TCP","54","34098 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6970","3.190199","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6971","3.192653","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6972","3.192657","172.30.1.205","172.30.1.104","TCP","54","34098 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6973","3.194018","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6974","3.196151","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "6975","3.196162","172.30.1.205","172.30.1.104","TCP","54","34098 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "6976","3.197128","172.30.1.205","172.30.1.104","TCP","74","41464 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906423 TSecr=0 WS=128" "6977","3.197414","172.30.1.104","172.30.1.205","TCP","66","135 > 41464 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6978","3.197428","172.30.1.205","172.30.1.104","TCP","54","41464 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6979","3.197778","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "6980","3.198088","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6981","3.198097","172.30.1.205","172.30.1.104","TCP","54","41464 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6982","3.200258","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "6983","3.200640","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "6984","3.200646","172.30.1.205","172.30.1.104","TCP","54","41464 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "6985","3.202458","172.30.1.205","172.30.1.104","TCP","54","41464 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "6986","3.202570","172.30.1.205","172.30.1.104","TCP","74","34102 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906428 TSecr=0 WS=128" "6987","3.202733","172.30.1.104","172.30.1.205","TCP","54","135 > 41464 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6988","3.202742","172.30.1.104","172.30.1.205","TCP","54","135 > 41464 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "6989","3.202748","172.30.1.205","172.30.1.104","TCP","54","41464 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "6990","3.202849","172.30.1.104","172.30.1.205","TCP","66","49671 > 34102 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "6991","3.202858","172.30.1.205","172.30.1.104","TCP","54","34102 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "6992","3.203199","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "6993","3.203465","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "6994","3.203473","172.30.1.205","172.30.1.104","TCP","54","34102 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "6995","3.205369","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "6996","3.205727","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "6997","3.205734","172.30.1.205","172.30.1.104","TCP","54","34102 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "6998","3.207095","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "6999","3.208244","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7000","3.208253","172.30.1.205","172.30.1.104","TCP","54","34102 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7001","3.209212","172.30.1.205","172.30.1.104","TCP","74","41468 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906435 TSecr=0 WS=128" "7002","3.209477","172.30.1.104","172.30.1.205","TCP","66","135 > 41468 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7003","3.209488","172.30.1.205","172.30.1.104","TCP","54","41468 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7004","3.209832","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7005","3.210086","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7006","3.210095","172.30.1.205","172.30.1.104","TCP","54","41468 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7007","3.212247","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7008","3.212608","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7009","3.212615","172.30.1.205","172.30.1.104","TCP","54","41468 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7010","3.213476","172.30.1.205","172.30.1.104","TCP","54","34058 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7011","3.213536","172.30.1.205","172.30.1.104","TCP","54","34062 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7012","3.213573","172.30.1.205","172.30.1.104","TCP","54","34066 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7013","3.213607","172.30.1.205","172.30.1.104","TCP","54","34070 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7014","3.213639","172.30.1.205","172.30.1.104","TCP","54","34074 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7015","3.213672","172.30.1.205","172.30.1.104","TCP","54","34078 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7016","3.213704","172.30.1.205","172.30.1.104","TCP","54","34082 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7017","3.213730","172.30.1.205","172.30.1.104","TCP","54","34086 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7018","3.213752","172.30.1.205","172.30.1.104","TCP","54","34090 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7019","3.213783","172.30.1.205","172.30.1.104","TCP","54","34094 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7020","3.213809","172.30.1.205","172.30.1.104","TCP","54","34098 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7021","3.213837","172.30.1.205","172.30.1.104","TCP","54","34102 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7022","3.213981","172.30.1.104","172.30.1.205","TCP","54","49671 > 34058 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7023","3.213991","172.30.1.104","172.30.1.205","TCP","54","49671 > 34062 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7024","3.213994","172.30.1.104","172.30.1.205","TCP","54","49671 > 34066 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7025","3.213997","172.30.1.104","172.30.1.205","TCP","54","49671 > 34058 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7026","3.214003","172.30.1.205","172.30.1.104","TCP","54","34058 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7027","3.214010","172.30.1.104","172.30.1.205","TCP","54","49671 > 34062 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7028","3.214013","172.30.1.205","172.30.1.104","TCP","54","34062 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7029","3.214014","172.30.1.104","172.30.1.205","TCP","54","49671 > 34070 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7030","3.214236","172.30.1.104","172.30.1.205","TCP","54","49671 > 34074 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7031","3.214242","172.30.1.104","172.30.1.205","TCP","54","49671 > 34078 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7032","3.214245","172.30.1.104","172.30.1.205","TCP","54","49671 > 34078 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7033","3.214249","172.30.1.205","172.30.1.104","TCP","54","34078 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7034","3.214256","172.30.1.104","172.30.1.205","TCP","54","49671 > 34074 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7035","3.214258","172.30.1.205","172.30.1.104","TCP","54","34074 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7036","3.214260","172.30.1.104","172.30.1.205","TCP","54","49671 > 34066 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7037","3.214261","172.30.1.205","172.30.1.104","TCP","54","34066 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7038","3.214263","172.30.1.104","172.30.1.205","TCP","54","49671 > 34070 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7039","3.214268","172.30.1.205","172.30.1.104","TCP","54","34070 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7040","3.214269","172.30.1.104","172.30.1.205","TCP","54","49671 > 34082 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7041","3.214273","172.30.1.104","172.30.1.205","TCP","54","49671 > 34086 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7042","3.214275","172.30.1.104","172.30.1.205","TCP","54","49671 > 34094 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7043","3.214357","172.30.1.104","172.30.1.205","TCP","54","49671 > 34090 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7044","3.214376","172.30.1.104","172.30.1.205","TCP","54","49671 > 34082 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7045","3.214379","172.30.1.205","172.30.1.104","TCP","54","34082 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7046","3.214396","172.30.1.104","172.30.1.205","TCP","54","49671 > 34098 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7047","3.214423","172.30.1.104","172.30.1.205","TCP","54","49671 > 34098 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7048","3.214425","172.30.1.205","172.30.1.104","TCP","54","34098 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7049","3.214444","172.30.1.104","172.30.1.205","TCP","54","49671 > 34090 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7050","3.214447","172.30.1.205","172.30.1.104","TCP","54","34090 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7051","3.214465","172.30.1.104","172.30.1.205","TCP","54","49671 > 34086 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7052","3.214468","172.30.1.205","172.30.1.104","TCP","54","34086 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7053","3.214484","172.30.1.104","172.30.1.205","TCP","54","49671 > 34094 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7054","3.214487","172.30.1.205","172.30.1.104","TCP","54","34094 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7055","3.214504","172.30.1.104","172.30.1.205","TCP","54","49671 > 34102 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7056","3.214525","172.30.1.104","172.30.1.205","TCP","54","49671 > 34102 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7057","3.214531","172.30.1.205","172.30.1.104","TCP","54","34102 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7058","3.215348","172.30.1.205","172.30.1.104","TCP","54","41468 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7059","3.215476","172.30.1.205","172.30.1.104","TCP","74","34106 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906441 TSecr=0 WS=128" "7060","3.215692","172.30.1.104","172.30.1.205","TCP","54","135 > 41468 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7061","3.215773","172.30.1.104","172.30.1.205","TCP","66","49671 > 34106 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7062","3.215782","172.30.1.205","172.30.1.104","TCP","54","34106 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7063","3.215788","172.30.1.104","172.30.1.205","TCP","54","135 > 41468 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7064","3.215792","172.30.1.205","172.30.1.104","TCP","54","41468 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7065","3.216149","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7066","3.216412","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7067","3.216420","172.30.1.205","172.30.1.104","TCP","54","34106 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7068","3.218327","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7069","3.218734","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7070","3.218741","172.30.1.205","172.30.1.104","TCP","54","34106 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7071","3.220094","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7072","3.221196","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7073","3.221205","172.30.1.205","172.30.1.104","TCP","54","34106 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7074","3.222152","172.30.1.205","172.30.1.104","TCP","74","41472 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906448 TSecr=0 WS=128" "7075","3.222434","172.30.1.104","172.30.1.205","TCP","66","135 > 41472 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7076","3.222445","172.30.1.205","172.30.1.104","TCP","54","41472 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7077","3.222824","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7078","3.223087","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7079","3.223096","172.30.1.205","172.30.1.104","TCP","54","41472 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7080","3.225365","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7081","3.225732","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7082","3.225739","172.30.1.205","172.30.1.104","TCP","54","41472 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7083","3.227556","172.30.1.205","172.30.1.104","TCP","54","41472 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7084","3.227667","172.30.1.205","172.30.1.104","TCP","74","34110 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906454 TSecr=0 WS=128" "7085","3.227843","172.30.1.104","172.30.1.205","TCP","54","135 > 41472 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7086","3.227871","172.30.1.104","172.30.1.205","TCP","54","135 > 41472 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7087","3.227876","172.30.1.205","172.30.1.104","TCP","54","41472 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7088","3.227953","172.30.1.104","172.30.1.205","TCP","66","49671 > 34110 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7089","3.227962","172.30.1.205","172.30.1.104","TCP","54","34110 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7090","3.228304","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7091","3.228573","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7092","3.228582","172.30.1.205","172.30.1.104","TCP","54","34110 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7093","3.230479","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7094","3.230820","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7095","3.230824","172.30.1.205","172.30.1.104","TCP","54","34110 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7096","3.232162","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7097","3.233429","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7098","3.233439","172.30.1.205","172.30.1.104","TCP","54","34110 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7099","3.234372","172.30.1.205","172.30.1.104","TCP","74","41476 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906460 TSecr=0 WS=128" "7100","3.234687","172.30.1.104","172.30.1.205","TCP","66","135 > 41476 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7101","3.234698","172.30.1.205","172.30.1.104","TCP","54","41476 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7102","3.235043","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7103","3.235334","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7104","3.235343","172.30.1.205","172.30.1.104","TCP","54","41476 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7105","3.237543","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7106","3.237992","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7107","3.237998","172.30.1.205","172.30.1.104","TCP","54","41476 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7108","3.239785","172.30.1.205","172.30.1.104","TCP","54","41476 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7109","3.239895","172.30.1.205","172.30.1.104","TCP","74","34114 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906466 TSecr=0 WS=128" "7110","3.240083","172.30.1.104","172.30.1.205","TCP","54","135 > 41476 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7111","3.240107","172.30.1.104","172.30.1.205","TCP","54","135 > 41476 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7112","3.240113","172.30.1.205","172.30.1.104","TCP","54","41476 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7113","3.240215","172.30.1.104","172.30.1.205","TCP","66","49671 > 34114 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7114","3.240223","172.30.1.205","172.30.1.104","TCP","54","34114 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7115","3.240564","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7116","3.240876","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7117","3.240884","172.30.1.205","172.30.1.104","TCP","54","34114 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7118","3.242741","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7119","3.243134","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7120","3.243140","172.30.1.205","172.30.1.104","TCP","54","34114 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7121","3.244473","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7122","3.245747","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7123","3.245759","172.30.1.205","172.30.1.104","TCP","54","34114 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7124","3.246725","172.30.1.205","172.30.1.104","TCP","74","41480 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906473 TSecr=0 WS=128" "7125","3.247015","172.30.1.104","172.30.1.205","TCP","66","135 > 41480 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7126","3.247028","172.30.1.205","172.30.1.104","TCP","54","41480 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7127","3.247389","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7128","3.247659","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7129","3.247668","172.30.1.205","172.30.1.104","TCP","54","41480 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7130","3.249884","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7131","3.250749","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7132","3.250756","172.30.1.205","172.30.1.104","TCP","54","41480 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7133","3.252589","172.30.1.205","172.30.1.104","TCP","54","41480 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7134","3.252702","172.30.1.205","172.30.1.104","TCP","74","34118 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906479 TSecr=0 WS=128" "7135","3.252868","172.30.1.104","172.30.1.205","TCP","54","135 > 41480 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7136","3.252877","172.30.1.104","172.30.1.205","TCP","54","135 > 41480 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7137","3.252883","172.30.1.205","172.30.1.104","TCP","54","41480 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7138","3.252978","172.30.1.104","172.30.1.205","TCP","66","49671 > 34118 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7139","3.252986","172.30.1.205","172.30.1.104","TCP","54","34118 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7140","3.253334","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7141","3.253618","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7142","3.253627","172.30.1.205","172.30.1.104","TCP","54","34118 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7143","3.255513","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7144","3.255869","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7145","3.255875","172.30.1.205","172.30.1.104","TCP","54","34118 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7146","3.257266","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7147","3.258400","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7148","3.258409","172.30.1.205","172.30.1.104","TCP","54","34118 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7149","3.259332","172.30.1.205","172.30.1.104","TCP","74","41484 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906485 TSecr=0 WS=128" "7150","3.259671","172.30.1.104","172.30.1.205","TCP","66","135 > 41484 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7151","3.259682","172.30.1.205","172.30.1.104","TCP","54","41484 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7152","3.260026","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7153","3.260326","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7154","3.260335","172.30.1.205","172.30.1.104","TCP","54","41484 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7155","3.262585","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7156","3.262951","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7157","3.262957","172.30.1.205","172.30.1.104","TCP","54","41484 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7158","3.264750","172.30.1.205","172.30.1.104","TCP","54","41484 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7159","3.264890","172.30.1.205","172.30.1.104","TCP","74","34122 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906491 TSecr=0 WS=128" "7160","3.265032","172.30.1.104","172.30.1.205","TCP","54","135 > 41484 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7161","3.265041","172.30.1.104","172.30.1.205","TCP","54","135 > 41484 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7162","3.265047","172.30.1.205","172.30.1.104","TCP","54","41484 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7163","3.265185","172.30.1.104","172.30.1.205","TCP","66","49671 > 34122 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7164","3.265193","172.30.1.205","172.30.1.104","TCP","54","34122 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7165","3.265537","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7166","3.265824","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7167","3.265833","172.30.1.205","172.30.1.104","TCP","54","34122 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7168","3.267689","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7169","3.268087","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7170","3.268091","172.30.1.205","172.30.1.104","TCP","54","34122 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7171","3.269470","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7172","3.270616","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7173","3.270626","172.30.1.205","172.30.1.104","TCP","54","34122 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7174","3.271567","172.30.1.205","172.30.1.104","TCP","74","41488 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906497 TSecr=0 WS=128" "7175","3.271868","172.30.1.104","172.30.1.205","TCP","66","135 > 41488 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7176","3.271879","172.30.1.205","172.30.1.104","TCP","54","41488 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7177","3.272223","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7178","3.272506","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7179","3.272515","172.30.1.205","172.30.1.104","TCP","54","41488 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7180","3.274711","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7181","3.275126","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7182","3.275133","172.30.1.205","172.30.1.104","TCP","54","41488 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7183","3.276961","172.30.1.205","172.30.1.104","TCP","54","41488 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7184","3.277072","172.30.1.205","172.30.1.104","TCP","74","34126 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906503 TSecr=0 WS=128" "7185","3.277332","172.30.1.104","172.30.1.205","TCP","54","135 > 41488 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7186","3.277341","172.30.1.104","172.30.1.205","TCP","66","49671 > 34126 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7187","3.277350","172.30.1.205","172.30.1.104","TCP","54","34126 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7188","3.277393","172.30.1.104","172.30.1.205","TCP","54","135 > 41488 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7189","3.277399","172.30.1.205","172.30.1.104","TCP","54","41488 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7190","3.277719","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7191","3.278050","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7192","3.278057","172.30.1.205","172.30.1.104","TCP","54","34126 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7193","3.279898","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7194","3.280266","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7195","3.280272","172.30.1.205","172.30.1.104","TCP","54","34126 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7196","3.281641","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7197","3.282758","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7198","3.282768","172.30.1.205","172.30.1.104","TCP","54","34126 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7199","3.283696","172.30.1.205","172.30.1.104","TCP","74","41492 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906510 TSecr=0 WS=128" "7200","3.284009","172.30.1.104","172.30.1.205","TCP","66","135 > 41492 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7201","3.284020","172.30.1.205","172.30.1.104","TCP","54","41492 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7202","3.284365","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7203","3.284626","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7204","3.284635","172.30.1.205","172.30.1.104","TCP","54","41492 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7205","3.286861","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7206","3.287255","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7207","3.287263","172.30.1.205","172.30.1.104","TCP","54","41492 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7208","3.289096","172.30.1.205","172.30.1.104","TCP","54","41492 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7209","3.289206","172.30.1.205","172.30.1.104","TCP","74","34130 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906515 TSecr=0 WS=128" "7210","3.289389","172.30.1.104","172.30.1.205","TCP","54","135 > 41492 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7211","3.289395","172.30.1.104","172.30.1.205","TCP","54","135 > 41492 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7212","3.289400","172.30.1.205","172.30.1.104","TCP","54","41492 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7213","3.289483","172.30.1.104","172.30.1.205","TCP","66","49671 > 34130 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7214","3.289491","172.30.1.205","172.30.1.104","TCP","54","34130 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7215","3.289835","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7216","3.290106","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7217","3.290115","172.30.1.205","172.30.1.104","TCP","54","34130 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7218","3.291978","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7219","3.292316","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7220","3.292323","172.30.1.205","172.30.1.104","TCP","54","34130 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7221","3.293708","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7222","3.294853","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7223","3.294862","172.30.1.205","172.30.1.104","TCP","54","34130 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7224","3.295794","172.30.1.205","172.30.1.104","TCP","74","41496 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906522 TSecr=0 WS=128" "7225","3.296091","172.30.1.104","172.30.1.205","TCP","66","135 > 41496 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7226","3.296101","172.30.1.205","172.30.1.104","TCP","54","41496 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7227","3.296448","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7228","3.296717","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7229","3.296725","172.30.1.205","172.30.1.104","TCP","54","41496 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7230","3.298920","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7231","3.299275","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7232","3.299281","172.30.1.205","172.30.1.104","TCP","54","41496 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7233","3.301111","172.30.1.205","172.30.1.104","TCP","54","41496 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7234","3.301221","172.30.1.205","172.30.1.104","TCP","74","34134 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906527 TSecr=0 WS=128" "7235","3.301350","172.30.1.104","172.30.1.205","TCP","54","135 > 41496 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7236","3.301383","172.30.1.104","172.30.1.205","TCP","54","135 > 41496 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7237","3.301389","172.30.1.205","172.30.1.104","TCP","54","41496 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7238","3.301488","172.30.1.104","172.30.1.205","TCP","66","49671 > 34134 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7239","3.301497","172.30.1.205","172.30.1.104","TCP","54","34134 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7240","3.301840","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7241","3.302111","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7242","3.302120","172.30.1.205","172.30.1.104","TCP","54","34134 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7243","3.303983","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7244","3.304343","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7245","3.304349","172.30.1.205","172.30.1.104","TCP","54","34134 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7246","3.305736","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7247","3.306910","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7248","3.306921","172.30.1.205","172.30.1.104","TCP","54","34134 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7249","3.307865","172.30.1.205","172.30.1.104","TCP","74","41500 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906534 TSecr=0 WS=128" "7250","3.308157","172.30.1.104","172.30.1.205","TCP","66","135 > 41500 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7251","3.308168","172.30.1.205","172.30.1.104","TCP","54","41500 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7252","3.308514","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7253","3.308792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7254","3.308801","172.30.1.205","172.30.1.104","TCP","54","41500 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7255","3.310965","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7256","3.311335","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7257","3.311341","172.30.1.205","172.30.1.104","TCP","54","41500 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7258","3.313156","172.30.1.205","172.30.1.104","TCP","54","41500 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7259","3.313265","172.30.1.205","172.30.1.104","TCP","74","34138 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906539 TSecr=0 WS=128" "7260","3.313433","172.30.1.104","172.30.1.205","TCP","54","135 > 41500 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7261","3.313441","172.30.1.104","172.30.1.205","TCP","54","135 > 41500 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7262","3.313446","172.30.1.205","172.30.1.104","TCP","54","41500 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7263","3.313560","172.30.1.104","172.30.1.205","TCP","66","49671 > 34138 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7264","3.313569","172.30.1.205","172.30.1.104","TCP","54","34138 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7265","3.313911","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7266","3.315297","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7267","3.315309","172.30.1.205","172.30.1.104","TCP","54","34138 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7268","3.317216","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7269","3.317551","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7270","3.317557","172.30.1.205","172.30.1.104","TCP","54","34138 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7271","3.318890","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7272","3.320030","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7273","3.320039","172.30.1.205","172.30.1.104","TCP","54","34138 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7274","3.320987","172.30.1.205","172.30.1.104","TCP","74","41504 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906547 TSecr=0 WS=128" "7275","3.321278","172.30.1.104","172.30.1.205","TCP","66","135 > 41504 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7276","3.321289","172.30.1.205","172.30.1.104","TCP","54","41504 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7277","3.321635","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7278","3.321905","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7279","3.321914","172.30.1.205","172.30.1.104","TCP","54","41504 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7280","3.324065","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7281","3.324427","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7282","3.324434","172.30.1.205","172.30.1.104","TCP","54","41504 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7283","3.326248","172.30.1.205","172.30.1.104","TCP","54","41504 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7284","3.326358","172.30.1.205","172.30.1.104","TCP","74","34142 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906552 TSecr=0 WS=128" "7285","3.326534","172.30.1.104","172.30.1.205","TCP","54","135 > 41504 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7286","3.326584","172.30.1.104","172.30.1.205","TCP","54","135 > 41504 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7287","3.326589","172.30.1.205","172.30.1.104","TCP","54","41504 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7288","3.326664","172.30.1.104","172.30.1.205","TCP","66","49671 > 34142 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7289","3.326672","172.30.1.205","172.30.1.104","TCP","54","34142 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7290","3.327013","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7291","3.327293","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7292","3.327301","172.30.1.205","172.30.1.104","TCP","54","34142 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7293","3.329188","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7294","3.329566","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7295","3.329573","172.30.1.205","172.30.1.104","TCP","54","34142 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7296","3.330906","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7297","3.332055","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7298","3.332064","172.30.1.205","172.30.1.104","TCP","54","34142 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7299","3.333014","172.30.1.205","172.30.1.104","TCP","74","41508 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906559 TSecr=0 WS=128" "7300","3.333372","172.30.1.104","172.30.1.205","TCP","66","135 > 41508 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7301","3.333383","172.30.1.205","172.30.1.104","TCP","54","41508 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7302","3.333735","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7303","3.334234","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7304","3.334243","172.30.1.205","172.30.1.104","TCP","54","41508 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7305","3.336415","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7306","3.336792","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7307","3.336803","172.30.1.205","172.30.1.104","TCP","54","41508 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7308","3.338603","172.30.1.205","172.30.1.104","TCP","54","41508 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7309","3.338714","172.30.1.205","172.30.1.104","TCP","74","34146 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906565 TSecr=0 WS=128" "7310","3.338887","172.30.1.104","172.30.1.205","TCP","54","135 > 41508 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7311","3.338932","172.30.1.104","172.30.1.205","TCP","54","135 > 41508 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7312","3.338937","172.30.1.205","172.30.1.104","TCP","54","41508 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7313","3.338987","172.30.1.104","172.30.1.205","TCP","66","49671 > 34146 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7314","3.338995","172.30.1.205","172.30.1.104","TCP","54","34146 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7315","3.339344","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7316","3.339701","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7317","3.339708","172.30.1.205","172.30.1.104","TCP","54","34146 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7318","3.341599","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7319","3.341973","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7320","3.341979","172.30.1.205","172.30.1.104","TCP","54","34146 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7321","3.343307","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7322","3.344508","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7323","3.344517","172.30.1.205","172.30.1.104","TCP","54","34146 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7324","3.345464","172.30.1.205","172.30.1.104","TCP","74","41512 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906571 TSecr=0 WS=128" "7325","3.345761","172.30.1.104","172.30.1.205","TCP","66","135 > 41512 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7326","3.345772","172.30.1.205","172.30.1.104","TCP","54","41512 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7327","3.346120","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7328","3.346391","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7329","3.346400","172.30.1.205","172.30.1.104","TCP","54","41512 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7330","3.348578","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7331","3.349128","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7332","3.349135","172.30.1.205","172.30.1.104","TCP","54","41512 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7333","3.351018","172.30.1.205","172.30.1.104","TCP","54","41512 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7334","3.351128","172.30.1.205","172.30.1.104","TCP","74","34150 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906577 TSecr=0 WS=128" "7335","3.351268","172.30.1.104","172.30.1.205","TCP","54","135 > 41512 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7336","3.351295","172.30.1.104","172.30.1.205","TCP","54","135 > 41512 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7337","3.351300","172.30.1.205","172.30.1.104","TCP","54","41512 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7338","3.351396","172.30.1.104","172.30.1.205","TCP","66","49671 > 34150 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7339","3.351404","172.30.1.205","172.30.1.104","TCP","54","34150 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7340","3.351756","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7341","3.352030","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7342","3.352039","172.30.1.205","172.30.1.104","TCP","54","34150 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7343","3.353968","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7344","3.354320","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7345","3.354327","172.30.1.205","172.30.1.104","TCP","54","34150 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7346","3.355651","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7347","3.358789","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7348","3.358798","172.30.1.205","172.30.1.104","TCP","54","34150 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7349","3.359761","172.30.1.205","172.30.1.104","TCP","74","41516 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906586 TSecr=0 WS=128" "7350","3.360077","172.30.1.104","172.30.1.205","TCP","66","135 > 41516 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7351","3.360088","172.30.1.205","172.30.1.104","TCP","54","41516 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7352","3.360434","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7353","3.360747","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7354","3.360762","172.30.1.205","172.30.1.104","TCP","54","41516 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7355","3.362952","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7356","3.363325","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7357","3.363331","172.30.1.205","172.30.1.104","TCP","54","41516 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7358","3.364164","172.30.1.205","172.30.1.104","TCP","54","34110 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7359","3.364213","172.30.1.205","172.30.1.104","TCP","54","34114 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7360","3.364250","172.30.1.205","172.30.1.104","TCP","54","34118 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7361","3.364284","172.30.1.205","172.30.1.104","TCP","54","34122 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7362","3.364315","172.30.1.205","172.30.1.104","TCP","54","34126 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7363","3.364346","172.30.1.205","172.30.1.104","TCP","54","34130 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7364","3.364374","172.30.1.205","172.30.1.104","TCP","54","34134 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7365","3.364401","172.30.1.205","172.30.1.104","TCP","54","34138 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7366","3.364429","172.30.1.205","172.30.1.104","TCP","54","34142 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7367","3.364451","172.30.1.205","172.30.1.104","TCP","54","34146 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7368","3.364472","172.30.1.205","172.30.1.104","TCP","54","34150 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7369","3.364547","172.30.1.205","172.30.1.104","TCP","54","34106 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7370","3.364602","172.30.1.104","172.30.1.205","TCP","54","49671 > 34110 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7371","3.364611","172.30.1.104","172.30.1.205","TCP","54","49671 > 34114 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7372","3.364614","172.30.1.104","172.30.1.205","TCP","54","49671 > 34110 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7373","3.364621","172.30.1.205","172.30.1.104","TCP","54","34110 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7374","3.364855","172.30.1.104","172.30.1.205","TCP","54","49671 > 34118 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7375","3.364863","172.30.1.104","172.30.1.205","TCP","54","49671 > 34122 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7376","3.365070","172.30.1.104","172.30.1.205","TCP","54","49671 > 34122 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7377","3.365077","172.30.1.205","172.30.1.104","TCP","54","34122 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7378","3.365083","172.30.1.104","172.30.1.205","TCP","54","49671 > 34114 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7379","3.365086","172.30.1.205","172.30.1.104","TCP","54","34114 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7380","3.365088","172.30.1.104","172.30.1.205","TCP","54","49671 > 34118 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7381","3.365089","172.30.1.205","172.30.1.104","TCP","54","34118 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7382","3.365094","172.30.1.104","172.30.1.205","TCP","54","49671 > 34126 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7383","3.365100","172.30.1.104","172.30.1.205","TCP","54","49671 > 34130 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7384","3.365102","172.30.1.104","172.30.1.205","TCP","54","49671 > 34130 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7385","3.365104","172.30.1.205","172.30.1.104","TCP","54","34130 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7386","3.365106","172.30.1.104","172.30.1.205","TCP","54","49671 > 34134 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7387","3.365108","172.30.1.104","172.30.1.205","TCP","54","49671 > 34138 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7388","3.365111","172.30.1.104","172.30.1.205","TCP","54","49671 > 34126 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7389","3.365113","172.30.1.205","172.30.1.104","TCP","54","34126 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7390","3.365128","172.30.1.104","172.30.1.205","TCP","54","49671 > 34142 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7391","3.365131","172.30.1.104","172.30.1.205","TCP","54","49671 > 34142 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7392","3.365133","172.30.1.205","172.30.1.104","TCP","54","34142 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7393","3.365135","172.30.1.104","172.30.1.205","TCP","54","49671 > 34146 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7394","3.365137","172.30.1.104","172.30.1.205","TCP","54","49671 > 34150 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7395","3.365139","172.30.1.104","172.30.1.205","TCP","54","49671 > 34138 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7396","3.365141","172.30.1.205","172.30.1.104","TCP","54","34138 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7397","3.365184","172.30.1.104","172.30.1.205","TCP","54","49671 > 34150 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7398","3.365188","172.30.1.205","172.30.1.104","TCP","54","34150 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7399","3.365200","172.30.1.104","172.30.1.205","TCP","54","49671 > 34106 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7400","3.365225","172.30.1.104","172.30.1.205","TCP","54","49671 > 34106 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7401","3.365230","172.30.1.205","172.30.1.104","TCP","54","34106 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7402","3.365246","172.30.1.104","172.30.1.205","TCP","54","49671 > 34146 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7403","3.365249","172.30.1.205","172.30.1.104","TCP","54","34146 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7404","3.365267","172.30.1.104","172.30.1.205","TCP","54","49671 > 34134 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7405","3.365273","172.30.1.205","172.30.1.104","TCP","54","34134 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7406","3.366034","172.30.1.205","172.30.1.104","TCP","54","41516 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7407","3.366147","172.30.1.205","172.30.1.104","TCP","74","34154 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906592 TSecr=0 WS=128" "7408","3.366298","172.30.1.104","172.30.1.205","TCP","54","135 > 41516 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7409","3.366323","172.30.1.104","172.30.1.205","TCP","54","135 > 41516 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7410","3.366328","172.30.1.205","172.30.1.104","TCP","54","41516 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7411","3.366444","172.30.1.104","172.30.1.205","TCP","66","49671 > 34154 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7412","3.366452","172.30.1.205","172.30.1.104","TCP","54","34154 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7413","3.366803","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7414","3.368346","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7415","3.368353","172.30.1.205","172.30.1.104","TCP","54","34154 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7416","3.370258","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7417","3.370602","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7418","3.370608","172.30.1.205","172.30.1.104","TCP","54","34154 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7419","3.371964","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7420","3.373334","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7421","3.373343","172.30.1.205","172.30.1.104","TCP","54","34154 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7422","3.374296","172.30.1.205","172.30.1.104","TCP","74","41520 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906600 TSecr=0 WS=128" "7423","3.374605","172.30.1.104","172.30.1.205","TCP","66","135 > 41520 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7424","3.374615","172.30.1.205","172.30.1.104","TCP","54","41520 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7425","3.374968","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7426","3.375242","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7427","3.375251","172.30.1.205","172.30.1.104","TCP","54","41520 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7428","3.377442","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7429","3.377812","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7430","3.377818","172.30.1.205","172.30.1.104","TCP","54","41520 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7431","3.379643","172.30.1.205","172.30.1.104","TCP","54","41520 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7432","3.379753","172.30.1.205","172.30.1.104","TCP","74","34158 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906606 TSecr=0 WS=128" "7433","3.379901","172.30.1.104","172.30.1.205","TCP","54","135 > 41520 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7434","3.379937","172.30.1.104","172.30.1.205","TCP","54","135 > 41520 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7435","3.379943","172.30.1.205","172.30.1.104","TCP","54","41520 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7436","3.380051","172.30.1.104","172.30.1.205","TCP","66","49671 > 34158 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7437","3.380059","172.30.1.205","172.30.1.104","TCP","54","34158 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7438","3.380402","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7439","3.381913","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7440","3.381922","172.30.1.205","172.30.1.104","TCP","54","34158 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7441","3.383793","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7442","3.384168","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7443","3.384175","172.30.1.205","172.30.1.104","TCP","54","34158 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7444","3.385547","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7445","3.386747","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7446","3.386757","172.30.1.205","172.30.1.104","TCP","54","34158 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7447","3.387690","172.30.1.205","172.30.1.104","TCP","74","41524 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906614 TSecr=0 WS=128" "7448","3.388044","172.30.1.104","172.30.1.205","TCP","66","135 > 41524 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7449","3.388055","172.30.1.205","172.30.1.104","TCP","54","41524 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7450","3.388403","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7451","3.388695","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7452","3.388705","172.30.1.205","172.30.1.104","TCP","54","41524 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7453","3.390898","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7454","3.391295","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7455","3.391302","172.30.1.205","172.30.1.104","TCP","54","41524 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7456","3.393119","172.30.1.205","172.30.1.104","TCP","54","41524 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7457","3.393228","172.30.1.205","172.30.1.104","TCP","74","34162 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906619 TSecr=0 WS=128" "7458","3.393367","172.30.1.104","172.30.1.205","TCP","54","135 > 41524 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7459","3.393389","172.30.1.104","172.30.1.205","TCP","54","135 > 41524 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7460","3.393394","172.30.1.205","172.30.1.104","TCP","54","41524 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7461","3.393518","172.30.1.104","172.30.1.205","TCP","66","49671 > 34162 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7462","3.393527","172.30.1.205","172.30.1.104","TCP","54","34162 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7463","3.393867","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7464","3.394170","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7465","3.394179","172.30.1.205","172.30.1.104","TCP","54","34162 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7466","3.396023","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7467","3.396382","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7468","3.396386","172.30.1.205","172.30.1.104","TCP","54","34162 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7469","3.397750","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7470","3.398913","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7471","3.398923","172.30.1.205","172.30.1.104","TCP","54","34162 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7472","3.399859","172.30.1.205","172.30.1.104","TCP","74","41528 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906626 TSecr=0 WS=128" "7473","3.400174","172.30.1.104","172.30.1.205","TCP","66","135 > 41528 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7474","3.400185","172.30.1.205","172.30.1.104","TCP","54","41528 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7475","3.400530","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7476","3.400817","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7477","3.400827","172.30.1.205","172.30.1.104","TCP","54","41528 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7478","3.402997","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7479","3.403629","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7480","3.403636","172.30.1.205","172.30.1.104","TCP","54","41528 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7481","3.405456","172.30.1.205","172.30.1.104","TCP","54","41528 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7482","3.405567","172.30.1.205","172.30.1.104","TCP","74","34166 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906631 TSecr=0 WS=128" "7483","3.405740","172.30.1.104","172.30.1.205","TCP","54","135 > 41528 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7484","3.405772","172.30.1.104","172.30.1.205","TCP","54","135 > 41528 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7485","3.405778","172.30.1.205","172.30.1.104","TCP","54","41528 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7486","3.405856","172.30.1.104","172.30.1.205","TCP","66","49671 > 34166 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7487","3.405864","172.30.1.205","172.30.1.104","TCP","54","34166 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7488","3.406215","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7489","3.406506","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7490","3.406517","172.30.1.205","172.30.1.104","TCP","54","34166 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7491","3.408381","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7492","3.408739","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7493","3.408745","172.30.1.205","172.30.1.104","TCP","54","34166 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7494","3.410123","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7495","3.411674","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7496","3.411684","172.30.1.205","172.30.1.104","TCP","54","34166 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7497","3.412618","172.30.1.205","172.30.1.104","TCP","74","41532 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906639 TSecr=0 WS=128" "7498","3.412928","172.30.1.104","172.30.1.205","TCP","66","135 > 41532 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7499","3.412940","172.30.1.205","172.30.1.104","TCP","54","41532 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7500","3.413292","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7501","3.413594","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7502","3.413604","172.30.1.205","172.30.1.104","TCP","54","41532 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7503","3.415782","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7504","3.416145","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7505","3.416152","172.30.1.205","172.30.1.104","TCP","54","41532 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7506","3.417965","172.30.1.205","172.30.1.104","TCP","54","41532 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7507","3.418078","172.30.1.205","172.30.1.104","TCP","74","34170 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906644 TSecr=0 WS=128" "7508","3.418246","172.30.1.104","172.30.1.205","TCP","54","135 > 41532 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7509","3.418261","172.30.1.104","172.30.1.205","TCP","54","135 > 41532 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7510","3.418266","172.30.1.205","172.30.1.104","TCP","54","41532 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7511","3.418357","172.30.1.104","172.30.1.205","TCP","66","49671 > 34170 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7512","3.418365","172.30.1.205","172.30.1.104","TCP","54","34170 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7513","3.418706","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7514","3.418985","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7515","3.418994","172.30.1.205","172.30.1.104","TCP","54","34170 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7516","3.420882","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7517","3.421255","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7518","3.421262","172.30.1.205","172.30.1.104","TCP","54","34170 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7519","3.422615","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7520","3.423792","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7521","3.423801","172.30.1.205","172.30.1.104","TCP","54","34170 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7522","3.424724","172.30.1.205","172.30.1.104","TCP","74","41536 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906651 TSecr=0 WS=128" "7523","3.425022","172.30.1.104","172.30.1.205","TCP","66","135 > 41536 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7524","3.425033","172.30.1.205","172.30.1.104","TCP","54","41536 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7525","3.425392","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7526","3.425656","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7527","3.425664","172.30.1.205","172.30.1.104","TCP","54","41536 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7528","3.427837","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7529","3.428211","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7530","3.428217","172.30.1.205","172.30.1.104","TCP","54","41536 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7531","3.430047","172.30.1.205","172.30.1.104","TCP","54","41536 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7532","3.430159","172.30.1.205","172.30.1.104","TCP","74","34174 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906656 TSecr=0 WS=128" "7533","3.430309","172.30.1.104","172.30.1.205","TCP","54","135 > 41536 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7534","3.430318","172.30.1.104","172.30.1.205","TCP","54","135 > 41536 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7535","3.430323","172.30.1.205","172.30.1.104","TCP","54","41536 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7536","3.430459","172.30.1.104","172.30.1.205","TCP","66","49671 > 34174 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7537","3.430468","172.30.1.205","172.30.1.104","TCP","54","34174 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7538","3.430830","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7539","3.431108","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7540","3.431117","172.30.1.205","172.30.1.104","TCP","54","34174 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7541","3.433003","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7542","3.433447","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7543","3.433454","172.30.1.205","172.30.1.104","TCP","54","34174 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7544","3.434794","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7545","3.436000","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7546","3.436010","172.30.1.205","172.30.1.104","TCP","54","34174 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7547","3.436952","172.30.1.205","172.30.1.104","TCP","74","41540 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906663 TSecr=0 WS=128" "7548","3.437241","172.30.1.104","172.30.1.205","TCP","66","135 > 41540 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7549","3.437251","172.30.1.205","172.30.1.104","TCP","54","41540 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7550","3.437597","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7551","3.437881","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7552","3.437891","172.30.1.205","172.30.1.104","TCP","54","41540 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7553","3.440078","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7554","3.440481","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7555","3.440488","172.30.1.205","172.30.1.104","TCP","54","41540 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7556","3.442314","172.30.1.205","172.30.1.104","TCP","54","41540 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7557","3.442426","172.30.1.205","172.30.1.104","TCP","74","34178 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906668 TSecr=0 WS=128" "7558","3.442571","172.30.1.104","172.30.1.205","TCP","54","135 > 41540 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7559","3.442615","172.30.1.104","172.30.1.205","TCP","54","135 > 41540 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7560","3.442620","172.30.1.205","172.30.1.104","TCP","54","41540 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7561","3.442690","172.30.1.104","172.30.1.205","TCP","66","49671 > 34178 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7562","3.442699","172.30.1.205","172.30.1.104","TCP","54","34178 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7563","3.443046","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7564","3.443317","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7565","3.443326","172.30.1.205","172.30.1.104","TCP","54","34178 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7566","3.445260","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7567","3.446667","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7568","3.446677","172.30.1.205","172.30.1.104","TCP","54","34178 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7569","3.448138","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7570","3.449415","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7571","3.449425","172.30.1.205","172.30.1.104","TCP","54","34178 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7572","3.450393","172.30.1.205","172.30.1.104","TCP","74","41544 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906676 TSecr=0 WS=128" "7573","3.450692","172.30.1.104","172.30.1.205","TCP","66","135 > 41544 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7574","3.450703","172.30.1.205","172.30.1.104","TCP","54","41544 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7575","3.451066","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7576","3.451371","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7577","3.451381","172.30.1.205","172.30.1.104","TCP","54","41544 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7578","3.453610","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7579","3.454192","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7580","3.454199","172.30.1.205","172.30.1.104","TCP","54","41544 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7581","3.456021","172.30.1.205","172.30.1.104","TCP","54","41544 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7582","3.456134","172.30.1.205","172.30.1.104","TCP","74","34182 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906682 TSecr=0 WS=128" "7583","3.456289","172.30.1.104","172.30.1.205","TCP","54","135 > 41544 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7584","3.456318","172.30.1.104","172.30.1.205","TCP","54","135 > 41544 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7585","3.456324","172.30.1.205","172.30.1.104","TCP","54","41544 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7586","3.456407","172.30.1.104","172.30.1.205","TCP","66","49671 > 34182 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7587","3.456414","172.30.1.205","172.30.1.104","TCP","54","34182 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7588","3.456889","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7589","3.457183","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7590","3.457193","172.30.1.205","172.30.1.104","TCP","54","34182 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7591","3.459082","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7592","3.459478","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7593","3.459485","172.30.1.205","172.30.1.104","TCP","54","34182 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7594","3.460873","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7595","3.462046","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7596","3.462057","172.30.1.205","172.30.1.104","TCP","54","34182 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7597","3.463005","172.30.1.205","172.30.1.104","TCP","74","41548 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906689 TSecr=0 WS=128" "7598","3.463295","172.30.1.104","172.30.1.205","TCP","66","135 > 41548 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7599","3.463306","172.30.1.205","172.30.1.104","TCP","54","41548 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7600","3.463655","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7601","3.463986","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7602","3.463995","172.30.1.205","172.30.1.104","TCP","54","41548 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7603","3.466211","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7604","3.466589","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7605","3.466595","172.30.1.205","172.30.1.104","TCP","54","41548 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7606","3.468389","172.30.1.205","172.30.1.104","TCP","54","41548 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7607","3.468501","172.30.1.205","172.30.1.104","TCP","74","34186 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906694 TSecr=0 WS=128" "7608","3.468673","172.30.1.104","172.30.1.205","TCP","54","135 > 41548 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7609","3.468697","172.30.1.104","172.30.1.205","TCP","54","135 > 41548 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7610","3.468702","172.30.1.205","172.30.1.104","TCP","54","41548 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7611","3.468791","172.30.1.104","172.30.1.205","TCP","66","49671 > 34186 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7612","3.468801","172.30.1.205","172.30.1.104","TCP","54","34186 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7613","3.469157","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7614","3.469473","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7615","3.469483","172.30.1.205","172.30.1.104","TCP","54","34186 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7616","3.471346","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7617","3.471716","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7618","3.471722","172.30.1.205","172.30.1.104","TCP","54","34186 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7619","3.473125","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7620","3.474298","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7621","3.474308","172.30.1.205","172.30.1.104","TCP","54","34186 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7622","3.475229","172.30.1.205","172.30.1.104","TCP","74","41552 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906701 TSecr=0 WS=128" "7623","3.475513","172.30.1.104","172.30.1.205","TCP","66","135 > 41552 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7624","3.475524","172.30.1.205","172.30.1.104","TCP","54","41552 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7625","3.475868","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7626","3.476133","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7627","3.476142","172.30.1.205","172.30.1.104","TCP","54","41552 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7628","3.478346","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7629","3.478716","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7630","3.478723","172.30.1.205","172.30.1.104","TCP","54","41552 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7631","3.480525","172.30.1.205","172.30.1.104","TCP","54","41552 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7632","3.480644","172.30.1.205","172.30.1.104","TCP","74","34190 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906707 TSecr=0 WS=128" "7633","3.480765","172.30.1.104","172.30.1.205","TCP","54","135 > 41552 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7634","3.480819","172.30.1.104","172.30.1.205","TCP","54","135 > 41552 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7635","3.480825","172.30.1.205","172.30.1.104","TCP","54","41552 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7636","3.480925","172.30.1.104","172.30.1.205","TCP","66","49671 > 34190 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7637","3.480933","172.30.1.205","172.30.1.104","TCP","54","34190 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7638","3.481295","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7639","3.481580","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7640","3.481589","172.30.1.205","172.30.1.104","TCP","54","34190 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7641","3.483444","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7642","3.483798","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7643","3.483805","172.30.1.205","172.30.1.104","TCP","54","34190 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7644","3.485178","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7645","3.486425","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7646","3.486435","172.30.1.205","172.30.1.104","TCP","54","34190 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7647","3.487358","172.30.1.205","172.30.1.104","TCP","74","41556 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906713 TSecr=0 WS=128" "7648","3.487653","172.30.1.104","172.30.1.205","TCP","66","135 > 41556 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7649","3.487664","172.30.1.205","172.30.1.104","TCP","54","41556 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7650","3.488014","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7651","3.488293","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7652","3.488302","172.30.1.205","172.30.1.104","TCP","54","41556 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7653","3.490535","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7654","3.490905","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7655","3.490912","172.30.1.205","172.30.1.104","TCP","54","41556 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7656","3.492814","172.30.1.205","172.30.1.104","TCP","54","41556 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7657","3.492924","172.30.1.205","172.30.1.104","TCP","74","34194 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906719 TSecr=0 WS=128" "7658","3.493065","172.30.1.104","172.30.1.205","TCP","54","135 > 41556 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7659","3.493089","172.30.1.104","172.30.1.205","TCP","54","135 > 41556 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7660","3.493095","172.30.1.205","172.30.1.104","TCP","54","41556 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7661","3.493182","172.30.1.104","172.30.1.205","TCP","66","49671 > 34194 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7662","3.493191","172.30.1.205","172.30.1.104","TCP","54","34194 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7663","3.493562","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7664","3.493842","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7665","3.493851","172.30.1.205","172.30.1.104","TCP","54","34194 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7666","3.495729","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7667","3.496088","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7668","3.496095","172.30.1.205","172.30.1.104","TCP","54","34194 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7669","3.497457","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7670","3.499957","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7671","3.499967","172.30.1.205","172.30.1.104","TCP","54","34194 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7672","3.500904","172.30.1.205","172.30.1.104","TCP","74","41560 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906727 TSecr=0 WS=128" "7673","3.501191","172.30.1.104","172.30.1.205","TCP","66","135 > 41560 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7674","3.501202","172.30.1.205","172.30.1.104","TCP","54","41560 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7675","3.501549","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7676","3.501844","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7677","3.501853","172.30.1.205","172.30.1.104","TCP","54","41560 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7678","3.504023","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7679","3.504396","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7680","3.504402","172.30.1.205","172.30.1.104","TCP","54","41560 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7681","3.506220","172.30.1.205","172.30.1.104","TCP","54","41560 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7682","3.506331","172.30.1.205","172.30.1.104","TCP","74","34198 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906732 TSecr=0 WS=128" "7683","3.506472","172.30.1.104","172.30.1.205","TCP","54","135 > 41560 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7684","3.506513","172.30.1.104","172.30.1.205","TCP","54","135 > 41560 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7685","3.506518","172.30.1.205","172.30.1.104","TCP","54","41560 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7686","3.506603","172.30.1.104","172.30.1.205","TCP","66","49671 > 34198 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7687","3.506612","172.30.1.205","172.30.1.104","TCP","54","34198 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7688","3.506956","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7689","3.507270","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7690","3.507279","172.30.1.205","172.30.1.104","TCP","54","34198 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7691","3.509170","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7692","3.509547","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7693","3.509554","172.30.1.205","172.30.1.104","TCP","54","34198 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7694","3.510889","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7695","3.512115","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7696","3.512125","172.30.1.205","172.30.1.104","TCP","54","34198 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7697","3.513080","172.30.1.205","172.30.1.104","TCP","74","41564 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906739 TSecr=0 WS=128" "7698","3.513380","172.30.1.104","172.30.1.205","TCP","66","135 > 41564 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7699","3.513391","172.30.1.205","172.30.1.104","TCP","54","41564 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7700","3.513740","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7701","3.514020","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7702","3.514029","172.30.1.205","172.30.1.104","TCP","54","41564 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7703","3.516199","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7704","3.516609","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7705","3.516619","172.30.1.205","172.30.1.104","TCP","54","41564 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7706","3.517563","172.30.1.205","172.30.1.104","TCP","54","34158 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7707","3.517615","172.30.1.205","172.30.1.104","TCP","54","34162 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7708","3.517655","172.30.1.205","172.30.1.104","TCP","54","34166 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7709","3.517691","172.30.1.205","172.30.1.104","TCP","54","34170 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7710","3.517719","172.30.1.205","172.30.1.104","TCP","54","34174 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7711","3.517753","172.30.1.205","172.30.1.104","TCP","54","34178 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7712","3.517780","172.30.1.205","172.30.1.104","TCP","54","34182 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7713","3.517807","172.30.1.205","172.30.1.104","TCP","54","34186 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7714","3.517834","172.30.1.205","172.30.1.104","TCP","54","34190 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7715","3.517853","172.30.1.104","172.30.1.205","TCP","54","49671 > 34158 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7716","3.517883","172.30.1.205","172.30.1.104","TCP","54","34194 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7717","3.517913","172.30.1.205","172.30.1.104","TCP","54","34198 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7718","3.517929","172.30.1.104","172.30.1.205","TCP","54","49671 > 34162 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7719","3.517954","172.30.1.104","172.30.1.205","TCP","54","49671 > 34166 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7720","3.517982","172.30.1.104","172.30.1.205","TCP","54","49671 > 34158 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7721","3.517989","172.30.1.205","172.30.1.104","TCP","54","34158 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7722","3.518008","172.30.1.104","172.30.1.205","TCP","54","49671 > 34162 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7723","3.518012","172.30.1.205","172.30.1.104","TCP","54","34162 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7724","3.518037","172.30.1.104","172.30.1.205","TCP","54","49671 > 34170 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7725","3.518047","172.30.1.205","172.30.1.104","TCP","54","34154 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "7726","3.518065","172.30.1.104","172.30.1.205","TCP","54","49671 > 34174 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7727","3.518198","172.30.1.104","172.30.1.205","TCP","54","49671 > 34178 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7728","3.518222","172.30.1.104","172.30.1.205","TCP","54","49671 > 34178 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7729","3.518228","172.30.1.205","172.30.1.104","TCP","54","34178 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7730","3.518250","172.30.1.104","172.30.1.205","TCP","54","49671 > 34174 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7731","3.518253","172.30.1.205","172.30.1.104","TCP","54","34174 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7732","3.518278","172.30.1.104","172.30.1.205","TCP","54","49671 > 34166 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7733","3.518281","172.30.1.205","172.30.1.104","TCP","54","34166 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7734","3.518305","172.30.1.104","172.30.1.205","TCP","54","49671 > 34170 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7735","3.518307","172.30.1.205","172.30.1.104","TCP","54","34170 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7736","3.518332","172.30.1.104","172.30.1.205","TCP","54","49671 > 34182 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7737","3.518358","172.30.1.104","172.30.1.205","TCP","54","49671 > 34182 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7738","3.518363","172.30.1.205","172.30.1.104","TCP","54","34182 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7739","3.518384","172.30.1.104","172.30.1.205","TCP","54","49671 > 34186 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7740","3.518412","172.30.1.104","172.30.1.205","TCP","54","49671 > 34186 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7741","3.518417","172.30.1.205","172.30.1.104","TCP","54","34186 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7742","3.518704","172.30.1.104","172.30.1.205","TCP","54","49671 > 34190 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7743","3.518727","172.30.1.104","172.30.1.205","TCP","54","49671 > 34190 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7744","3.518733","172.30.1.205","172.30.1.104","TCP","54","34190 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7745","3.518756","172.30.1.104","172.30.1.205","TCP","54","49671 > 34194 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7746","3.518783","172.30.1.104","172.30.1.205","TCP","54","49671 > 34198 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7747","3.518809","172.30.1.104","172.30.1.205","TCP","54","49671 > 34194 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7748","3.518813","172.30.1.205","172.30.1.104","TCP","54","34194 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7749","3.518837","172.30.1.104","172.30.1.205","TCP","54","49671 > 34154 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7750","3.518910","172.30.1.104","172.30.1.205","TCP","54","49671 > 34198 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7751","3.518914","172.30.1.205","172.30.1.104","TCP","54","34198 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7752","3.518936","172.30.1.104","172.30.1.205","TCP","54","49671 > 34154 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "7753","3.518939","172.30.1.205","172.30.1.104","TCP","54","34154 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "7754","3.519596","172.30.1.205","172.30.1.104","TCP","54","41564 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7755","3.519716","172.30.1.205","172.30.1.104","TCP","74","34202 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906746 TSecr=0 WS=128" "7756","3.519836","172.30.1.104","172.30.1.205","TCP","54","135 > 41564 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7757","3.519860","172.30.1.104","172.30.1.205","TCP","54","135 > 41564 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7758","3.519865","172.30.1.205","172.30.1.104","TCP","54","41564 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7759","3.520016","172.30.1.104","172.30.1.205","TCP","66","49671 > 34202 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7760","3.520024","172.30.1.205","172.30.1.104","TCP","54","34202 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7761","3.520388","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7762","3.520669","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7763","3.520679","172.30.1.205","172.30.1.104","TCP","54","34202 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7764","3.522586","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7765","3.522950","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7766","3.522956","172.30.1.205","172.30.1.104","TCP","54","34202 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7767","3.524314","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7768","3.525552","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7769","3.525562","172.30.1.205","172.30.1.104","TCP","54","34202 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7770","3.526512","172.30.1.205","172.30.1.104","TCP","74","41568 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906752 TSecr=0 WS=128" "7771","3.526809","172.30.1.104","172.30.1.205","TCP","66","135 > 41568 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7772","3.526820","172.30.1.205","172.30.1.104","TCP","54","41568 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7773","3.527168","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7774","3.527498","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7775","3.527507","172.30.1.205","172.30.1.104","TCP","54","41568 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7776","3.529784","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7777","3.530179","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7778","3.530186","172.30.1.205","172.30.1.104","TCP","54","41568 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7779","3.531984","172.30.1.205","172.30.1.104","TCP","54","41568 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7780","3.532095","172.30.1.205","172.30.1.104","TCP","74","34206 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906758 TSecr=0 WS=128" "7781","3.532245","172.30.1.104","172.30.1.205","TCP","54","135 > 41568 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7782","3.532268","172.30.1.104","172.30.1.205","TCP","54","135 > 41568 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7783","3.532273","172.30.1.205","172.30.1.104","TCP","54","41568 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7784","3.532365","172.30.1.104","172.30.1.205","TCP","66","49671 > 34206 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7785","3.532382","172.30.1.205","172.30.1.104","TCP","54","34206 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7786","3.532807","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7787","3.533070","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7788","3.533080","172.30.1.205","172.30.1.104","TCP","54","34206 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7789","3.534972","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7790","3.535316","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7791","3.535322","172.30.1.205","172.30.1.104","TCP","54","34206 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7792","3.536657","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7793","3.537882","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7794","3.537892","172.30.1.205","172.30.1.104","TCP","54","34206 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7795","3.538827","172.30.1.205","172.30.1.104","TCP","74","41572 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906765 TSecr=0 WS=128" "7796","3.539109","172.30.1.104","172.30.1.205","TCP","66","135 > 41572 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7797","3.539119","172.30.1.205","172.30.1.104","TCP","54","41572 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7798","3.539471","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7799","3.539751","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7800","3.539761","172.30.1.205","172.30.1.104","TCP","54","41572 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7801","3.541958","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7802","3.542326","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7803","3.542333","172.30.1.205","172.30.1.104","TCP","54","41572 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7804","3.544112","172.30.1.205","172.30.1.104","TCP","54","41572 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7805","3.544221","172.30.1.205","172.30.1.104","TCP","74","34210 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906770 TSecr=0 WS=128" "7806","3.544367","172.30.1.104","172.30.1.205","TCP","54","135 > 41572 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7807","3.544402","172.30.1.104","172.30.1.205","TCP","54","135 > 41572 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7808","3.544408","172.30.1.205","172.30.1.104","TCP","54","41572 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7809","3.544483","172.30.1.104","172.30.1.205","TCP","66","49671 > 34210 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7810","3.544491","172.30.1.205","172.30.1.104","TCP","54","34210 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7811","3.544863","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7812","3.545132","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7813","3.545140","172.30.1.205","172.30.1.104","TCP","54","34210 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7814","3.546980","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7815","3.547372","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7816","3.547377","172.30.1.205","172.30.1.104","TCP","54","34210 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7817","3.548724","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7818","3.550477","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7819","3.550486","172.30.1.205","172.30.1.104","TCP","54","34210 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7820","3.551422","172.30.1.205","172.30.1.104","TCP","74","41576 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906777 TSecr=0 WS=128" "7821","3.551751","172.30.1.104","172.30.1.205","TCP","66","135 > 41576 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7822","3.551767","172.30.1.205","172.30.1.104","TCP","54","41576 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7823","3.552110","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7824","3.552393","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7825","3.552401","172.30.1.205","172.30.1.104","TCP","54","41576 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7826","3.554594","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7827","3.554972","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7828","3.554978","172.30.1.205","172.30.1.104","TCP","54","41576 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7829","3.556803","172.30.1.205","172.30.1.104","TCP","54","41576 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7830","3.556922","172.30.1.205","172.30.1.104","TCP","74","34214 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906783 TSecr=0 WS=128" "7831","3.557104","172.30.1.104","172.30.1.205","TCP","54","135 > 41576 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7832","3.557113","172.30.1.104","172.30.1.205","TCP","54","135 > 41576 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7833","3.557118","172.30.1.205","172.30.1.104","TCP","54","41576 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7834","3.557221","172.30.1.104","172.30.1.205","TCP","66","49671 > 34214 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7835","3.557229","172.30.1.205","172.30.1.104","TCP","54","34214 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7836","3.557569","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7837","3.557850","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7838","3.557859","172.30.1.205","172.30.1.104","TCP","54","34214 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7839","3.559732","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7840","3.560092","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7841","3.560098","172.30.1.205","172.30.1.104","TCP","54","34214 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7842","3.561460","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7843","3.562644","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7844","3.562653","172.30.1.205","172.30.1.104","TCP","54","34214 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7845","3.563574","172.30.1.205","172.30.1.104","TCP","74","41580 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906789 TSecr=0 WS=128" "7846","3.563830","172.30.1.104","172.30.1.205","TCP","66","135 > 41580 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7847","3.563841","172.30.1.205","172.30.1.104","TCP","54","41580 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7848","3.564185","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7849","3.564459","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7850","3.564468","172.30.1.205","172.30.1.104","TCP","54","41580 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7851","3.566653","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7852","3.567004","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7853","3.567011","172.30.1.205","172.30.1.104","TCP","54","41580 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7854","3.568819","172.30.1.205","172.30.1.104","TCP","54","41580 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7855","3.568934","172.30.1.205","172.30.1.104","TCP","74","34218 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906795 TSecr=0 WS=128" "7856","3.569092","172.30.1.104","172.30.1.205","TCP","54","135 > 41580 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7857","3.569131","172.30.1.104","172.30.1.205","TCP","54","135 > 41580 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7858","3.569137","172.30.1.205","172.30.1.104","TCP","54","41580 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7859","3.569209","172.30.1.104","172.30.1.205","TCP","66","49671 > 34218 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7860","3.569217","172.30.1.205","172.30.1.104","TCP","54","34218 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7861","3.569556","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7862","3.569834","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7863","3.569843","172.30.1.205","172.30.1.104","TCP","54","34218 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7864","3.571699","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7865","3.572047","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7866","3.572053","172.30.1.205","172.30.1.104","TCP","54","34218 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7867","3.573421","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7868","3.574710","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7869","3.574719","172.30.1.205","172.30.1.104","TCP","54","34218 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7870","3.575643","172.30.1.205","172.30.1.104","TCP","74","41584 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906802 TSecr=0 WS=128" "7871","3.575926","172.30.1.104","172.30.1.205","TCP","66","135 > 41584 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7872","3.575937","172.30.1.205","172.30.1.104","TCP","54","41584 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7873","3.576282","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7874","3.576560","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7875","3.576568","172.30.1.205","172.30.1.104","TCP","54","41584 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7876","3.578743","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7877","3.579120","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7878","3.579127","172.30.1.205","172.30.1.104","TCP","54","41584 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7879","3.580942","172.30.1.205","172.30.1.104","TCP","54","41584 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7880","3.581049","172.30.1.205","172.30.1.104","TCP","74","34222 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906807 TSecr=0 WS=128" "7881","3.581225","172.30.1.104","172.30.1.205","TCP","54","135 > 41584 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7882","3.581247","172.30.1.104","172.30.1.205","TCP","54","135 > 41584 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7883","3.581252","172.30.1.205","172.30.1.104","TCP","54","41584 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7884","3.581335","172.30.1.104","172.30.1.205","TCP","66","49671 > 34222 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7885","3.581343","172.30.1.205","172.30.1.104","TCP","54","34222 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7886","3.581684","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7887","3.582433","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7888","3.582440","172.30.1.205","172.30.1.104","TCP","54","34222 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7889","3.584282","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7890","3.584714","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7891","3.584720","172.30.1.205","172.30.1.104","TCP","54","34222 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7892","3.586070","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7893","3.587266","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7894","3.587275","172.30.1.205","172.30.1.104","TCP","54","34222 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7895","3.588187","172.30.1.205","172.30.1.104","TCP","74","41588 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906814 TSecr=0 WS=128" "7896","3.588526","172.30.1.104","172.30.1.205","TCP","66","135 > 41588 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7897","3.588536","172.30.1.205","172.30.1.104","TCP","54","41588 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7898","3.588907","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7899","3.589189","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7900","3.589198","172.30.1.205","172.30.1.104","TCP","54","41588 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7901","3.591378","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7902","3.591777","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7903","3.591784","172.30.1.205","172.30.1.104","TCP","54","41588 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7904","3.593688","172.30.1.205","172.30.1.104","TCP","54","41588 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7905","3.593797","172.30.1.205","172.30.1.104","TCP","74","34226 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906820 TSecr=0 WS=128" "7906","3.593965","172.30.1.104","172.30.1.205","TCP","54","135 > 41588 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7907","3.593988","172.30.1.104","172.30.1.205","TCP","54","135 > 41588 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7908","3.593993","172.30.1.205","172.30.1.104","TCP","54","41588 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7909","3.594107","172.30.1.104","172.30.1.205","TCP","66","49671 > 34226 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7910","3.594115","172.30.1.205","172.30.1.104","TCP","54","34226 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7911","3.594457","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7912","3.594776","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7913","3.594785","172.30.1.205","172.30.1.104","TCP","54","34226 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7914","3.596656","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7915","3.597023","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7916","3.597030","172.30.1.205","172.30.1.104","TCP","54","34226 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7917","3.598385","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7918","3.599593","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7919","3.599602","172.30.1.205","172.30.1.104","TCP","54","34226 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7920","3.600520","172.30.1.205","172.30.1.104","TCP","74","41592 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906826 TSecr=0 WS=128" "7921","3.600833","172.30.1.104","172.30.1.205","TCP","66","135 > 41592 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7922","3.600843","172.30.1.205","172.30.1.104","TCP","54","41592 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7923","3.601200","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7924","3.601489","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7925","3.601498","172.30.1.205","172.30.1.104","TCP","54","41592 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7926","3.603672","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7927","3.604043","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7928","3.604049","172.30.1.205","172.30.1.104","TCP","54","41592 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7929","3.605867","172.30.1.205","172.30.1.104","TCP","54","41592 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7930","3.605979","172.30.1.205","172.30.1.104","TCP","74","34230 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906832 TSecr=0 WS=128" "7931","3.606135","172.30.1.104","172.30.1.205","TCP","54","135 > 41592 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7932","3.606169","172.30.1.104","172.30.1.205","TCP","54","135 > 41592 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7933","3.606176","172.30.1.205","172.30.1.104","TCP","54","41592 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7934","3.606226","172.30.1.104","172.30.1.205","TCP","66","49671 > 34230 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7935","3.606237","172.30.1.205","172.30.1.104","TCP","54","34230 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7936","3.606618","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7937","3.607334","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7938","3.607346","172.30.1.205","172.30.1.104","TCP","54","34230 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7939","3.609295","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7940","3.609644","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7941","3.609651","172.30.1.205","172.30.1.104","TCP","54","34230 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7942","3.611012","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7943","3.612167","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7944","3.612177","172.30.1.205","172.30.1.104","TCP","54","34230 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7945","3.613165","172.30.1.205","172.30.1.104","TCP","74","41596 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906839 TSecr=0 WS=128" "7946","3.613456","172.30.1.104","172.30.1.205","TCP","66","135 > 41596 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7947","3.613467","172.30.1.205","172.30.1.104","TCP","54","41596 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7948","3.613815","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7949","3.614087","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7950","3.614096","172.30.1.205","172.30.1.104","TCP","54","41596 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7951","3.616258","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7952","3.616656","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7953","3.616663","172.30.1.205","172.30.1.104","TCP","54","41596 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7954","3.618481","172.30.1.205","172.30.1.104","TCP","54","41596 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7955","3.618595","172.30.1.205","172.30.1.104","TCP","74","34234 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906845 TSecr=0 WS=128" "7956","3.618773","172.30.1.104","172.30.1.205","TCP","54","135 > 41596 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7957","3.618806","172.30.1.104","172.30.1.205","TCP","54","135 > 41596 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7958","3.618812","172.30.1.205","172.30.1.104","TCP","54","41596 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7959","3.618906","172.30.1.104","172.30.1.205","TCP","66","49671 > 34234 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7960","3.618914","172.30.1.205","172.30.1.104","TCP","54","34234 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7961","3.619266","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7962","3.619554","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7963","3.619563","172.30.1.205","172.30.1.104","TCP","54","34234 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7964","3.621468","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7965","3.621819","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7966","3.621831","172.30.1.205","172.30.1.104","TCP","54","34234 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7967","3.623265","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7968","3.624443","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7969","3.624455","172.30.1.205","172.30.1.104","TCP","54","34234 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7970","3.625455","172.30.1.205","172.30.1.104","TCP","74","41600 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906851 TSecr=0 WS=128" "7971","3.625755","172.30.1.104","172.30.1.205","TCP","66","135 > 41600 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7972","3.625766","172.30.1.205","172.30.1.104","TCP","54","41600 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7973","3.626122","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7974","3.626399","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7975","3.626408","172.30.1.205","172.30.1.104","TCP","54","41600 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7976","3.628584","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "7977","3.628956","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "7978","3.628963","172.30.1.205","172.30.1.104","TCP","54","41600 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "7979","3.630770","172.30.1.205","172.30.1.104","TCP","54","41600 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "7980","3.630883","172.30.1.205","172.30.1.104","TCP","74","34238 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906857 TSecr=0 WS=128" "7981","3.631031","172.30.1.104","172.30.1.205","TCP","54","135 > 41600 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7982","3.631086","172.30.1.104","172.30.1.205","TCP","54","135 > 41600 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "7983","3.631092","172.30.1.205","172.30.1.104","TCP","54","41600 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "7984","3.631161","172.30.1.104","172.30.1.205","TCP","66","49671 > 34238 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7985","3.631169","172.30.1.205","172.30.1.104","TCP","54","34238 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7986","3.631513","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "7987","3.633100","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "7988","3.633110","172.30.1.205","172.30.1.104","TCP","54","34238 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "7989","3.634980","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "7990","3.635373","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "7991","3.635383","172.30.1.205","172.30.1.104","TCP","54","34238 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "7992","3.636854","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "7993","3.638085","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "7994","3.638097","172.30.1.205","172.30.1.104","TCP","54","34238 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "7995","3.639060","172.30.1.205","172.30.1.104","TCP","74","41604 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906865 TSecr=0 WS=128" "7996","3.639350","172.30.1.104","172.30.1.205","TCP","66","135 > 41604 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "7997","3.639362","172.30.1.205","172.30.1.104","TCP","54","41604 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "7998","3.639714","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "7999","3.639993","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8000","3.640002","172.30.1.205","172.30.1.104","TCP","54","41604 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8001","3.642232","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8002","3.642699","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8003","3.642706","172.30.1.205","172.30.1.104","TCP","54","41604 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8004","3.644506","172.30.1.205","172.30.1.104","TCP","54","41604 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8005","3.644621","172.30.1.205","172.30.1.104","TCP","74","34242 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906871 TSecr=0 WS=128" "8006","3.644826","172.30.1.104","172.30.1.205","TCP","54","135 > 41604 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8007","3.644836","172.30.1.104","172.30.1.205","TCP","54","135 > 41604 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8008","3.644843","172.30.1.205","172.30.1.104","TCP","54","41604 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8009","3.644918","172.30.1.104","172.30.1.205","TCP","66","49671 > 34242 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8010","3.644927","172.30.1.205","172.30.1.104","TCP","54","34242 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8011","3.645284","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8012","3.645611","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8013","3.645620","172.30.1.205","172.30.1.104","TCP","54","34242 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8014","3.647509","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8015","3.647879","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8016","3.647885","172.30.1.205","172.30.1.104","TCP","54","34242 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8017","3.649260","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8018","3.650490","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8019","3.650499","172.30.1.205","172.30.1.104","TCP","54","34242 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8020","3.651429","172.30.1.205","172.30.1.104","TCP","74","41608 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906877 TSecr=0 WS=128" "8021","3.651736","172.30.1.104","172.30.1.205","TCP","66","135 > 41608 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8022","3.651747","172.30.1.205","172.30.1.104","TCP","54","41608 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8023","3.652098","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8024","3.652377","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8025","3.652386","172.30.1.205","172.30.1.104","TCP","54","41608 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8026","3.654592","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8027","3.654957","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8028","3.654964","172.30.1.205","172.30.1.104","TCP","54","41608 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8029","3.656768","172.30.1.205","172.30.1.104","TCP","54","41608 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8030","3.656890","172.30.1.205","172.30.1.104","TCP","74","34246 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906883 TSecr=0 WS=128" "8031","3.657080","172.30.1.104","172.30.1.205","TCP","54","135 > 41608 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8032","3.657111","172.30.1.104","172.30.1.205","TCP","54","135 > 41608 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8033","3.657117","172.30.1.205","172.30.1.104","TCP","54","41608 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8034","3.657187","172.30.1.104","172.30.1.205","TCP","66","49671 > 34246 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8035","3.657196","172.30.1.205","172.30.1.104","TCP","54","34246 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8036","3.657540","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8037","3.657805","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8038","3.657811","172.30.1.205","172.30.1.104","TCP","54","34246 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8039","3.659661","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8040","3.660073","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8041","3.660080","172.30.1.205","172.30.1.104","TCP","54","34246 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8042","3.661448","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8043","3.662672","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8044","3.662686","172.30.1.205","172.30.1.104","TCP","54","34246 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8045","3.663697","172.30.1.205","172.30.1.104","TCP","74","41612 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906890 TSecr=0 WS=128" "8046","3.664008","172.30.1.104","172.30.1.205","TCP","66","135 > 41612 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8047","3.664020","172.30.1.205","172.30.1.104","TCP","54","41612 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8048","3.664375","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8049","3.664643","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8050","3.664653","172.30.1.205","172.30.1.104","TCP","54","41612 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8051","3.666867","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8052","3.667234","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8053","3.667241","172.30.1.205","172.30.1.104","TCP","54","41612 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8054","3.668063","172.30.1.205","172.30.1.104","TCP","54","34206 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8055","3.668110","172.30.1.205","172.30.1.104","TCP","54","34210 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8056","3.668148","172.30.1.205","172.30.1.104","TCP","54","34214 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8057","3.668183","172.30.1.205","172.30.1.104","TCP","54","34218 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8058","3.668215","172.30.1.205","172.30.1.104","TCP","54","34222 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8059","3.668249","172.30.1.205","172.30.1.104","TCP","54","34226 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8060","3.668271","172.30.1.205","172.30.1.104","TCP","54","34230 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8061","3.668297","172.30.1.205","172.30.1.104","TCP","54","34234 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8062","3.668323","172.30.1.205","172.30.1.104","TCP","54","34238 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8063","3.668344","172.30.1.205","172.30.1.104","TCP","54","34242 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8064","3.668365","172.30.1.205","172.30.1.104","TCP","54","34246 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8065","3.668442","172.30.1.205","172.30.1.104","TCP","54","34202 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8066","3.668625","172.30.1.104","172.30.1.205","TCP","54","49671 > 34206 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8067","3.668635","172.30.1.104","172.30.1.205","TCP","54","49671 > 34210 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8068","3.668637","172.30.1.104","172.30.1.205","TCP","54","49671 > 34210 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8069","3.668644","172.30.1.205","172.30.1.104","TCP","54","34210 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8070","3.668651","172.30.1.104","172.30.1.205","TCP","54","49671 > 34214 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8071","3.668655","172.30.1.104","172.30.1.205","TCP","54","49671 > 34218 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8072","3.668669","172.30.1.104","172.30.1.205","TCP","54","49671 > 34206 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8073","3.668672","172.30.1.205","172.30.1.104","TCP","54","34206 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8074","3.668673","172.30.1.104","172.30.1.205","TCP","54","49671 > 34218 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8075","3.668675","172.30.1.205","172.30.1.104","TCP","54","34218 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8076","3.668676","172.30.1.104","172.30.1.205","TCP","54","49671 > 34214 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8077","3.668678","172.30.1.205","172.30.1.104","TCP","54","34214 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8078","3.668680","172.30.1.104","172.30.1.205","TCP","54","49671 > 34222 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8079","3.668683","172.30.1.104","172.30.1.205","TCP","54","49671 > 34226 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8080","3.668788","172.30.1.104","172.30.1.205","TCP","54","49671 > 34222 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8081","3.668794","172.30.1.205","172.30.1.104","TCP","54","34222 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8082","3.668814","172.30.1.104","172.30.1.205","TCP","54","49671 > 34230 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8083","3.668829","172.30.1.104","172.30.1.205","TCP","54","49671 > 34226 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8084","3.668832","172.30.1.205","172.30.1.104","TCP","54","34226 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8085","3.668849","172.30.1.104","172.30.1.205","TCP","54","49671 > 34230 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8086","3.668852","172.30.1.205","172.30.1.104","TCP","54","34230 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8087","3.668870","172.30.1.104","172.30.1.205","TCP","54","49671 > 34234 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8088","3.668890","172.30.1.104","172.30.1.205","TCP","54","49671 > 34238 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8089","3.668909","172.30.1.104","172.30.1.205","TCP","54","49671 > 34242 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8090","3.668931","172.30.1.104","172.30.1.205","TCP","54","49671 > 34246 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8091","3.668951","172.30.1.104","172.30.1.205","TCP","54","49671 > 34246 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8092","3.668954","172.30.1.205","172.30.1.104","TCP","54","34246 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8093","3.669062","172.30.1.104","172.30.1.205","TCP","54","49671 > 34202 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8094","3.669081","172.30.1.104","172.30.1.205","TCP","54","49671 > 34242 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8095","3.669086","172.30.1.205","172.30.1.104","TCP","54","34242 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8096","3.669103","172.30.1.104","172.30.1.205","TCP","54","49671 > 34234 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8097","3.669106","172.30.1.205","172.30.1.104","TCP","54","34234 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8098","3.669125","172.30.1.104","172.30.1.205","TCP","54","49671 > 34202 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8099","3.669127","172.30.1.205","172.30.1.104","TCP","54","34202 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8100","3.669145","172.30.1.104","172.30.1.205","TCP","54","49671 > 34238 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8101","3.669147","172.30.1.205","172.30.1.104","TCP","54","34238 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8102","3.670066","172.30.1.205","172.30.1.104","TCP","54","41612 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8103","3.670176","172.30.1.205","172.30.1.104","TCP","74","34250 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906896 TSecr=0 WS=128" "8104","3.670334","172.30.1.104","172.30.1.205","TCP","54","135 > 41612 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8105","3.670358","172.30.1.104","172.30.1.205","TCP","54","135 > 41612 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8106","3.670363","172.30.1.205","172.30.1.104","TCP","54","41612 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8107","3.670440","172.30.1.104","172.30.1.205","TCP","66","49671 > 34250 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8108","3.670448","172.30.1.205","172.30.1.104","TCP","54","34250 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8109","3.670802","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8110","3.671116","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8111","3.671125","172.30.1.205","172.30.1.104","TCP","54","34250 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8112","3.673038","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8113","3.673730","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8114","3.673737","172.30.1.205","172.30.1.104","TCP","54","34250 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8115","3.675073","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8116","3.676309","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8117","3.676322","172.30.1.205","172.30.1.104","TCP","54","34250 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8118","3.677353","172.30.1.205","172.30.1.104","TCP","74","41616 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906903 TSecr=0 WS=128" "8119","3.677656","172.30.1.104","172.30.1.205","TCP","66","135 > 41616 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8120","3.677667","172.30.1.205","172.30.1.104","TCP","54","41616 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8121","3.678031","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8122","3.678332","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8123","3.678345","172.30.1.205","172.30.1.104","TCP","54","41616 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8124","3.680588","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8125","3.681002","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8126","3.681009","172.30.1.205","172.30.1.104","TCP","54","41616 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8127","3.682816","172.30.1.205","172.30.1.104","TCP","54","41616 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8128","3.682936","172.30.1.205","172.30.1.104","TCP","74","34254 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906909 TSecr=0 WS=128" "8129","3.683156","172.30.1.104","172.30.1.205","TCP","54","135 > 41616 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8130","3.683191","172.30.1.104","172.30.1.205","TCP","54","135 > 41616 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8131","3.683197","172.30.1.205","172.30.1.104","TCP","54","41616 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8132","3.683233","172.30.1.104","172.30.1.205","TCP","66","49671 > 34254 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8133","3.683241","172.30.1.205","172.30.1.104","TCP","54","34254 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8134","3.683583","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8135","3.683904","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8136","3.683913","172.30.1.205","172.30.1.104","TCP","54","34254 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8137","3.685807","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8138","3.686185","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8139","3.686192","172.30.1.205","172.30.1.104","TCP","54","34254 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8140","3.687561","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8141","3.688740","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8142","3.688750","172.30.1.205","172.30.1.104","TCP","54","34254 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8143","3.689700","172.30.1.205","172.30.1.104","TCP","74","41620 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906916 TSecr=0 WS=128" "8144","3.689990","172.30.1.104","172.30.1.205","TCP","66","135 > 41620 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8145","3.690001","172.30.1.205","172.30.1.104","TCP","54","41620 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8146","3.690349","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8147","3.690639","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8148","3.690648","172.30.1.205","172.30.1.104","TCP","54","41620 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8149","3.692848","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8150","3.693242","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8151","3.693251","172.30.1.205","172.30.1.104","TCP","54","41620 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8152","3.695119","172.30.1.205","172.30.1.104","TCP","54","41620 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8153","3.695239","172.30.1.205","172.30.1.104","TCP","74","34258 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906921 TSecr=0 WS=128" "8154","3.695383","172.30.1.104","172.30.1.205","TCP","54","135 > 41620 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8155","3.695406","172.30.1.104","172.30.1.205","TCP","54","135 > 41620 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8156","3.695412","172.30.1.205","172.30.1.104","TCP","54","41620 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8157","3.695534","172.30.1.104","172.30.1.205","TCP","66","49671 > 34258 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8158","3.695542","172.30.1.205","172.30.1.104","TCP","54","34258 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8159","3.695886","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8160","3.696195","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8161","3.696206","172.30.1.205","172.30.1.104","TCP","54","34258 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8162","3.698124","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8163","3.698524","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8164","3.698530","172.30.1.205","172.30.1.104","TCP","54","34258 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8165","3.699869","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8166","3.701071","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8167","3.701081","172.30.1.205","172.30.1.104","TCP","54","34258 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8168","3.702045","172.30.1.205","172.30.1.104","TCP","74","41624 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906928 TSecr=0 WS=128" "8169","3.702371","172.30.1.104","172.30.1.205","TCP","66","135 > 41624 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8170","3.702390","172.30.1.205","172.30.1.104","TCP","54","41624 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8171","3.702733","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8172","3.703025","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8173","3.703033","172.30.1.205","172.30.1.104","TCP","54","41624 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8174","3.705247","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8175","3.705640","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8176","3.705647","172.30.1.205","172.30.1.104","TCP","54","41624 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8177","3.707444","172.30.1.205","172.30.1.104","TCP","54","41624 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8178","3.707553","172.30.1.205","172.30.1.104","TCP","74","34262 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906933 TSecr=0 WS=128" "8179","3.707758","172.30.1.104","172.30.1.205","TCP","54","135 > 41624 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8180","3.707782","172.30.1.104","172.30.1.205","TCP","54","135 > 41624 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8181","3.707788","172.30.1.205","172.30.1.104","TCP","54","41624 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8182","3.707874","172.30.1.104","172.30.1.205","TCP","66","49671 > 34262 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8183","3.707882","172.30.1.205","172.30.1.104","TCP","54","34262 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8184","3.708221","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8185","3.708562","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8186","3.708569","172.30.1.205","172.30.1.104","TCP","54","34262 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8187","3.710433","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8188","3.711675","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8189","3.711682","172.30.1.205","172.30.1.104","TCP","54","34262 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8190","3.713041","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8191","3.714315","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8192","3.714324","172.30.1.205","172.30.1.104","TCP","54","34262 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8193","3.715255","172.30.1.205","172.30.1.104","TCP","74","41628 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906941 TSecr=0 WS=128" "8194","3.715604","172.30.1.104","172.30.1.205","TCP","66","135 > 41628 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8195","3.715614","172.30.1.205","172.30.1.104","TCP","54","41628 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8196","3.715957","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8197","3.716272","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8198","3.716281","172.30.1.205","172.30.1.104","TCP","54","41628 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8199","3.718492","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8200","3.718874","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8201","3.718881","172.30.1.205","172.30.1.104","TCP","54","41628 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8202","3.720677","172.30.1.205","172.30.1.104","TCP","54","41628 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8203","3.720807","172.30.1.205","172.30.1.104","TCP","74","34266 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906947 TSecr=0 WS=128" "8204","3.720966","172.30.1.104","172.30.1.205","TCP","54","135 > 41628 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8205","3.720989","172.30.1.104","172.30.1.205","TCP","54","135 > 41628 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8206","3.720995","172.30.1.205","172.30.1.104","TCP","54","41628 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8207","3.721081","172.30.1.104","172.30.1.205","TCP","66","49671 > 34266 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8208","3.721090","172.30.1.205","172.30.1.104","TCP","54","34266 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8209","3.721429","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8210","3.721724","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8211","3.721733","172.30.1.205","172.30.1.104","TCP","54","34266 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8212","3.723591","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8213","3.723994","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8214","3.724000","172.30.1.205","172.30.1.104","TCP","54","34266 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8215","3.725371","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8216","3.726560","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8217","3.726569","172.30.1.205","172.30.1.104","TCP","54","34266 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8218","3.727505","172.30.1.205","172.30.1.104","TCP","74","41632 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906953 TSecr=0 WS=128" "8219","3.727799","172.30.1.104","172.30.1.205","TCP","66","135 > 41632 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8220","3.727809","172.30.1.205","172.30.1.104","TCP","54","41632 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8221","3.728162","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8222","3.728472","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8223","3.728481","172.30.1.205","172.30.1.104","TCP","54","41632 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8224","3.730680","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8225","3.731069","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8226","3.731075","172.30.1.205","172.30.1.104","TCP","54","41632 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8227","3.732894","172.30.1.205","172.30.1.104","TCP","54","41632 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8228","3.733001","172.30.1.205","172.30.1.104","TCP","74","34270 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906959 TSecr=0 WS=128" "8229","3.733155","172.30.1.104","172.30.1.205","TCP","54","135 > 41632 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8230","3.733190","172.30.1.104","172.30.1.205","TCP","54","135 > 41632 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8231","3.733204","172.30.1.205","172.30.1.104","TCP","54","41632 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8232","3.733287","172.30.1.104","172.30.1.205","TCP","66","49671 > 34270 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8233","3.733295","172.30.1.205","172.30.1.104","TCP","54","34270 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8234","3.733636","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8235","3.733926","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8236","3.733935","172.30.1.205","172.30.1.104","TCP","54","34270 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8237","3.735794","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8238","3.736153","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8239","3.736159","172.30.1.205","172.30.1.104","TCP","54","34270 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8240","3.737525","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8241","3.740960","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8242","3.740970","172.30.1.205","172.30.1.104","TCP","54","34270 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8243","3.741909","172.30.1.205","172.30.1.104","TCP","74","41636 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906968 TSecr=0 WS=128" "8244","3.742203","172.30.1.104","172.30.1.205","TCP","66","135 > 41636 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8245","3.742214","172.30.1.205","172.30.1.104","TCP","54","41636 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8246","3.742559","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8247","3.742847","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8248","3.742856","172.30.1.205","172.30.1.104","TCP","54","41636 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8249","3.745078","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8250","3.745453","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8251","3.745460","172.30.1.205","172.30.1.104","TCP","54","41636 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8252","3.747266","172.30.1.205","172.30.1.104","TCP","54","41636 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8253","3.747375","172.30.1.205","172.30.1.104","TCP","74","34274 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906973 TSecr=0 WS=128" "8254","3.747565","172.30.1.104","172.30.1.205","TCP","54","135 > 41636 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8255","3.747602","172.30.1.104","172.30.1.205","TCP","54","135 > 41636 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8256","3.747608","172.30.1.205","172.30.1.104","TCP","54","41636 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8257","3.747688","172.30.1.104","172.30.1.205","TCP","66","49671 > 34274 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8258","3.747697","172.30.1.205","172.30.1.104","TCP","54","34274 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8259","3.748049","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8260","3.748372","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8261","3.748381","172.30.1.205","172.30.1.104","TCP","54","34274 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8262","3.750297","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8263","3.750714","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8264","3.750721","172.30.1.205","172.30.1.104","TCP","54","34274 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8265","3.752070","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8266","3.753378","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8267","3.753387","172.30.1.205","172.30.1.104","TCP","54","34274 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8268","3.754340","172.30.1.205","172.30.1.104","TCP","74","41640 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906980 TSecr=0 WS=128" "8269","3.754700","172.30.1.104","172.30.1.205","TCP","66","135 > 41640 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8270","3.754711","172.30.1.205","172.30.1.104","TCP","54","41640 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8271","3.755057","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8272","3.755391","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8273","3.755399","172.30.1.205","172.30.1.104","TCP","54","41640 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8274","3.757610","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8275","3.758001","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8276","3.758007","172.30.1.205","172.30.1.104","TCP","54","41640 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8277","3.759812","172.30.1.205","172.30.1.104","TCP","54","41640 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8278","3.759923","172.30.1.205","172.30.1.104","TCP","74","34278 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906986 TSecr=0 WS=128" "8279","3.760072","172.30.1.104","172.30.1.205","TCP","54","135 > 41640 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8280","3.760093","172.30.1.104","172.30.1.205","TCP","54","135 > 41640 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8281","3.760100","172.30.1.205","172.30.1.104","TCP","54","41640 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8282","3.760324","172.30.1.104","172.30.1.205","TCP","66","49671 > 34278 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8283","3.760332","172.30.1.205","172.30.1.104","TCP","54","34278 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8284","3.760678","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8285","3.760961","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8286","3.760970","172.30.1.205","172.30.1.104","TCP","54","34278 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8287","3.762846","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8288","3.763247","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8289","3.763253","172.30.1.205","172.30.1.104","TCP","54","34278 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8290","3.764610","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8291","3.765862","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8292","3.765872","172.30.1.205","172.30.1.104","TCP","54","34278 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8293","3.766842","172.30.1.205","172.30.1.104","TCP","74","41644 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906993 TSecr=0 WS=128" "8294","3.767162","172.30.1.104","172.30.1.205","TCP","66","135 > 41644 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8295","3.767173","172.30.1.205","172.30.1.104","TCP","54","41644 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8296","3.767519","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8297","3.767821","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8298","3.767835","172.30.1.205","172.30.1.104","TCP","54","41644 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8299","3.770118","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8300","3.770561","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8301","3.770568","172.30.1.205","172.30.1.104","TCP","54","41644 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8302","3.772381","172.30.1.205","172.30.1.104","TCP","54","41644 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8303","3.772499","172.30.1.205","172.30.1.104","TCP","74","34282 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499906998 TSecr=0 WS=128" "8304","3.772661","172.30.1.104","172.30.1.205","TCP","54","135 > 41644 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8305","3.772674","172.30.1.104","172.30.1.205","TCP","54","135 > 41644 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8306","3.772680","172.30.1.205","172.30.1.104","TCP","54","41644 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8307","3.772797","172.30.1.104","172.30.1.205","TCP","66","49671 > 34282 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8308","3.772807","172.30.1.205","172.30.1.104","TCP","54","34282 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8309","3.773168","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8310","3.773467","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8311","3.773475","172.30.1.205","172.30.1.104","TCP","54","34282 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8312","3.775347","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8313","3.775710","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8314","3.775717","172.30.1.205","172.30.1.104","TCP","54","34282 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8315","3.777104","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8316","3.782463","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8317","3.782474","172.30.1.205","172.30.1.104","TCP","54","34282 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8318","3.783458","172.30.1.205","172.30.1.104","TCP","74","41648 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907009 TSecr=0 WS=128" "8319","3.783775","172.30.1.104","172.30.1.205","TCP","66","135 > 41648 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8320","3.783787","172.30.1.205","172.30.1.104","TCP","54","41648 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8321","3.784145","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8322","3.784443","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8323","3.784455","172.30.1.205","172.30.1.104","TCP","54","41648 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8324","3.786670","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8325","3.787054","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8326","3.787062","172.30.1.205","172.30.1.104","TCP","54","41648 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8327","3.788921","172.30.1.205","172.30.1.104","TCP","54","41648 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8328","3.789032","172.30.1.205","172.30.1.104","TCP","74","34286 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907015 TSecr=0 WS=128" "8329","3.789202","172.30.1.104","172.30.1.205","TCP","54","135 > 41648 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8330","3.789239","172.30.1.104","172.30.1.205","TCP","54","135 > 41648 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8331","3.789246","172.30.1.205","172.30.1.104","TCP","54","41648 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8332","3.789336","172.30.1.104","172.30.1.205","TCP","66","49671 > 34286 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8333","3.789345","172.30.1.205","172.30.1.104","TCP","54","34286 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8334","3.789689","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8335","3.789970","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8336","3.789979","172.30.1.205","172.30.1.104","TCP","54","34286 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8337","3.791845","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8338","3.792827","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8339","3.792836","172.30.1.205","172.30.1.104","TCP","54","34286 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8340","3.794252","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8341","3.795605","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8342","3.795616","172.30.1.205","172.30.1.104","TCP","54","34286 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8343","3.796571","172.30.1.205","172.30.1.104","TCP","74","41652 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907022 TSecr=0 WS=128" "8344","3.796920","172.30.1.104","172.30.1.205","TCP","66","135 > 41652 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8345","3.796932","172.30.1.205","172.30.1.104","TCP","54","41652 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8346","3.797291","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8347","3.797714","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8348","3.797724","172.30.1.205","172.30.1.104","TCP","54","41652 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8349","3.799921","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8350","3.800300","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8351","3.800307","172.30.1.205","172.30.1.104","TCP","54","41652 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8352","3.802131","172.30.1.205","172.30.1.104","TCP","54","41652 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8353","3.802242","172.30.1.205","172.30.1.104","TCP","74","34290 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907028 TSecr=0 WS=128" "8354","3.802448","172.30.1.104","172.30.1.205","TCP","54","135 > 41652 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8355","3.802455","172.30.1.104","172.30.1.205","TCP","54","135 > 41652 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8356","3.802460","172.30.1.205","172.30.1.104","TCP","54","41652 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8357","3.802523","172.30.1.104","172.30.1.205","TCP","66","49671 > 34290 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8358","3.802531","172.30.1.205","172.30.1.104","TCP","54","34290 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8359","3.802877","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8360","3.803167","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8361","3.803176","172.30.1.205","172.30.1.104","TCP","54","34290 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8362","3.805063","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8363","3.805444","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8364","3.805451","172.30.1.205","172.30.1.104","TCP","54","34290 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8365","3.806836","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8366","3.808124","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8367","3.808136","172.30.1.205","172.30.1.104","TCP","54","34290 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8368","3.809131","172.30.1.205","172.30.1.104","TCP","74","41656 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907035 TSecr=0 WS=128" "8369","3.809414","172.30.1.104","172.30.1.205","TCP","66","135 > 41656 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8370","3.809425","172.30.1.205","172.30.1.104","TCP","54","41656 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8371","3.809769","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8372","3.810307","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8373","3.810316","172.30.1.205","172.30.1.104","TCP","54","41656 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8374","3.812558","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8375","3.812948","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8376","3.812955","172.30.1.205","172.30.1.104","TCP","54","41656 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8377","3.814784","172.30.1.205","172.30.1.104","TCP","54","41656 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8378","3.814895","172.30.1.205","172.30.1.104","TCP","74","34294 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907041 TSecr=0 WS=128" "8379","3.815037","172.30.1.104","172.30.1.205","TCP","54","135 > 41656 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8380","3.815216","172.30.1.104","172.30.1.205","TCP","66","49671 > 34294 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8381","3.815226","172.30.1.205","172.30.1.104","TCP","54","34294 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8382","3.815299","172.30.1.104","172.30.1.205","TCP","54","135 > 41656 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8383","3.815305","172.30.1.205","172.30.1.104","TCP","54","41656 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8384","3.815597","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8385","3.815872","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8386","3.815881","172.30.1.205","172.30.1.104","TCP","54","34294 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8387","3.817808","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8388","3.818167","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8389","3.818174","172.30.1.205","172.30.1.104","TCP","54","34294 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8390","3.819552","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8391","3.821109","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8392","3.821119","172.30.1.205","172.30.1.104","TCP","54","34294 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8393","3.822056","172.30.1.205","172.30.1.104","TCP","74","41660 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907048 TSecr=0 WS=128" "8394","3.822362","172.30.1.104","172.30.1.205","TCP","66","135 > 41660 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8395","3.822373","172.30.1.205","172.30.1.104","TCP","54","41660 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8396","3.822726","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8397","3.823041","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8398","3.823050","172.30.1.205","172.30.1.104","TCP","54","41660 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8399","3.825252","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8400","3.825651","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8401","3.825658","172.30.1.205","172.30.1.104","TCP","54","41660 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8402","3.826521","172.30.1.205","172.30.1.104","TCP","54","34254 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8403","3.826569","172.30.1.205","172.30.1.104","TCP","54","34258 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8404","3.826601","172.30.1.205","172.30.1.104","TCP","54","34262 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8405","3.826629","172.30.1.205","172.30.1.104","TCP","54","34266 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8406","3.826656","172.30.1.205","172.30.1.104","TCP","54","34270 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8407","3.826678","172.30.1.205","172.30.1.104","TCP","54","34274 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8408","3.826705","172.30.1.205","172.30.1.104","TCP","54","34278 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8409","3.826732","172.30.1.205","172.30.1.104","TCP","54","34282 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8410","3.826758","172.30.1.205","172.30.1.104","TCP","54","34286 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8411","3.826784","172.30.1.205","172.30.1.104","TCP","54","34290 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8412","3.826810","172.30.1.205","172.30.1.104","TCP","54","34294 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8413","3.826877","172.30.1.205","172.30.1.104","TCP","54","34250 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8414","3.827214","172.30.1.104","172.30.1.205","TCP","54","49671 > 34254 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8415","3.827223","172.30.1.104","172.30.1.205","TCP","54","49671 > 34258 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8416","3.827695","172.30.1.104","172.30.1.205","TCP","54","49671 > 34254 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8417","3.827702","172.30.1.205","172.30.1.104","TCP","54","34254 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8418","3.827710","172.30.1.104","172.30.1.205","TCP","54","49671 > 34262 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8419","3.827716","172.30.1.104","172.30.1.205","TCP","54","49671 > 34266 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8420","3.827722","172.30.1.104","172.30.1.205","TCP","54","49671 > 34258 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8421","3.827725","172.30.1.205","172.30.1.104","TCP","54","34258 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8422","3.827727","172.30.1.104","172.30.1.205","TCP","54","49671 > 34270 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8423","3.827729","172.30.1.104","172.30.1.205","TCP","54","49671 > 34262 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8424","3.827731","172.30.1.205","172.30.1.104","TCP","54","34262 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8425","3.827732","172.30.1.104","172.30.1.205","TCP","54","49671 > 34274 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8426","3.827735","172.30.1.104","172.30.1.205","TCP","54","49671 > 34278 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8427","3.827737","172.30.1.104","172.30.1.205","TCP","54","49671 > 34282 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8428","3.827739","172.30.1.104","172.30.1.205","TCP","54","49671 > 34278 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8429","3.827741","172.30.1.205","172.30.1.104","TCP","54","34278 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8430","3.827743","172.30.1.104","172.30.1.205","TCP","54","49671 > 34286 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8431","3.827746","172.30.1.104","172.30.1.205","TCP","54","49671 > 34274 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8432","3.827747","172.30.1.205","172.30.1.104","TCP","54","34274 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8433","3.827749","172.30.1.104","172.30.1.205","TCP","54","49671 > 34290 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8434","3.827754","172.30.1.104","172.30.1.205","TCP","54","49671 > 34286 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8435","3.827757","172.30.1.205","172.30.1.104","TCP","54","34286 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8436","3.827758","172.30.1.104","172.30.1.205","TCP","54","49671 > 34282 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8437","3.827760","172.30.1.205","172.30.1.104","TCP","54","34282 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8438","3.827762","172.30.1.104","172.30.1.205","TCP","54","49671 > 34294 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8439","3.827764","172.30.1.104","172.30.1.205","TCP","54","49671 > 34294 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8440","3.827766","172.30.1.205","172.30.1.104","TCP","54","34294 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8441","3.827767","172.30.1.104","172.30.1.205","TCP","54","49671 > 34290 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8442","3.827769","172.30.1.205","172.30.1.104","TCP","54","34290 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8443","3.827773","172.30.1.104","172.30.1.205","TCP","54","49671 > 34266 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8444","3.827775","172.30.1.205","172.30.1.104","TCP","54","34266 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8445","3.827776","172.30.1.104","172.30.1.205","TCP","54","49671 > 34270 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8446","3.827778","172.30.1.205","172.30.1.104","TCP","54","34270 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8447","3.827779","172.30.1.104","172.30.1.205","TCP","54","49671 > 34250 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8448","3.827782","172.30.1.104","172.30.1.205","TCP","54","49671 > 34250 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8449","3.827784","172.30.1.205","172.30.1.104","TCP","54","34250 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8450","3.828278","172.30.1.205","172.30.1.104","TCP","54","41660 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8451","3.828386","172.30.1.205","172.30.1.104","TCP","74","34298 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907054 TSecr=0 WS=128" "8452","3.828522","172.30.1.104","172.30.1.205","TCP","54","135 > 41660 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8453","3.828576","172.30.1.104","172.30.1.205","TCP","54","135 > 41660 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8454","3.828581","172.30.1.205","172.30.1.104","TCP","54","41660 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8455","3.828660","172.30.1.104","172.30.1.205","TCP","66","49671 > 34298 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8456","3.828668","172.30.1.205","172.30.1.104","TCP","54","34298 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8457","3.829052","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8458","3.829350","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8459","3.829359","172.30.1.205","172.30.1.104","TCP","54","34298 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8460","3.831324","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8461","3.831694","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8462","3.831700","172.30.1.205","172.30.1.104","TCP","54","34298 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8463","3.833093","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8464","3.834325","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8465","3.834335","172.30.1.205","172.30.1.104","TCP","54","34298 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8466","3.835260","172.30.1.205","172.30.1.104","TCP","74","41664 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907061 TSecr=0 WS=128" "8467","3.835561","172.30.1.104","172.30.1.205","TCP","66","135 > 41664 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8468","3.835572","172.30.1.205","172.30.1.104","TCP","54","41664 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8469","3.835917","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8470","3.836276","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8471","3.836285","172.30.1.205","172.30.1.104","TCP","54","41664 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8472","3.838488","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8473","3.838870","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8474","3.838877","172.30.1.205","172.30.1.104","TCP","54","41664 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8475","3.840675","172.30.1.205","172.30.1.104","TCP","54","41664 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8476","3.840806","172.30.1.205","172.30.1.104","TCP","74","34302 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907067 TSecr=0 WS=128" "8477","3.841024","172.30.1.104","172.30.1.205","TCP","54","135 > 41664 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8478","3.841032","172.30.1.104","172.30.1.205","TCP","54","135 > 41664 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8479","3.841037","172.30.1.205","172.30.1.104","TCP","54","41664 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8480","3.841072","172.30.1.104","172.30.1.205","TCP","66","49671 > 34302 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8481","3.841080","172.30.1.205","172.30.1.104","TCP","54","34302 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8482","3.841423","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8483","3.841700","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8484","3.841710","172.30.1.205","172.30.1.104","TCP","54","34302 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8485","3.843557","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8486","3.843916","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8487","3.843921","172.30.1.205","172.30.1.104","TCP","54","34302 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8488","3.845297","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8489","3.846526","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8490","3.846537","172.30.1.205","172.30.1.104","TCP","54","34302 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8491","3.847481","172.30.1.205","172.30.1.104","TCP","74","41668 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907073 TSecr=0 WS=128" "8492","3.847766","172.30.1.104","172.30.1.205","TCP","66","135 > 41668 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8493","3.847777","172.30.1.205","172.30.1.104","TCP","54","41668 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8494","3.848125","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8495","3.848408","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8496","3.848417","172.30.1.205","172.30.1.104","TCP","54","41668 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8497","3.850621","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8498","3.850973","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8499","3.850980","172.30.1.205","172.30.1.104","TCP","54","41668 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8500","3.852805","172.30.1.205","172.30.1.104","TCP","54","41668 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8501","3.852915","172.30.1.205","172.30.1.104","TCP","74","34306 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907079 TSecr=0 WS=128" "8502","3.853060","172.30.1.104","172.30.1.205","TCP","54","135 > 41668 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8503","3.853121","172.30.1.104","172.30.1.205","TCP","54","135 > 41668 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8504","3.853126","172.30.1.205","172.30.1.104","TCP","54","41668 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8505","3.853209","172.30.1.104","172.30.1.205","TCP","66","49671 > 34306 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8506","3.853218","172.30.1.205","172.30.1.104","TCP","54","34306 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8507","3.853560","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8508","3.853839","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8509","3.853848","172.30.1.205","172.30.1.104","TCP","54","34306 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8510","3.855716","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8511","3.856076","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8512","3.856083","172.30.1.205","172.30.1.104","TCP","54","34306 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8513","3.857458","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8514","3.858752","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8515","3.858761","172.30.1.205","172.30.1.104","TCP","54","34306 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8516","3.859693","172.30.1.205","172.30.1.104","TCP","74","41672 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907086 TSecr=0 WS=128" "8517","3.860014","172.30.1.104","172.30.1.205","TCP","66","135 > 41672 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8518","3.860025","172.30.1.205","172.30.1.104","TCP","54","41672 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8519","3.860367","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8520","3.860658","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8521","3.860667","172.30.1.205","172.30.1.104","TCP","54","41672 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8522","3.862852","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8523","3.863247","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8524","3.863254","172.30.1.205","172.30.1.104","TCP","54","41672 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8525","3.865079","172.30.1.205","172.30.1.104","TCP","54","41672 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8526","3.865189","172.30.1.205","172.30.1.104","TCP","74","34310 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907091 TSecr=0 WS=128" "8527","3.865364","172.30.1.104","172.30.1.205","TCP","54","135 > 41672 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8528","3.865372","172.30.1.104","172.30.1.205","TCP","54","135 > 41672 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8529","3.865378","172.30.1.205","172.30.1.104","TCP","54","41672 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8530","3.865473","172.30.1.104","172.30.1.205","TCP","66","49671 > 34310 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8531","3.865481","172.30.1.205","172.30.1.104","TCP","54","34310 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8532","3.865827","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8533","3.866121","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8534","3.866130","172.30.1.205","172.30.1.104","TCP","54","34310 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8535","3.867991","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8536","3.868358","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8537","3.868364","172.30.1.205","172.30.1.104","TCP","54","34310 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8538","3.869735","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8539","3.871000","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8540","3.871010","172.30.1.205","172.30.1.104","TCP","54","34310 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8541","3.871954","172.30.1.205","172.30.1.104","TCP","74","41676 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907098 TSecr=0 WS=128" "8542","3.872281","172.30.1.104","172.30.1.205","TCP","66","135 > 41676 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8543","3.872292","172.30.1.205","172.30.1.104","TCP","54","41676 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8544","3.872641","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8545","3.872934","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8546","3.872944","172.30.1.205","172.30.1.104","TCP","54","41676 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8547","3.875120","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8548","3.875486","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8549","3.875493","172.30.1.205","172.30.1.104","TCP","54","41676 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8550","3.877311","172.30.1.205","172.30.1.104","TCP","54","41676 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8551","3.877422","172.30.1.205","172.30.1.104","TCP","74","34314 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907103 TSecr=0 WS=128" "8552","3.877588","172.30.1.104","172.30.1.205","TCP","54","135 > 41676 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8553","3.877597","172.30.1.104","172.30.1.205","TCP","54","135 > 41676 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8554","3.877603","172.30.1.205","172.30.1.104","TCP","54","41676 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8555","3.877685","172.30.1.104","172.30.1.205","TCP","66","49671 > 34314 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8556","3.877694","172.30.1.205","172.30.1.104","TCP","54","34314 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8557","3.878071","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8558","3.878364","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8559","3.878373","172.30.1.205","172.30.1.104","TCP","54","34314 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8560","3.880216","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8561","3.880576","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8562","3.880583","172.30.1.205","172.30.1.104","TCP","54","34314 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8563","3.881947","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8564","3.883202","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8565","3.883211","172.30.1.205","172.30.1.104","TCP","54","34314 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8566","3.884135","172.30.1.205","172.30.1.104","TCP","74","41680 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907110 TSecr=0 WS=128" "8567","3.884421","172.30.1.104","172.30.1.205","TCP","66","135 > 41680 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8568","3.884432","172.30.1.205","172.30.1.104","TCP","54","41680 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8569","3.884794","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8570","3.885278","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8571","3.885291","172.30.1.205","172.30.1.104","TCP","54","41680 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8572","3.887574","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8573","3.887952","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8574","3.887959","172.30.1.205","172.30.1.104","TCP","54","41680 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8575","3.889811","172.30.1.205","172.30.1.104","TCP","54","41680 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8576","3.889937","172.30.1.205","172.30.1.104","TCP","74","34318 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907116 TSecr=0 WS=128" "8577","3.890103","172.30.1.104","172.30.1.205","TCP","54","135 > 41680 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8578","3.890113","172.30.1.104","172.30.1.205","TCP","54","135 > 41680 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8579","3.890119","172.30.1.205","172.30.1.104","TCP","54","41680 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8580","3.890190","172.30.1.104","172.30.1.205","TCP","66","49671 > 34318 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8581","3.890199","172.30.1.205","172.30.1.104","TCP","54","34318 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8582","3.890545","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8583","3.890833","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8584","3.890842","172.30.1.205","172.30.1.104","TCP","54","34318 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8585","3.892725","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8586","3.893103","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8587","3.893110","172.30.1.205","172.30.1.104","TCP","54","34318 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8588","3.894473","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8589","3.895705","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8590","3.895715","172.30.1.205","172.30.1.104","TCP","54","34318 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8591","3.896675","172.30.1.205","172.30.1.104","TCP","74","41684 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907123 TSecr=0 WS=128" "8592","3.896954","172.30.1.104","172.30.1.205","TCP","66","135 > 41684 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8593","3.896964","172.30.1.205","172.30.1.104","TCP","54","41684 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8594","3.897318","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8595","3.897610","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8596","3.897619","172.30.1.205","172.30.1.104","TCP","54","41684 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8597","3.899815","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8598","3.900238","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8599","3.900245","172.30.1.205","172.30.1.104","TCP","54","41684 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8600","3.902068","172.30.1.205","172.30.1.104","TCP","54","41684 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8601","3.902178","172.30.1.205","172.30.1.104","TCP","74","34322 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907128 TSecr=0 WS=128" "8602","3.902370","172.30.1.104","172.30.1.205","TCP","54","135 > 41684 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8603","3.902379","172.30.1.104","172.30.1.205","TCP","54","135 > 41684 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8604","3.902385","172.30.1.205","172.30.1.104","TCP","54","41684 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8605","3.902419","172.30.1.104","172.30.1.205","TCP","66","49671 > 34322 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8606","3.902428","172.30.1.205","172.30.1.104","TCP","54","34322 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8607","3.902767","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8608","3.903031","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8609","3.903039","172.30.1.205","172.30.1.104","TCP","54","34322 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8610","3.904948","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8611","3.905316","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8612","3.905323","172.30.1.205","172.30.1.104","TCP","54","34322 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8613","3.906682","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8614","3.907919","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8615","3.907937","172.30.1.205","172.30.1.104","TCP","54","34322 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8616","3.908966","172.30.1.205","172.30.1.104","TCP","74","41688 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907135 TSecr=0 WS=128" "8617","3.909241","172.30.1.104","172.30.1.205","TCP","66","135 > 41688 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8618","3.909251","172.30.1.205","172.30.1.104","TCP","54","41688 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8619","3.909602","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8620","3.909888","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8621","3.909897","172.30.1.205","172.30.1.104","TCP","54","41688 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8622","3.912120","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8623","3.912514","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8624","3.912529","172.30.1.205","172.30.1.104","TCP","54","41688 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8625","3.914599","172.30.1.205","172.30.1.104","TCP","54","41688 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8626","3.914709","172.30.1.205","172.30.1.104","TCP","74","34326 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907141 TSecr=0 WS=128" "8627","3.914859","172.30.1.104","172.30.1.205","TCP","54","135 > 41688 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8628","3.914896","172.30.1.104","172.30.1.205","TCP","54","135 > 41688 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8629","3.914901","172.30.1.205","172.30.1.104","TCP","54","41688 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8630","3.914989","172.30.1.104","172.30.1.205","TCP","66","49671 > 34326 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8631","3.914997","172.30.1.205","172.30.1.104","TCP","54","34326 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8632","3.915346","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8633","3.915626","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8634","3.915632","172.30.1.205","172.30.1.104","TCP","54","34326 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8635","3.917517","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8636","3.917931","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8637","3.917937","172.30.1.205","172.30.1.104","TCP","54","34326 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8638","3.919278","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8639","3.920514","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8640","3.920525","172.30.1.205","172.30.1.104","TCP","54","34326 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8641","3.921488","172.30.1.205","172.30.1.104","TCP","74","41692 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907147 TSecr=0 WS=128" "8642","3.921841","172.30.1.104","172.30.1.205","TCP","66","135 > 41692 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8643","3.921851","172.30.1.205","172.30.1.104","TCP","54","41692 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8644","3.922196","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8645","3.922475","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8646","3.922484","172.30.1.205","172.30.1.104","TCP","54","41692 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8647","3.924632","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8648","3.925021","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8649","3.925028","172.30.1.205","172.30.1.104","TCP","54","41692 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8650","3.926890","172.30.1.205","172.30.1.104","TCP","54","41692 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8651","3.927000","172.30.1.205","172.30.1.104","TCP","74","34330 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907153 TSecr=0 WS=128" "8652","3.927160","172.30.1.104","172.30.1.205","TCP","54","135 > 41692 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8653","3.927200","172.30.1.104","172.30.1.205","TCP","54","135 > 41692 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8654","3.927205","172.30.1.205","172.30.1.104","TCP","54","41692 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8655","3.927285","172.30.1.104","172.30.1.205","TCP","66","49671 > 34330 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8656","3.927293","172.30.1.205","172.30.1.104","TCP","54","34330 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8657","3.927635","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8658","3.927926","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8659","3.927934","172.30.1.205","172.30.1.104","TCP","54","34330 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8660","3.929801","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8661","3.930170","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8662","3.930176","172.30.1.205","172.30.1.104","TCP","54","34330 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8663","3.931513","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8664","3.932723","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8665","3.932732","172.30.1.205","172.30.1.104","TCP","54","34330 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8666","3.933670","172.30.1.205","172.30.1.104","TCP","74","41696 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907160 TSecr=0 WS=128" "8667","3.933961","172.30.1.104","172.30.1.205","TCP","66","135 > 41696 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8668","3.933972","172.30.1.205","172.30.1.104","TCP","54","41696 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8669","3.934318","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8670","3.934596","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8671","3.934605","172.30.1.205","172.30.1.104","TCP","54","41696 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8672","3.936787","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8673","3.937180","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8674","3.937187","172.30.1.205","172.30.1.104","TCP","54","41696 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8675","3.938970","172.30.1.205","172.30.1.104","TCP","54","41696 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8676","3.939081","172.30.1.205","172.30.1.104","TCP","74","34334 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907165 TSecr=0 WS=128" "8677","3.939238","172.30.1.104","172.30.1.205","TCP","54","135 > 41696 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8678","3.939261","172.30.1.104","172.30.1.205","TCP","54","135 > 41696 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8679","3.939267","172.30.1.205","172.30.1.104","TCP","54","41696 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8680","3.939352","172.30.1.104","172.30.1.205","TCP","66","49671 > 34334 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8681","3.939360","172.30.1.205","172.30.1.104","TCP","54","34334 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8682","3.939702","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8683","3.939985","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8684","3.939993","172.30.1.205","172.30.1.104","TCP","54","34334 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8685","3.941886","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8686","3.942272","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8687","3.942284","172.30.1.205","172.30.1.104","TCP","54","34334 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8688","3.943861","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8689","3.945098","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8690","3.945107","172.30.1.205","172.30.1.104","TCP","54","34334 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8691","3.946041","172.30.1.205","172.30.1.104","TCP","74","41700 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907172 TSecr=0 WS=128" "8692","3.946332","172.30.1.104","172.30.1.205","TCP","66","135 > 41700 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8693","3.946342","172.30.1.205","172.30.1.104","TCP","54","41700 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8694","3.946691","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8695","3.946996","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8696","3.947005","172.30.1.205","172.30.1.104","TCP","54","41700 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8697","3.949201","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8698","3.949605","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8699","3.949612","172.30.1.205","172.30.1.104","TCP","54","41700 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8700","3.951420","172.30.1.205","172.30.1.104","TCP","54","41700 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8701","3.951533","172.30.1.205","172.30.1.104","TCP","74","34338 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907177 TSecr=0 WS=128" "8702","3.951697","172.30.1.104","172.30.1.205","TCP","54","135 > 41700 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8703","3.951705","172.30.1.104","172.30.1.205","TCP","54","135 > 41700 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8704","3.951711","172.30.1.205","172.30.1.104","TCP","54","41700 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8705","3.951821","172.30.1.104","172.30.1.205","TCP","66","49671 > 34338 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8706","3.951830","172.30.1.205","172.30.1.104","TCP","54","34338 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8707","3.952174","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8708","3.952490","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8709","3.952498","172.30.1.205","172.30.1.104","TCP","54","34338 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8710","3.954391","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8711","3.954774","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8712","3.954780","172.30.1.205","172.30.1.104","TCP","54","34338 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8713","3.956127","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8714","3.957401","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8715","3.957410","172.30.1.205","172.30.1.104","TCP","54","34338 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8716","3.958339","172.30.1.205","172.30.1.104","TCP","74","41704 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907184 TSecr=0 WS=128" "8717","3.958636","172.30.1.104","172.30.1.205","TCP","66","135 > 41704 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8718","3.958647","172.30.1.205","172.30.1.104","TCP","54","41704 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8719","3.958992","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8720","3.959269","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8721","3.959277","172.30.1.205","172.30.1.104","TCP","54","41704 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8722","3.961472","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8723","3.961893","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8724","3.961899","172.30.1.205","172.30.1.104","TCP","54","41704 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8725","3.963708","172.30.1.205","172.30.1.104","TCP","54","41704 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8726","3.963816","172.30.1.205","172.30.1.104","TCP","74","34342 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907190 TSecr=0 WS=128" "8727","3.963973","172.30.1.104","172.30.1.205","TCP","54","135 > 41704 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8728","3.963981","172.30.1.104","172.30.1.205","TCP","54","135 > 41704 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8729","3.963986","172.30.1.205","172.30.1.104","TCP","54","41704 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8730","3.964086","172.30.1.104","172.30.1.205","TCP","66","49671 > 34342 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8731","3.964095","172.30.1.205","172.30.1.104","TCP","54","34342 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8732","3.964460","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8733","3.964794","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8734","3.964803","172.30.1.205","172.30.1.104","TCP","54","34342 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8735","3.966686","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8736","3.967024","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8737","3.967030","172.30.1.205","172.30.1.104","TCP","54","34342 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8738","3.968348","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8739","3.969599","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8740","3.969615","172.30.1.205","172.30.1.104","TCP","54","34342 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8741","3.970553","172.30.1.205","172.30.1.104","TCP","74","41708 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907196 TSecr=0 WS=128" "8742","3.970839","172.30.1.104","172.30.1.205","TCP","66","135 > 41708 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8743","3.970850","172.30.1.205","172.30.1.104","TCP","54","41708 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8744","3.971197","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8745","3.971470","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8746","3.971487","172.30.1.205","172.30.1.104","TCP","54","41708 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8747","3.973929","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8748","3.974330","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8749","3.974349","172.30.1.205","172.30.1.104","TCP","54","41708 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8750","3.975194","172.30.1.205","172.30.1.104","TCP","54","34302 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8751","3.975247","172.30.1.205","172.30.1.104","TCP","54","34306 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8752","3.975284","172.30.1.205","172.30.1.104","TCP","54","34310 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8753","3.975317","172.30.1.205","172.30.1.104","TCP","54","34314 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8754","3.975349","172.30.1.205","172.30.1.104","TCP","54","34318 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8755","3.975380","172.30.1.205","172.30.1.104","TCP","54","34322 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8756","3.975407","172.30.1.205","172.30.1.104","TCP","54","34326 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8757","3.975433","172.30.1.205","172.30.1.104","TCP","54","34330 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8758","3.975459","172.30.1.205","172.30.1.104","TCP","54","34334 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8759","3.975487","172.30.1.205","172.30.1.104","TCP","54","34338 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8760","3.975508","172.30.1.205","172.30.1.104","TCP","54","34342 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8761","3.975583","172.30.1.205","172.30.1.104","TCP","54","34298 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "8762","3.975666","172.30.1.104","172.30.1.205","TCP","54","49671 > 34302 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8763","3.975675","172.30.1.104","172.30.1.205","TCP","54","49671 > 34306 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8764","3.975678","172.30.1.104","172.30.1.205","TCP","54","49671 > 34302 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8765","3.975684","172.30.1.205","172.30.1.104","TCP","54","34302 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8766","3.975690","172.30.1.104","172.30.1.205","TCP","54","49671 > 34306 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8767","3.975693","172.30.1.205","172.30.1.104","TCP","54","34306 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8768","3.975831","172.30.1.104","172.30.1.205","TCP","54","49671 > 34310 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8769","3.975838","172.30.1.104","172.30.1.205","TCP","54","49671 > 34314 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8770","3.976025","172.30.1.104","172.30.1.205","TCP","54","49671 > 34318 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8771","3.976031","172.30.1.104","172.30.1.205","TCP","54","49671 > 34322 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8772","3.976034","172.30.1.104","172.30.1.205","TCP","54","49671 > 34326 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8773","3.976036","172.30.1.104","172.30.1.205","TCP","54","49671 > 34330 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8774","3.976039","172.30.1.104","172.30.1.205","TCP","54","49671 > 34334 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8775","3.976042","172.30.1.104","172.30.1.205","TCP","54","49671 > 34338 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8776","3.976044","172.30.1.104","172.30.1.205","TCP","54","49671 > 34342 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8777","3.976213","172.30.1.104","172.30.1.205","TCP","54","49671 > 34310 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8778","3.976219","172.30.1.205","172.30.1.104","TCP","54","34310 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8779","3.976226","172.30.1.104","172.30.1.205","TCP","54","49671 > 34314 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8780","3.976228","172.30.1.205","172.30.1.104","TCP","54","34314 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8781","3.976229","172.30.1.104","172.30.1.205","TCP","54","49671 > 34342 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8782","3.976231","172.30.1.205","172.30.1.104","TCP","54","34342 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8783","3.976236","172.30.1.104","172.30.1.205","TCP","54","49671 > 34338 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8784","3.976238","172.30.1.205","172.30.1.104","TCP","54","34338 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8785","3.976239","172.30.1.104","172.30.1.205","TCP","54","49671 > 34334 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8786","3.976241","172.30.1.205","172.30.1.104","TCP","54","34334 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8787","3.976242","172.30.1.104","172.30.1.205","TCP","54","49671 > 34330 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8788","3.976244","172.30.1.205","172.30.1.104","TCP","54","34330 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8789","3.976245","172.30.1.104","172.30.1.205","TCP","54","49671 > 34326 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8790","3.976247","172.30.1.205","172.30.1.104","TCP","54","34326 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8791","3.976248","172.30.1.104","172.30.1.205","TCP","54","49671 > 34322 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8792","3.976249","172.30.1.205","172.30.1.104","TCP","54","34322 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8793","3.976250","172.30.1.104","172.30.1.205","TCP","54","49671 > 34318 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8794","3.976252","172.30.1.205","172.30.1.104","TCP","54","34318 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8795","3.976334","172.30.1.104","172.30.1.205","TCP","54","49671 > 34298 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8796","3.976340","172.30.1.104","172.30.1.205","TCP","54","49671 > 34298 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "8797","3.976343","172.30.1.205","172.30.1.104","TCP","54","34298 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "8798","3.977144","172.30.1.205","172.30.1.104","TCP","54","41708 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8799","3.977261","172.30.1.205","172.30.1.104","TCP","74","34346 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907203 TSecr=0 WS=128" "8800","3.977396","172.30.1.104","172.30.1.205","TCP","54","135 > 41708 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8801","3.977404","172.30.1.104","172.30.1.205","TCP","54","135 > 41708 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8802","3.977409","172.30.1.205","172.30.1.104","TCP","54","41708 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8803","3.977544","172.30.1.104","172.30.1.205","TCP","66","49671 > 34346 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8804","3.977552","172.30.1.205","172.30.1.104","TCP","54","34346 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8805","3.977908","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8806","3.978193","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8807","3.978206","172.30.1.205","172.30.1.104","TCP","54","34346 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8808","3.980146","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8809","3.980510","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8810","3.980517","172.30.1.205","172.30.1.104","TCP","54","34346 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8811","3.981914","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8812","3.983229","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8813","3.983252","172.30.1.205","172.30.1.104","TCP","54","34346 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8814","3.984200","172.30.1.205","172.30.1.104","TCP","74","41712 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907210 TSecr=0 WS=128" "8815","3.984487","172.30.1.104","172.30.1.205","TCP","66","135 > 41712 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8816","3.984499","172.30.1.205","172.30.1.104","TCP","54","41712 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8817","3.984890","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8818","3.985183","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8819","3.985192","172.30.1.205","172.30.1.104","TCP","54","41712 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8820","3.987367","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8821","3.987749","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8822","3.987757","172.30.1.205","172.30.1.104","TCP","54","41712 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8823","3.989624","172.30.1.205","172.30.1.104","TCP","54","41712 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8824","3.989750","172.30.1.205","172.30.1.104","TCP","74","34350 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907216 TSecr=0 WS=128" "8825","3.989907","172.30.1.104","172.30.1.205","TCP","54","135 > 41712 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8826","3.989955","172.30.1.104","172.30.1.205","TCP","54","135 > 41712 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8827","3.989961","172.30.1.205","172.30.1.104","TCP","54","41712 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8828","3.990043","172.30.1.104","172.30.1.205","TCP","66","49671 > 34350 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8829","3.990051","172.30.1.205","172.30.1.104","TCP","54","34350 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8830","3.990416","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8831","3.990705","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8832","3.990713","172.30.1.205","172.30.1.104","TCP","54","34350 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8833","3.992560","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8834","3.992947","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8835","3.992954","172.30.1.205","172.30.1.104","TCP","54","34350 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8836","3.994298","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8837","3.995579","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8838","3.995588","172.30.1.205","172.30.1.104","TCP","54","34350 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8839","3.996507","172.30.1.205","172.30.1.104","TCP","74","41716 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907222 TSecr=0 WS=128" "8840","3.996811","172.30.1.104","172.30.1.205","TCP","66","135 > 41716 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8841","3.996822","172.30.1.205","172.30.1.104","TCP","54","41716 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8842","3.997174","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8843","3.997481","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8844","3.997496","172.30.1.205","172.30.1.104","TCP","54","41716 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8845","3.999768","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8846","4.000149","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8847","4.000156","172.30.1.205","172.30.1.104","TCP","54","41716 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8848","4.001997","172.30.1.205","172.30.1.104","TCP","54","41716 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8849","4.002117","172.30.1.205","172.30.1.104","TCP","74","34354 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907228 TSecr=0 WS=128" "8850","4.002278","172.30.1.104","172.30.1.205","TCP","54","135 > 41716 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8851","4.002295","172.30.1.104","172.30.1.205","TCP","54","135 > 41716 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8852","4.002300","172.30.1.205","172.30.1.104","TCP","54","41716 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8853","4.002420","172.30.1.104","172.30.1.205","TCP","66","49671 > 34354 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8854","4.002432","172.30.1.205","172.30.1.104","TCP","54","34354 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8855","4.002796","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8856","4.003072","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8857","4.003081","172.30.1.205","172.30.1.104","TCP","54","34354 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8858","4.004962","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8859","4.005328","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8860","4.005335","172.30.1.205","172.30.1.104","TCP","54","34354 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8861","4.006681","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8862","4.008008","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8863","4.008030","172.30.1.205","172.30.1.104","TCP","54","34354 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8864","4.009168","172.30.1.205","172.30.1.104","TCP","74","41720 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907235 TSecr=0 WS=128" "8865","4.009498","172.30.1.104","172.30.1.205","TCP","66","135 > 41720 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8866","4.009509","172.30.1.205","172.30.1.104","TCP","54","41720 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8867","4.009864","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8868","4.010189","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8869","4.010198","172.30.1.205","172.30.1.104","TCP","54","41720 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8870","4.012431","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8871","4.012838","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8872","4.012846","172.30.1.205","172.30.1.104","TCP","54","41720 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8873","4.014677","172.30.1.205","172.30.1.104","TCP","54","41720 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8874","4.014821","172.30.1.205","172.30.1.104","TCP","74","34358 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907241 TSecr=0 WS=128" "8875","4.014956","172.30.1.104","172.30.1.205","TCP","54","135 > 41720 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8876","4.015006","172.30.1.104","172.30.1.205","TCP","54","135 > 41720 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8877","4.015018","172.30.1.205","172.30.1.104","TCP","54","41720 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8878","4.015106","172.30.1.104","172.30.1.205","TCP","66","49671 > 34358 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8879","4.015119","172.30.1.205","172.30.1.104","TCP","54","34358 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8880","4.015517","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8881","4.015804","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8882","4.015815","172.30.1.205","172.30.1.104","TCP","54","34358 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8883","4.017754","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8884","4.018171","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8885","4.018178","172.30.1.205","172.30.1.104","TCP","54","34358 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8886","4.019555","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8887","4.020943","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8888","4.020952","172.30.1.205","172.30.1.104","TCP","54","34358 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8889","4.021938","172.30.1.205","172.30.1.104","TCP","74","41724 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907248 TSecr=0 WS=128" "8890","4.022262","172.30.1.104","172.30.1.205","TCP","66","135 > 41724 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8891","4.022272","172.30.1.205","172.30.1.104","TCP","54","41724 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8892","4.022620","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8893","4.022966","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8894","4.022976","172.30.1.205","172.30.1.104","TCP","54","41724 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8895","4.025194","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8896","4.025570","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8897","4.025577","172.30.1.205","172.30.1.104","TCP","54","41724 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8898","4.027391","172.30.1.205","172.30.1.104","TCP","54","41724 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8899","4.027503","172.30.1.205","172.30.1.104","TCP","74","34362 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907253 TSecr=0 WS=128" "8900","4.027662","172.30.1.104","172.30.1.205","TCP","54","135 > 41724 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8901","4.027704","172.30.1.104","172.30.1.205","TCP","54","135 > 41724 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8902","4.027710","172.30.1.205","172.30.1.104","TCP","54","41724 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8903","4.027798","172.30.1.104","172.30.1.205","TCP","66","49671 > 34362 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8904","4.027807","172.30.1.205","172.30.1.104","TCP","54","34362 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8905","4.028150","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8906","4.028421","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8907","4.028430","172.30.1.205","172.30.1.104","TCP","54","34362 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8908","4.030338","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8909","4.030682","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8910","4.030688","172.30.1.205","172.30.1.104","TCP","54","34362 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8911","4.032033","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8912","4.033390","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8913","4.033399","172.30.1.205","172.30.1.104","TCP","54","34362 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8914","4.034344","172.30.1.205","172.30.1.104","TCP","74","41728 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907260 TSecr=0 WS=128" "8915","4.034638","172.30.1.104","172.30.1.205","TCP","66","135 > 41728 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8916","4.034649","172.30.1.205","172.30.1.104","TCP","54","41728 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8917","4.034997","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8918","4.035277","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8919","4.035286","172.30.1.205","172.30.1.104","TCP","54","41728 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8920","4.037555","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8921","4.037959","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8922","4.037965","172.30.1.205","172.30.1.104","TCP","54","41728 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8923","4.039819","172.30.1.205","172.30.1.104","TCP","54","41728 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8924","4.039931","172.30.1.205","172.30.1.104","TCP","74","34366 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907266 TSecr=0 WS=128" "8925","4.040125","172.30.1.104","172.30.1.205","TCP","54","135 > 41728 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8926","4.040153","172.30.1.104","172.30.1.205","TCP","54","135 > 41728 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8927","4.040159","172.30.1.205","172.30.1.104","TCP","54","41728 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8928","4.040240","172.30.1.104","172.30.1.205","TCP","66","49671 > 34366 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8929","4.040249","172.30.1.205","172.30.1.104","TCP","54","34366 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8930","4.040621","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8931","4.040920","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8932","4.040930","172.30.1.205","172.30.1.104","TCP","54","34366 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8933","4.042856","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8934","4.045864","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8935","4.045871","172.30.1.205","172.30.1.104","TCP","54","34366 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8936","4.047242","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8937","4.048623","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8938","4.048632","172.30.1.205","172.30.1.104","TCP","54","34366 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8939","4.049600","172.30.1.205","172.30.1.104","TCP","74","41732 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907276 TSecr=0 WS=128" "8940","4.049899","172.30.1.104","172.30.1.205","TCP","66","135 > 41732 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8941","4.049910","172.30.1.205","172.30.1.104","TCP","54","41732 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8942","4.050266","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8943","4.050575","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8944","4.050585","172.30.1.205","172.30.1.104","TCP","54","41732 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8945","4.052817","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8946","4.053242","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8947","4.053249","172.30.1.205","172.30.1.104","TCP","54","41732 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8948","4.055061","172.30.1.205","172.30.1.104","TCP","54","41732 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8949","4.055180","172.30.1.205","172.30.1.104","TCP","74","34370 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907281 TSecr=0 WS=128" "8950","4.055381","172.30.1.104","172.30.1.205","TCP","54","135 > 41732 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8951","4.055407","172.30.1.104","172.30.1.205","TCP","54","135 > 41732 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8952","4.055413","172.30.1.205","172.30.1.104","TCP","54","41732 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8953","4.055452","172.30.1.104","172.30.1.205","TCP","66","49671 > 34370 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8954","4.055460","172.30.1.205","172.30.1.104","TCP","54","34370 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8955","4.055806","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8956","4.056130","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8957","4.056144","172.30.1.205","172.30.1.104","TCP","54","34370 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8958","4.058163","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8959","4.058563","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8960","4.058572","172.30.1.205","172.30.1.104","TCP","54","34370 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8961","4.060007","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8962","4.061304","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8963","4.061315","172.30.1.205","172.30.1.104","TCP","54","34370 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8964","4.062294","172.30.1.205","172.30.1.104","TCP","74","41736 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907288 TSecr=0 WS=128" "8965","4.062590","172.30.1.104","172.30.1.205","TCP","66","135 > 41736 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8966","4.062601","172.30.1.205","172.30.1.104","TCP","54","41736 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8967","4.062963","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8968","4.063251","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8969","4.063261","172.30.1.205","172.30.1.104","TCP","54","41736 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8970","4.065501","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8971","4.065862","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8972","4.065869","172.30.1.205","172.30.1.104","TCP","54","41736 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8973","4.067684","172.30.1.205","172.30.1.104","TCP","54","41736 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8974","4.067797","172.30.1.205","172.30.1.104","TCP","74","34374 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907294 TSecr=0 WS=128" "8975","4.067963","172.30.1.104","172.30.1.205","TCP","54","135 > 41736 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8976","4.067998","172.30.1.104","172.30.1.205","TCP","54","135 > 41736 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "8977","4.068004","172.30.1.205","172.30.1.104","TCP","54","41736 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "8978","4.068089","172.30.1.104","172.30.1.205","TCP","66","49671 > 34374 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8979","4.068097","172.30.1.205","172.30.1.104","TCP","54","34374 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8980","4.068462","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "8981","4.068734","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8982","4.068745","172.30.1.205","172.30.1.104","TCP","54","34374 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8983","4.070647","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "8984","4.070994","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "8985","4.071000","172.30.1.205","172.30.1.104","TCP","54","34374 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "8986","4.072358","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "8987","4.073578","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "8988","4.073588","172.30.1.205","172.30.1.104","TCP","54","34374 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "8989","4.074552","172.30.1.205","172.30.1.104","TCP","74","41740 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907300 TSecr=0 WS=128" "8990","4.074862","172.30.1.104","172.30.1.205","TCP","66","135 > 41740 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "8991","4.074872","172.30.1.205","172.30.1.104","TCP","54","41740 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "8992","4.075226","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "8993","4.075512","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "8994","4.075521","172.30.1.205","172.30.1.104","TCP","54","41740 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "8995","4.077721","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "8996","4.078132","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "8997","4.078139","172.30.1.205","172.30.1.104","TCP","54","41740 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "8998","4.079952","172.30.1.205","172.30.1.104","TCP","54","41740 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "8999","4.080069","172.30.1.205","172.30.1.104","TCP","74","34378 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907306 TSecr=0 WS=128" "9000","4.080221","172.30.1.104","172.30.1.205","TCP","54","135 > 41740 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9001","4.080231","172.30.1.104","172.30.1.205","TCP","54","135 > 41740 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9002","4.080237","172.30.1.205","172.30.1.104","TCP","54","41740 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9003","4.080339","172.30.1.104","172.30.1.205","TCP","66","49671 > 34378 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9004","4.080348","172.30.1.205","172.30.1.104","TCP","54","34378 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9005","4.080696","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9006","4.080979","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9007","4.080988","172.30.1.205","172.30.1.104","TCP","54","34378 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9008","4.082869","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9009","4.083236","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9010","4.083243","172.30.1.205","172.30.1.104","TCP","54","34378 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9011","4.084580","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9012","4.085834","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9013","4.085844","172.30.1.205","172.30.1.104","TCP","54","34378 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9014","4.086788","172.30.1.205","172.30.1.104","TCP","74","41744 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907313 TSecr=0 WS=128" "9015","4.087081","172.30.1.104","172.30.1.205","TCP","66","135 > 41744 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9016","4.087092","172.30.1.205","172.30.1.104","TCP","54","41744 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9017","4.087438","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9018","4.087708","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9019","4.087717","172.30.1.205","172.30.1.104","TCP","54","41744 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9020","4.089926","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9021","4.090307","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9022","4.090314","172.30.1.205","172.30.1.104","TCP","54","41744 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9023","4.092114","172.30.1.205","172.30.1.104","TCP","54","41744 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9024","4.092232","172.30.1.205","172.30.1.104","TCP","74","34382 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907318 TSecr=0 WS=128" "9025","4.092385","172.30.1.104","172.30.1.205","TCP","54","135 > 41744 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9026","4.092394","172.30.1.104","172.30.1.205","TCP","54","135 > 41744 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9027","4.092400","172.30.1.205","172.30.1.104","TCP","54","41744 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9028","4.092513","172.30.1.104","172.30.1.205","TCP","66","49671 > 34382 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9029","4.092522","172.30.1.205","172.30.1.104","TCP","54","34382 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9030","4.092893","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9031","4.093196","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9032","4.093206","172.30.1.205","172.30.1.104","TCP","54","34382 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9033","4.095078","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9034","4.095422","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9035","4.095428","172.30.1.205","172.30.1.104","TCP","54","34382 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9036","4.096788","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9037","4.098158","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9038","4.098167","172.30.1.205","172.30.1.104","TCP","54","34382 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9039","4.099098","172.30.1.205","172.30.1.104","TCP","74","41748 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907325 TSecr=0 WS=128" "9040","4.099401","172.30.1.104","172.30.1.205","TCP","66","135 > 41748 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9041","4.099412","172.30.1.205","172.30.1.104","TCP","54","41748 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9042","4.099760","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9043","4.100032","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9044","4.100041","172.30.1.205","172.30.1.104","TCP","54","41748 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9045","4.102263","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9046","4.102627","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9047","4.102633","172.30.1.205","172.30.1.104","TCP","54","41748 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9048","4.104422","172.30.1.205","172.30.1.104","TCP","54","41748 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9049","4.104537","172.30.1.205","172.30.1.104","TCP","74","34386 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907330 TSecr=0 WS=128" "9050","4.104734","172.30.1.104","172.30.1.205","TCP","54","135 > 41748 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9051","4.104749","172.30.1.104","172.30.1.205","TCP","54","135 > 41748 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9052","4.104757","172.30.1.205","172.30.1.104","TCP","54","41748 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9053","4.104841","172.30.1.104","172.30.1.205","TCP","66","49671 > 34386 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9054","4.104854","172.30.1.205","172.30.1.104","TCP","54","34386 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9055","4.105574","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9056","4.105876","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9057","4.105886","172.30.1.205","172.30.1.104","TCP","54","34386 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9058","4.107781","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9059","4.108142","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9060","4.108149","172.30.1.205","172.30.1.104","TCP","54","34386 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9061","4.109534","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9062","4.110821","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9063","4.110830","172.30.1.205","172.30.1.104","TCP","54","34386 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9064","4.111786","172.30.1.205","172.30.1.104","TCP","74","41752 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907338 TSecr=0 WS=128" "9065","4.112076","172.30.1.104","172.30.1.205","TCP","66","135 > 41752 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9066","4.112090","172.30.1.205","172.30.1.104","TCP","54","41752 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9067","4.112456","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9068","4.112736","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9069","4.112745","172.30.1.205","172.30.1.104","TCP","54","41752 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9070","4.114947","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9071","4.115323","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9072","4.115330","172.30.1.205","172.30.1.104","TCP","54","41752 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9073","4.117156","172.30.1.205","172.30.1.104","TCP","54","41752 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9074","4.117270","172.30.1.205","172.30.1.104","TCP","74","34390 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907343 TSecr=0 WS=128" "9075","4.117434","172.30.1.104","172.30.1.205","TCP","54","135 > 41752 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9076","4.117448","172.30.1.104","172.30.1.205","TCP","54","135 > 41752 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9077","4.117454","172.30.1.205","172.30.1.104","TCP","54","41752 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9078","4.117569","172.30.1.104","172.30.1.205","TCP","66","49671 > 34390 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9079","4.117578","172.30.1.205","172.30.1.104","TCP","54","34390 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9080","4.117928","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9081","4.118259","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9082","4.118268","172.30.1.205","172.30.1.104","TCP","54","34390 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9083","4.120135","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9084","4.120505","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9085","4.120512","172.30.1.205","172.30.1.104","TCP","54","34390 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9086","4.121887","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9087","4.123189","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9088","4.123198","172.30.1.205","172.30.1.104","TCP","54","34390 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9089","4.124168","172.30.1.205","172.30.1.104","TCP","74","41756 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907350 TSecr=0 WS=128" "9090","4.124458","172.30.1.104","172.30.1.205","TCP","66","135 > 41756 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9091","4.124469","172.30.1.205","172.30.1.104","TCP","54","41756 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9092","4.124845","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9093","4.125141","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9094","4.125150","172.30.1.205","172.30.1.104","TCP","54","41756 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9095","4.127339","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9096","4.127718","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9097","4.127724","172.30.1.205","172.30.1.104","TCP","54","41756 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9098","4.128566","172.30.1.205","172.30.1.104","TCP","54","34350 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9099","4.128621","172.30.1.205","172.30.1.104","TCP","54","34354 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9100","4.128659","172.30.1.205","172.30.1.104","TCP","54","34358 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9101","4.128689","172.30.1.205","172.30.1.104","TCP","54","34362 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9102","4.128721","172.30.1.205","172.30.1.104","TCP","54","34366 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9103","4.128752","172.30.1.205","172.30.1.104","TCP","54","34370 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9104","4.128809","172.30.1.205","172.30.1.104","TCP","54","34374 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9105","4.128846","172.30.1.205","172.30.1.104","TCP","54","34378 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9106","4.128873","172.30.1.205","172.30.1.104","TCP","54","34382 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9107","4.128896","172.30.1.205","172.30.1.104","TCP","54","34386 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9108","4.128921","172.30.1.205","172.30.1.104","TCP","54","34390 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9109","4.128996","172.30.1.205","172.30.1.104","TCP","54","34346 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9110","4.129156","172.30.1.104","172.30.1.205","TCP","54","49671 > 34350 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9111","4.129166","172.30.1.104","172.30.1.205","TCP","54","49671 > 34350 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9112","4.129173","172.30.1.205","172.30.1.104","TCP","54","34350 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9113","4.129180","172.30.1.104","172.30.1.205","TCP","54","49671 > 34354 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9114","4.129184","172.30.1.104","172.30.1.205","TCP","54","49671 > 34358 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9115","4.129187","172.30.1.104","172.30.1.205","TCP","54","49671 > 34362 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9116","4.129193","172.30.1.104","172.30.1.205","TCP","54","49671 > 34362 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9117","4.129195","172.30.1.205","172.30.1.104","TCP","54","34362 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9118","4.129197","172.30.1.104","172.30.1.205","TCP","54","49671 > 34354 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9119","4.129198","172.30.1.205","172.30.1.104","TCP","54","34354 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9120","4.129200","172.30.1.104","172.30.1.205","TCP","54","49671 > 34358 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9121","4.129201","172.30.1.205","172.30.1.104","TCP","54","34358 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9122","4.129202","172.30.1.104","172.30.1.205","TCP","54","49671 > 34366 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9123","4.129210","172.30.1.104","172.30.1.205","TCP","54","49671 > 34370 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9124","4.129528","172.30.1.104","172.30.1.205","TCP","54","49671 > 34366 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9125","4.129534","172.30.1.205","172.30.1.104","TCP","54","34366 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9126","4.129541","172.30.1.104","172.30.1.205","TCP","54","49671 > 34374 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9127","4.129547","172.30.1.104","172.30.1.205","TCP","54","49671 > 34370 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9128","4.129553","172.30.1.205","172.30.1.104","TCP","54","34370 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9129","4.129554","172.30.1.104","172.30.1.205","TCP","54","49671 > 34374 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9130","4.129556","172.30.1.205","172.30.1.104","TCP","54","34374 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9131","4.129557","172.30.1.104","172.30.1.205","TCP","54","49671 > 34378 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9132","4.129560","172.30.1.104","172.30.1.205","TCP","54","49671 > 34382 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9133","4.129562","172.30.1.104","172.30.1.205","TCP","54","49671 > 34386 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9134","4.129565","172.30.1.104","172.30.1.205","TCP","54","49671 > 34390 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9135","4.129567","172.30.1.104","172.30.1.205","TCP","54","49671 > 34378 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9136","4.129569","172.30.1.205","172.30.1.104","TCP","54","34378 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9137","4.129570","172.30.1.104","172.30.1.205","TCP","54","49671 > 34390 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9138","4.129572","172.30.1.205","172.30.1.104","TCP","54","34390 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9139","4.129574","172.30.1.104","172.30.1.205","TCP","54","49671 > 34382 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9140","4.129576","172.30.1.205","172.30.1.104","TCP","54","34382 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9141","4.129577","172.30.1.104","172.30.1.205","TCP","54","49671 > 34386 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9142","4.129579","172.30.1.205","172.30.1.104","TCP","54","34386 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9143","4.129677","172.30.1.104","172.30.1.205","TCP","54","49671 > 34346 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9144","4.129694","172.30.1.104","172.30.1.205","TCP","54","49671 > 34346 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9145","4.129699","172.30.1.205","172.30.1.104","TCP","54","34346 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9146","4.130456","172.30.1.205","172.30.1.104","TCP","54","41756 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9147","4.130575","172.30.1.205","172.30.1.104","TCP","74","34394 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907356 TSecr=0 WS=128" "9148","4.130697","172.30.1.104","172.30.1.205","TCP","54","135 > 41756 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9149","4.130711","172.30.1.104","172.30.1.205","TCP","54","135 > 41756 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9150","4.130717","172.30.1.205","172.30.1.104","TCP","54","41756 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9151","4.130823","172.30.1.104","172.30.1.205","TCP","66","49671 > 34394 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9152","4.130831","172.30.1.205","172.30.1.104","TCP","54","34394 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9153","4.131192","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9154","4.131473","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9155","4.131482","172.30.1.205","172.30.1.104","TCP","54","34394 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9156","4.133401","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9157","4.133754","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9158","4.133761","172.30.1.205","172.30.1.104","TCP","54","34394 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9159","4.135120","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9160","4.136427","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9161","4.136437","172.30.1.205","172.30.1.104","TCP","54","34394 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9162","4.137433","172.30.1.205","172.30.1.104","TCP","74","41760 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907363 TSecr=0 WS=128" "9163","4.137825","172.30.1.104","172.30.1.205","TCP","66","135 > 41760 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9164","4.137836","172.30.1.205","172.30.1.104","TCP","54","41760 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9165","4.138190","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9166","4.138473","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9167","4.138482","172.30.1.205","172.30.1.104","TCP","54","41760 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9168","4.140799","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9169","4.141190","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9170","4.141196","172.30.1.205","172.30.1.104","TCP","54","41760 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9171","4.143059","172.30.1.205","172.30.1.104","TCP","54","41760 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9172","4.143174","172.30.1.205","172.30.1.104","TCP","74","34398 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907369 TSecr=0 WS=128" "9173","4.143403","172.30.1.104","172.30.1.205","TCP","54","135 > 41760 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9174","4.143461","172.30.1.104","172.30.1.205","TCP","66","49671 > 34398 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9175","4.143470","172.30.1.205","172.30.1.104","TCP","54","34398 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9176","4.143501","172.30.1.104","172.30.1.205","TCP","54","135 > 41760 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9177","4.143507","172.30.1.205","172.30.1.104","TCP","54","41760 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9178","4.143864","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9179","4.144157","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9180","4.144166","172.30.1.205","172.30.1.104","TCP","54","34398 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9181","4.146055","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9182","4.146401","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9183","4.146408","172.30.1.205","172.30.1.104","TCP","54","34398 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9184","4.147746","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9185","4.149079","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9186","4.149089","172.30.1.205","172.30.1.104","TCP","54","34398 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9187","4.150024","172.30.1.205","172.30.1.104","TCP","74","41764 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907376 TSecr=0 WS=128" "9188","4.150366","172.30.1.104","172.30.1.205","TCP","66","135 > 41764 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9189","4.150376","172.30.1.205","172.30.1.104","TCP","54","41764 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9190","4.150723","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9191","4.151002","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9192","4.151011","172.30.1.205","172.30.1.104","TCP","54","41764 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9193","4.153214","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9194","4.153611","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9195","4.153618","172.30.1.205","172.30.1.104","TCP","54","41764 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9196","4.155416","172.30.1.205","172.30.1.104","TCP","54","41764 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9197","4.155525","172.30.1.205","172.30.1.104","TCP","74","34402 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907381 TSecr=0 WS=128" "9198","4.155697","172.30.1.104","172.30.1.205","TCP","54","135 > 41764 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9199","4.155703","172.30.1.104","172.30.1.205","TCP","54","135 > 41764 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9200","4.155708","172.30.1.205","172.30.1.104","TCP","54","41764 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9201","4.155811","172.30.1.104","172.30.1.205","TCP","66","49671 > 34402 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9202","4.155825","172.30.1.205","172.30.1.104","TCP","54","34402 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9203","4.156165","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9204","4.156447","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9205","4.156456","172.30.1.205","172.30.1.104","TCP","54","34402 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9206","4.158329","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9207","4.158703","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9208","4.158710","172.30.1.205","172.30.1.104","TCP","54","34402 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9209","4.160054","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9210","4.161340","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9211","4.161349","172.30.1.205","172.30.1.104","TCP","54","34402 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9212","4.162291","172.30.1.205","172.30.1.104","TCP","74","41768 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907388 TSecr=0 WS=128" "9213","4.162579","172.30.1.104","172.30.1.205","TCP","66","135 > 41768 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9214","4.162590","172.30.1.205","172.30.1.104","TCP","54","41768 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9215","4.162935","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9216","4.163224","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9217","4.163232","172.30.1.205","172.30.1.104","TCP","54","41768 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9218","4.165452","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9219","4.165817","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9220","4.165824","172.30.1.205","172.30.1.104","TCP","54","41768 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9221","4.167665","172.30.1.205","172.30.1.104","TCP","54","41768 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9222","4.167774","172.30.1.205","172.30.1.104","TCP","74","34406 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907394 TSecr=0 WS=128" "9223","4.167948","172.30.1.104","172.30.1.205","TCP","54","135 > 41768 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9224","4.167957","172.30.1.104","172.30.1.205","TCP","54","135 > 41768 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9225","4.167962","172.30.1.205","172.30.1.104","TCP","54","41768 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9226","4.168046","172.30.1.104","172.30.1.205","TCP","66","49671 > 34406 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9227","4.168054","172.30.1.205","172.30.1.104","TCP","54","34406 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9228","4.168423","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9229","4.168703","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9230","4.168712","172.30.1.205","172.30.1.104","TCP","54","34406 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9231","4.170591","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9232","4.170958","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9233","4.170964","172.30.1.205","172.30.1.104","TCP","54","34406 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9234","4.172364","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9235","4.173643","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9236","4.173652","172.30.1.205","172.30.1.104","TCP","54","34406 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9237","4.174617","172.30.1.205","172.30.1.104","TCP","74","41772 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907401 TSecr=0 WS=128" "9238","4.174898","172.30.1.104","172.30.1.205","TCP","66","135 > 41772 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9239","4.174908","172.30.1.205","172.30.1.104","TCP","54","41772 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9240","4.175259","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9241","4.175540","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9242","4.175549","172.30.1.205","172.30.1.104","TCP","54","41772 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9243","4.177743","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9244","4.178099","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9245","4.178106","172.30.1.205","172.30.1.104","TCP","54","41772 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9246","4.179899","172.30.1.205","172.30.1.104","TCP","54","41772 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9247","4.180009","172.30.1.205","172.30.1.104","TCP","74","34410 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907406 TSecr=0 WS=128" "9248","4.180192","172.30.1.104","172.30.1.205","TCP","54","135 > 41772 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9249","4.180202","172.30.1.104","172.30.1.205","TCP","54","135 > 41772 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9250","4.180208","172.30.1.205","172.30.1.104","TCP","54","41772 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9251","4.180293","172.30.1.104","172.30.1.205","TCP","66","49671 > 34410 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9252","4.180302","172.30.1.205","172.30.1.104","TCP","54","34410 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9253","4.180677","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9254","4.180973","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9255","4.180982","172.30.1.205","172.30.1.104","TCP","54","34410 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9256","4.182846","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9257","4.183210","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9258","4.183220","172.30.1.205","172.30.1.104","TCP","54","34410 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9259","4.184670","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9260","4.185924","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9261","4.185943","172.30.1.205","172.30.1.104","TCP","54","34410 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9262","4.186968","172.30.1.205","172.30.1.104","TCP","74","41776 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907413 TSecr=0 WS=128" "9263","4.187277","172.30.1.104","172.30.1.205","TCP","66","135 > 41776 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9264","4.187293","172.30.1.205","172.30.1.104","TCP","54","41776 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9265","4.187642","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9266","4.187953","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9267","4.187962","172.30.1.205","172.30.1.104","TCP","54","41776 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9268","4.190181","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9269","4.190567","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9270","4.190574","172.30.1.205","172.30.1.104","TCP","54","41776 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9271","4.192383","172.30.1.205","172.30.1.104","TCP","54","41776 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9272","4.192498","172.30.1.205","172.30.1.104","TCP","74","34414 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907418 TSecr=0 WS=128" "9273","4.192650","172.30.1.104","172.30.1.205","TCP","54","135 > 41776 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9274","4.192681","172.30.1.104","172.30.1.205","TCP","54","135 > 41776 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9275","4.192687","172.30.1.205","172.30.1.104","TCP","54","41776 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9276","4.192769","172.30.1.104","172.30.1.205","TCP","66","49671 > 34414 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9277","4.192788","172.30.1.205","172.30.1.104","TCP","54","34414 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9278","4.193145","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9279","4.193426","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9280","4.193435","172.30.1.205","172.30.1.104","TCP","54","34414 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9281","4.195311","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9282","4.195691","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9283","4.195697","172.30.1.205","172.30.1.104","TCP","54","34414 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9284","4.197082","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9285","4.198322","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9286","4.198332","172.30.1.205","172.30.1.104","TCP","54","34414 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9287","4.199262","172.30.1.205","172.30.1.104","TCP","74","41780 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907425 TSecr=0 WS=128" "9288","4.199570","172.30.1.104","172.30.1.205","TCP","66","135 > 41780 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9289","4.199580","172.30.1.205","172.30.1.104","TCP","54","41780 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9290","4.199928","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9291","4.200273","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9292","4.200283","172.30.1.205","172.30.1.104","TCP","54","41780 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9293","4.202510","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9294","4.202887","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9295","4.202894","172.30.1.205","172.30.1.104","TCP","54","41780 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9296","4.204702","172.30.1.205","172.30.1.104","TCP","54","41780 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9297","4.204836","172.30.1.205","172.30.1.104","TCP","74","34418 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907431 TSecr=0 WS=128" "9298","4.204969","172.30.1.104","172.30.1.205","TCP","54","135 > 41780 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9299","4.205003","172.30.1.104","172.30.1.205","TCP","54","135 > 41780 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9300","4.205009","172.30.1.205","172.30.1.104","TCP","54","41780 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9301","4.205124","172.30.1.104","172.30.1.205","TCP","66","49671 > 34418 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9302","4.205133","172.30.1.205","172.30.1.104","TCP","54","34418 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9303","4.205480","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9304","4.205775","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9305","4.205781","172.30.1.205","172.30.1.104","TCP","54","34418 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9306","4.207659","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9307","4.208048","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9308","4.208054","172.30.1.205","172.30.1.104","TCP","54","34418 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9309","4.209439","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9310","4.210765","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9311","4.210787","172.30.1.205","172.30.1.104","TCP","54","34418 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9312","4.211724","172.30.1.205","172.30.1.104","TCP","74","41784 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907438 TSecr=0 WS=128" "9313","4.212005","172.30.1.104","172.30.1.205","TCP","66","135 > 41784 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9314","4.212016","172.30.1.205","172.30.1.104","TCP","54","41784 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9315","4.212366","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9316","4.212667","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9317","4.212676","172.30.1.205","172.30.1.104","TCP","54","41784 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9318","4.214905","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9319","4.215310","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9320","4.215317","172.30.1.205","172.30.1.104","TCP","54","41784 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9321","4.217167","172.30.1.205","172.30.1.104","TCP","54","41784 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9322","4.217278","172.30.1.205","172.30.1.104","TCP","74","34422 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907443 TSecr=0 WS=128" "9323","4.217443","172.30.1.104","172.30.1.205","TCP","54","135 > 41784 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9324","4.217460","172.30.1.104","172.30.1.205","TCP","54","135 > 41784 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9325","4.217466","172.30.1.205","172.30.1.104","TCP","54","41784 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9326","4.217558","172.30.1.104","172.30.1.205","TCP","66","49671 > 34422 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9327","4.217567","172.30.1.205","172.30.1.104","TCP","54","34422 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9328","4.217916","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9329","4.218221","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9330","4.218230","172.30.1.205","172.30.1.104","TCP","54","34422 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9331","4.220078","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9332","4.220554","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9333","4.220560","172.30.1.205","172.30.1.104","TCP","54","34422 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9334","4.221941","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9335","4.223268","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9336","4.223283","172.30.1.205","172.30.1.104","TCP","54","34422 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9337","4.224211","172.30.1.205","172.30.1.104","TCP","74","41788 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907450 TSecr=0 WS=128" "9338","4.224506","172.30.1.104","172.30.1.205","TCP","66","135 > 41788 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9339","4.224517","172.30.1.205","172.30.1.104","TCP","54","41788 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9340","4.224891","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9341","4.225173","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9342","4.225182","172.30.1.205","172.30.1.104","TCP","54","41788 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9343","4.227341","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9344","4.227748","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9345","4.227755","172.30.1.205","172.30.1.104","TCP","54","41788 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9346","4.229582","172.30.1.205","172.30.1.104","TCP","54","41788 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9347","4.229692","172.30.1.205","172.30.1.104","TCP","74","34426 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907456 TSecr=0 WS=128" "9348","4.229853","172.30.1.104","172.30.1.205","TCP","54","135 > 41788 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9349","4.229892","172.30.1.104","172.30.1.205","TCP","54","135 > 41788 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9350","4.229898","172.30.1.205","172.30.1.104","TCP","54","41788 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9351","4.229983","172.30.1.104","172.30.1.205","TCP","66","49671 > 34426 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9352","4.229991","172.30.1.205","172.30.1.104","TCP","54","34426 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9353","4.230332","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9354","4.230613","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9355","4.230623","172.30.1.205","172.30.1.104","TCP","54","34426 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9356","4.232464","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9357","4.233188","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9358","4.233196","172.30.1.205","172.30.1.104","TCP","54","34426 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9359","4.234553","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9360","4.235914","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9361","4.235924","172.30.1.205","172.30.1.104","TCP","54","34426 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9362","4.236878","172.30.1.205","172.30.1.104","TCP","74","41792 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907463 TSecr=0 WS=128" "9363","4.237180","172.30.1.104","172.30.1.205","TCP","66","135 > 41792 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9364","4.237190","172.30.1.205","172.30.1.104","TCP","54","41792 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9365","4.237538","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9366","4.237834","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9367","4.237843","172.30.1.205","172.30.1.104","TCP","54","41792 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9368","4.240004","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9369","4.240384","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9370","4.240391","172.30.1.205","172.30.1.104","TCP","54","41792 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9371","4.242208","172.30.1.205","172.30.1.104","TCP","54","41792 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9372","4.242319","172.30.1.205","172.30.1.104","TCP","74","34430 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907468 TSecr=0 WS=128" "9373","4.242467","172.30.1.104","172.30.1.205","TCP","54","135 > 41792 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9374","4.242510","172.30.1.104","172.30.1.205","TCP","54","135 > 41792 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9375","4.242515","172.30.1.205","172.30.1.104","TCP","54","41792 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9376","4.242599","172.30.1.104","172.30.1.205","TCP","66","49671 > 34430 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9377","4.242608","172.30.1.205","172.30.1.104","TCP","54","34430 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9378","4.242950","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9379","4.243252","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9380","4.243262","172.30.1.205","172.30.1.104","TCP","54","34430 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9381","4.245156","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9382","4.246009","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9383","4.246016","172.30.1.205","172.30.1.104","TCP","54","34430 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9384","4.247347","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9385","4.248657","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9386","4.248667","172.30.1.205","172.30.1.104","TCP","54","34430 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9387","4.249614","172.30.1.205","172.30.1.104","TCP","74","41796 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907476 TSecr=0 WS=128" "9388","4.249899","172.30.1.104","172.30.1.205","TCP","66","135 > 41796 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9389","4.249910","172.30.1.205","172.30.1.104","TCP","54","41796 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9390","4.250259","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9391","4.250527","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9392","4.250537","172.30.1.205","172.30.1.104","TCP","54","41796 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9393","4.252728","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9394","4.253083","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9395","4.253090","172.30.1.205","172.30.1.104","TCP","54","41796 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9396","4.254890","172.30.1.205","172.30.1.104","TCP","54","41796 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9397","4.255001","172.30.1.205","172.30.1.104","TCP","74","34434 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907481 TSecr=0 WS=128" "9398","4.255203","172.30.1.104","172.30.1.205","TCP","54","135 > 41796 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9399","4.255224","172.30.1.104","172.30.1.205","TCP","54","135 > 41796 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9400","4.255230","172.30.1.205","172.30.1.104","TCP","54","41796 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9401","4.255301","172.30.1.104","172.30.1.205","TCP","66","49671 > 34434 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9402","4.255309","172.30.1.205","172.30.1.104","TCP","54","34434 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9403","4.255655","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9404","4.255938","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9405","4.255947","172.30.1.205","172.30.1.104","TCP","54","34434 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9406","4.257909","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9407","4.258270","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9408","4.258276","172.30.1.205","172.30.1.104","TCP","54","34434 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9409","4.259608","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9410","4.260851","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9411","4.260861","172.30.1.205","172.30.1.104","TCP","54","34434 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9412","4.261795","172.30.1.205","172.30.1.104","TCP","74","41800 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907488 TSecr=0 WS=128" "9413","4.262082","172.30.1.104","172.30.1.205","TCP","66","135 > 41800 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9414","4.262093","172.30.1.205","172.30.1.104","TCP","54","41800 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9415","4.262439","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9416","4.262726","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9417","4.262738","172.30.1.205","172.30.1.104","TCP","54","41800 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9418","4.264960","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9419","4.265398","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9420","4.265404","172.30.1.205","172.30.1.104","TCP","54","41800 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9421","4.267201","172.30.1.205","172.30.1.104","TCP","54","41800 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9422","4.267319","172.30.1.205","172.30.1.104","TCP","74","34438 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907493 TSecr=0 WS=128" "9423","4.267473","172.30.1.104","172.30.1.205","TCP","54","135 > 41800 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9424","4.267492","172.30.1.104","172.30.1.205","TCP","54","135 > 41800 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9425","4.267497","172.30.1.205","172.30.1.104","TCP","54","41800 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9426","4.267591","172.30.1.104","172.30.1.205","TCP","66","49671 > 34438 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9427","4.267599","172.30.1.205","172.30.1.104","TCP","54","34438 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9428","4.267951","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9429","4.268209","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9430","4.268218","172.30.1.205","172.30.1.104","TCP","54","34438 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9431","4.270112","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9432","4.270462","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9433","4.270468","172.30.1.205","172.30.1.104","TCP","54","34438 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9434","4.271800","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9435","4.274086","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9436","4.274096","172.30.1.205","172.30.1.104","TCP","54","34438 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9437","4.275033","172.30.1.205","172.30.1.104","TCP","74","41804 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907501 TSecr=0 WS=128" "9438","4.275366","172.30.1.104","172.30.1.205","TCP","66","135 > 41804 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9439","4.275377","172.30.1.205","172.30.1.104","TCP","54","41804 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9440","4.275723","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9441","4.276013","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9442","4.276022","172.30.1.205","172.30.1.104","TCP","54","41804 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9443","4.278210","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9444","4.278601","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9445","4.278607","172.30.1.205","172.30.1.104","TCP","54","41804 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9446","4.279456","172.30.1.205","172.30.1.104","TCP","54","34398 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9447","4.279504","172.30.1.205","172.30.1.104","TCP","54","34402 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9448","4.279541","172.30.1.205","172.30.1.104","TCP","54","34406 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9449","4.279575","172.30.1.205","172.30.1.104","TCP","54","34410 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9450","4.279607","172.30.1.205","172.30.1.104","TCP","54","34414 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9451","4.279639","172.30.1.205","172.30.1.104","TCP","54","34418 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9452","4.279667","172.30.1.205","172.30.1.104","TCP","54","34422 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9453","4.279694","172.30.1.205","172.30.1.104","TCP","54","34426 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9454","4.279721","172.30.1.205","172.30.1.104","TCP","54","34430 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9455","4.279742","172.30.1.205","172.30.1.104","TCP","54","34434 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9456","4.279763","172.30.1.205","172.30.1.104","TCP","54","34438 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9457","4.279770","172.30.1.104","172.30.1.205","TCP","54","49671 > 34398 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9458","4.279788","172.30.1.104","172.30.1.205","TCP","54","49671 > 34402 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9459","4.279870","172.30.1.205","172.30.1.104","TCP","54","34394 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9460","4.279909","172.30.1.104","172.30.1.205","TCP","54","49671 > 34398 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9461","4.279916","172.30.1.205","172.30.1.104","TCP","54","34398 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9462","4.279928","172.30.1.104","172.30.1.205","TCP","54","49671 > 34406 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9463","4.279961","172.30.1.104","172.30.1.205","TCP","54","49671 > 34402 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9464","4.279966","172.30.1.205","172.30.1.104","TCP","54","34402 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9465","4.279980","172.30.1.104","172.30.1.205","TCP","54","49671 > 34406 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9466","4.279983","172.30.1.205","172.30.1.104","TCP","54","34406 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9467","4.279998","172.30.1.104","172.30.1.205","TCP","54","49671 > 34410 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9468","4.280017","172.30.1.104","172.30.1.205","TCP","54","49671 > 34414 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9469","4.280118","172.30.1.104","172.30.1.205","TCP","54","49671 > 34418 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9470","4.280138","172.30.1.104","172.30.1.205","TCP","54","49671 > 34410 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9471","4.280143","172.30.1.205","172.30.1.104","TCP","54","34410 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9472","4.280156","172.30.1.104","172.30.1.205","TCP","54","49671 > 34414 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9473","4.280159","172.30.1.205","172.30.1.104","TCP","54","34414 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9474","4.280178","172.30.1.104","172.30.1.205","TCP","54","49671 > 34418 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9475","4.280182","172.30.1.205","172.30.1.104","TCP","54","34418 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9476","4.280197","172.30.1.104","172.30.1.205","TCP","54","49671 > 34422 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9477","4.280215","172.30.1.104","172.30.1.205","TCP","54","49671 > 34426 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9478","4.280234","172.30.1.104","172.30.1.205","TCP","54","49671 > 34430 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9479","4.280253","172.30.1.104","172.30.1.205","TCP","54","49671 > 34422 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9480","4.280257","172.30.1.205","172.30.1.104","TCP","54","34422 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9481","4.280273","172.30.1.104","172.30.1.205","TCP","54","49671 > 34434 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9482","4.280432","172.30.1.104","172.30.1.205","TCP","54","49671 > 34438 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9483","4.280451","172.30.1.104","172.30.1.205","TCP","54","49671 > 34438 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9484","4.280456","172.30.1.205","172.30.1.104","TCP","54","34438 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9485","4.280471","172.30.1.104","172.30.1.205","TCP","54","49671 > 34434 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9486","4.280474","172.30.1.205","172.30.1.104","TCP","54","34434 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9487","4.280494","172.30.1.104","172.30.1.205","TCP","54","49671 > 34426 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9488","4.280496","172.30.1.205","172.30.1.104","TCP","54","34426 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9489","4.280514","172.30.1.104","172.30.1.205","TCP","54","49671 > 34430 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9490","4.280517","172.30.1.205","172.30.1.104","TCP","54","34430 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9491","4.280535","172.30.1.104","172.30.1.205","TCP","54","49671 > 34394 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9492","4.280643","172.30.1.104","172.30.1.205","TCP","54","49671 > 34394 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9493","4.280647","172.30.1.205","172.30.1.104","TCP","54","34394 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9494","4.281445","172.30.1.205","172.30.1.104","TCP","54","41804 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9495","4.281554","172.30.1.205","172.30.1.104","TCP","74","34442 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907507 TSecr=0 WS=128" "9496","4.281699","172.30.1.104","172.30.1.205","TCP","54","135 > 41804 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9497","4.281713","172.30.1.104","172.30.1.205","TCP","54","135 > 41804 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9498","4.281718","172.30.1.205","172.30.1.104","TCP","54","41804 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9499","4.281815","172.30.1.104","172.30.1.205","TCP","66","49671 > 34442 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9500","4.281823","172.30.1.205","172.30.1.104","TCP","54","34442 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9501","4.282172","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9502","4.282449","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9503","4.282458","172.30.1.205","172.30.1.104","TCP","54","34442 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9504","4.284389","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9505","4.284765","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9506","4.284771","172.30.1.205","172.30.1.104","TCP","54","34442 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9507","4.286151","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9508","4.287426","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9509","4.287435","172.30.1.205","172.30.1.104","TCP","54","34442 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9510","4.288381","172.30.1.205","172.30.1.104","TCP","74","41808 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907514 TSecr=0 WS=128" "9511","4.288665","172.30.1.104","172.30.1.205","TCP","66","135 > 41808 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9512","4.288676","172.30.1.205","172.30.1.104","TCP","54","41808 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9513","4.289062","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9514","4.289353","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9515","4.289362","172.30.1.205","172.30.1.104","TCP","54","41808 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9516","4.291530","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9517","4.291899","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9518","4.291906","172.30.1.205","172.30.1.104","TCP","54","41808 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9519","4.293740","172.30.1.205","172.30.1.104","TCP","54","41808 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9520","4.293857","172.30.1.205","172.30.1.104","TCP","74","34446 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907520 TSecr=0 WS=128" "9521","4.293995","172.30.1.104","172.30.1.205","TCP","54","135 > 41808 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9522","4.294037","172.30.1.104","172.30.1.205","TCP","54","135 > 41808 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9523","4.294042","172.30.1.205","172.30.1.104","TCP","54","41808 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9524","4.294117","172.30.1.104","172.30.1.205","TCP","66","49671 > 34446 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9525","4.294126","172.30.1.205","172.30.1.104","TCP","54","34446 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9526","4.294468","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9527","4.295279","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9528","4.295286","172.30.1.205","172.30.1.104","TCP","54","34446 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9529","4.297163","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9530","4.298794","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9531","4.298801","172.30.1.205","172.30.1.104","TCP","54","34446 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9532","4.300156","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9533","4.301456","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9534","4.301465","172.30.1.205","172.30.1.104","TCP","54","34446 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9535","4.302398","172.30.1.205","172.30.1.104","TCP","74","41812 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907528 TSecr=0 WS=128" "9536","4.302677","172.30.1.104","172.30.1.205","TCP","66","135 > 41812 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9537","4.302688","172.30.1.205","172.30.1.104","TCP","54","41812 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9538","4.303035","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9539","4.303342","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9540","4.303351","172.30.1.205","172.30.1.104","TCP","54","41812 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9541","4.305542","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9542","4.305933","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9543","4.305940","172.30.1.205","172.30.1.104","TCP","54","41812 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9544","4.307738","172.30.1.205","172.30.1.104","TCP","54","41812 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9545","4.307848","172.30.1.205","172.30.1.104","TCP","74","34450 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907534 TSecr=0 WS=128" "9546","4.307999","172.30.1.104","172.30.1.205","TCP","54","135 > 41812 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9547","4.308035","172.30.1.104","172.30.1.205","TCP","54","135 > 41812 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9548","4.308040","172.30.1.205","172.30.1.104","TCP","54","41812 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9549","4.308121","172.30.1.104","172.30.1.205","TCP","66","49671 > 34450 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9550","4.308130","172.30.1.205","172.30.1.104","TCP","54","34450 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9551","4.308478","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9552","4.308784","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9553","4.308792","172.30.1.205","172.30.1.104","TCP","54","34450 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9554","4.310671","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9555","4.311041","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9556","4.311047","172.30.1.205","172.30.1.104","TCP","54","34450 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9557","4.312406","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9558","4.313712","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9559","4.313722","172.30.1.205","172.30.1.104","TCP","54","34450 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9560","4.314659","172.30.1.205","172.30.1.104","TCP","74","41816 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907541 TSecr=0 WS=128" "9561","4.314995","172.30.1.104","172.30.1.205","TCP","66","135 > 41816 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9562","4.315005","172.30.1.205","172.30.1.104","TCP","54","41816 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9563","4.315348","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9564","4.315650","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9565","4.315671","172.30.1.205","172.30.1.104","TCP","54","41816 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9566","4.318107","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9567","4.318498","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9568","4.318504","172.30.1.205","172.30.1.104","TCP","54","41816 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9569","4.320328","172.30.1.205","172.30.1.104","TCP","54","41816 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9570","4.320441","172.30.1.205","172.30.1.104","TCP","74","34454 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907546 TSecr=0 WS=128" "9571","4.320597","172.30.1.104","172.30.1.205","TCP","54","135 > 41816 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9572","4.320608","172.30.1.104","172.30.1.205","TCP","54","135 > 41816 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9573","4.320613","172.30.1.205","172.30.1.104","TCP","54","41816 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9574","4.320728","172.30.1.104","172.30.1.205","TCP","66","49671 > 34454 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9575","4.320737","172.30.1.205","172.30.1.104","TCP","54","34454 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9576","4.321100","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9577","4.321379","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9578","4.321387","172.30.1.205","172.30.1.104","TCP","54","34454 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9579","4.323251","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9580","4.323616","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9581","4.323623","172.30.1.205","172.30.1.104","TCP","54","34454 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9582","4.324990","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9583","4.326263","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9584","4.326275","172.30.1.205","172.30.1.104","TCP","54","34454 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9585","4.327216","172.30.1.205","172.30.1.104","TCP","74","41820 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907553 TSecr=0 WS=128" "9586","4.327533","172.30.1.104","172.30.1.205","TCP","66","135 > 41820 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9587","4.327543","172.30.1.205","172.30.1.104","TCP","54","41820 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9588","4.327890","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9589","4.328161","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9590","4.328171","172.30.1.205","172.30.1.104","TCP","54","41820 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9591","4.330386","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9592","4.330776","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9593","4.330783","172.30.1.205","172.30.1.104","TCP","54","41820 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9594","4.332630","172.30.1.205","172.30.1.104","TCP","54","41820 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9595","4.332740","172.30.1.205","172.30.1.104","TCP","74","34458 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907559 TSecr=0 WS=128" "9596","4.332902","172.30.1.104","172.30.1.205","TCP","54","135 > 41820 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9597","4.332940","172.30.1.104","172.30.1.205","TCP","54","135 > 41820 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9598","4.332958","172.30.1.205","172.30.1.104","TCP","54","41820 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9599","4.333023","172.30.1.104","172.30.1.205","TCP","66","49671 > 34458 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9600","4.333032","172.30.1.205","172.30.1.104","TCP","54","34458 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9601","4.333383","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9602","4.333671","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9603","4.333677","172.30.1.205","172.30.1.104","TCP","54","34458 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9604","4.335525","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9605","4.335897","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9606","4.335903","172.30.1.205","172.30.1.104","TCP","54","34458 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9607","4.337276","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9608","4.338553","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9609","4.338563","172.30.1.205","172.30.1.104","TCP","54","34458 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9610","4.339491","172.30.1.205","172.30.1.104","TCP","74","41824 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907565 TSecr=0 WS=128" "9611","4.339816","172.30.1.104","172.30.1.205","TCP","66","135 > 41824 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9612","4.339827","172.30.1.205","172.30.1.104","TCP","54","41824 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9613","4.340172","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9614","4.340456","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9615","4.340465","172.30.1.205","172.30.1.104","TCP","54","41824 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9616","4.342653","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9617","4.343031","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9618","4.343038","172.30.1.205","172.30.1.104","TCP","54","41824 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9619","4.344861","172.30.1.205","172.30.1.104","TCP","54","41824 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9620","4.344971","172.30.1.205","172.30.1.104","TCP","74","34462 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907571 TSecr=0 WS=128" "9621","4.345121","172.30.1.104","172.30.1.205","TCP","54","135 > 41824 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9622","4.345156","172.30.1.104","172.30.1.205","TCP","54","135 > 41824 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9623","4.345162","172.30.1.205","172.30.1.104","TCP","54","41824 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9624","4.345260","172.30.1.104","172.30.1.205","TCP","66","49671 > 34462 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9625","4.345268","172.30.1.205","172.30.1.104","TCP","54","34462 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9626","4.345617","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9627","4.345893","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9628","4.345902","172.30.1.205","172.30.1.104","TCP","54","34462 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9629","4.347747","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9630","4.348125","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9631","4.348132","172.30.1.205","172.30.1.104","TCP","54","34462 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9632","4.349512","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9633","4.350851","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9634","4.350860","172.30.1.205","172.30.1.104","TCP","54","34462 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9635","4.351790","172.30.1.205","172.30.1.104","TCP","74","41828 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907578 TSecr=0 WS=128" "9636","4.352077","172.30.1.104","172.30.1.205","TCP","66","135 > 41828 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9637","4.352087","172.30.1.205","172.30.1.104","TCP","54","41828 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9638","4.352440","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9639","4.352732","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9640","4.352741","172.30.1.205","172.30.1.104","TCP","54","41828 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9641","4.354953","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9642","4.355486","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9643","4.355492","172.30.1.205","172.30.1.104","TCP","54","41828 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9644","4.357330","172.30.1.205","172.30.1.104","TCP","54","41828 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9645","4.357440","172.30.1.205","172.30.1.104","TCP","74","34466 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907583 TSecr=0 WS=128" "9646","4.357583","172.30.1.104","172.30.1.205","TCP","54","135 > 41828 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9647","4.357599","172.30.1.104","172.30.1.205","TCP","54","135 > 41828 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9648","4.357605","172.30.1.205","172.30.1.104","TCP","54","41828 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9649","4.357704","172.30.1.104","172.30.1.205","TCP","66","49671 > 34466 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9650","4.357713","172.30.1.205","172.30.1.104","TCP","54","34466 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9651","4.358058","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9652","4.358348","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9653","4.358357","172.30.1.205","172.30.1.104","TCP","54","34466 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9654","4.360242","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9655","4.360648","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9656","4.360655","172.30.1.205","172.30.1.104","TCP","54","34466 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9657","4.362051","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9658","4.363326","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9659","4.363336","172.30.1.205","172.30.1.104","TCP","54","34466 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9660","4.364272","172.30.1.205","172.30.1.104","TCP","74","41832 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907590 TSecr=0 WS=128" "9661","4.364567","172.30.1.104","172.30.1.205","TCP","66","135 > 41832 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9662","4.364578","172.30.1.205","172.30.1.104","TCP","54","41832 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9663","4.364958","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9664","4.365261","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9665","4.365270","172.30.1.205","172.30.1.104","TCP","54","41832 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9666","4.367454","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9667","4.367855","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9668","4.367867","172.30.1.205","172.30.1.104","TCP","54","41832 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9669","4.369868","172.30.1.205","172.30.1.104","TCP","54","41832 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9670","4.369979","172.30.1.205","172.30.1.104","TCP","74","34470 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907596 TSecr=0 WS=128" "9671","4.370153","172.30.1.104","172.30.1.205","TCP","54","135 > 41832 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9672","4.370240","172.30.1.104","172.30.1.205","TCP","54","135 > 41832 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9673","4.370246","172.30.1.205","172.30.1.104","TCP","54","41832 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9674","4.370298","172.30.1.104","172.30.1.205","TCP","66","49671 > 34470 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9675","4.370306","172.30.1.205","172.30.1.104","TCP","54","34470 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9676","4.370662","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9677","4.371097","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9678","4.371105","172.30.1.205","172.30.1.104","TCP","54","34470 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9679","4.372976","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9680","4.373322","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9681","4.373329","172.30.1.205","172.30.1.104","TCP","54","34470 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9682","4.374678","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9683","4.375969","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9684","4.375978","172.30.1.205","172.30.1.104","TCP","54","34470 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9685","4.376935","172.30.1.205","172.30.1.104","TCP","74","41836 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907603 TSecr=0 WS=128" "9686","4.377264","172.30.1.104","172.30.1.205","TCP","66","135 > 41836 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9687","4.377275","172.30.1.205","172.30.1.104","TCP","54","41836 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9688","4.377623","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9689","4.377896","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9690","4.377905","172.30.1.205","172.30.1.104","TCP","54","41836 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9691","4.380058","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9692","4.380403","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9693","4.380410","172.30.1.205","172.30.1.104","TCP","54","41836 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9694","4.382223","172.30.1.205","172.30.1.104","TCP","54","41836 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9695","4.382334","172.30.1.205","172.30.1.104","TCP","74","34474 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907608 TSecr=0 WS=128" "9696","4.382474","172.30.1.104","172.30.1.205","TCP","54","135 > 41836 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9697","4.382484","172.30.1.104","172.30.1.205","TCP","54","135 > 41836 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9698","4.382489","172.30.1.205","172.30.1.104","TCP","54","41836 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9699","4.382588","172.30.1.104","172.30.1.205","TCP","66","49671 > 34474 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9700","4.382596","172.30.1.205","172.30.1.104","TCP","54","34474 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9701","4.382937","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9702","4.383205","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9703","4.383214","172.30.1.205","172.30.1.104","TCP","54","34474 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9704","4.385144","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9705","4.385482","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9706","4.385488","172.30.1.205","172.30.1.104","TCP","54","34474 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9707","4.386814","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9708","4.388178","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9709","4.388189","172.30.1.205","172.30.1.104","TCP","54","34474 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9710","4.389165","172.30.1.205","172.30.1.104","TCP","74","41840 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907615 TSecr=0 WS=128" "9711","4.389457","172.30.1.104","172.30.1.205","TCP","66","135 > 41840 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9712","4.389467","172.30.1.205","172.30.1.104","TCP","54","41840 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9713","4.389818","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9714","4.390126","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9715","4.390135","172.30.1.205","172.30.1.104","TCP","54","41840 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9716","4.392374","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9717","4.392759","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9718","4.392766","172.30.1.205","172.30.1.104","TCP","54","41840 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9719","4.394573","172.30.1.205","172.30.1.104","TCP","54","41840 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9720","4.394685","172.30.1.205","172.30.1.104","TCP","74","34478 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907621 TSecr=0 WS=128" "9721","4.394848","172.30.1.104","172.30.1.205","TCP","54","135 > 41840 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9722","4.394857","172.30.1.104","172.30.1.205","TCP","54","135 > 41840 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9723","4.394863","172.30.1.205","172.30.1.104","TCP","54","41840 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9724","4.394951","172.30.1.104","172.30.1.205","TCP","66","49671 > 34478 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9725","4.394959","172.30.1.205","172.30.1.104","TCP","54","34478 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9726","4.395306","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9727","4.395590","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9728","4.395599","172.30.1.205","172.30.1.104","TCP","54","34478 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9729","4.397484","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9730","4.397860","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9731","4.397866","172.30.1.205","172.30.1.104","TCP","54","34478 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9732","4.399199","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9733","4.400468","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9734","4.400477","172.30.1.205","172.30.1.104","TCP","54","34478 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9735","4.401423","172.30.1.205","172.30.1.104","TCP","74","41844 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907627 TSecr=0 WS=128" "9736","4.401742","172.30.1.104","172.30.1.205","TCP","66","135 > 41844 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9737","4.401757","172.30.1.205","172.30.1.104","TCP","54","41844 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9738","4.402106","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9739","4.402450","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9740","4.402459","172.30.1.205","172.30.1.104","TCP","54","41844 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9741","4.404633","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9742","4.405036","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9743","4.405043","172.30.1.205","172.30.1.104","TCP","54","41844 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9744","4.406855","172.30.1.205","172.30.1.104","TCP","54","41844 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9745","4.406975","172.30.1.205","172.30.1.104","TCP","74","34482 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907633 TSecr=0 WS=128" "9746","4.407127","172.30.1.104","172.30.1.205","TCP","54","135 > 41844 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9747","4.407173","172.30.1.104","172.30.1.205","TCP","54","135 > 41844 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9748","4.407178","172.30.1.205","172.30.1.104","TCP","54","41844 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9749","4.407332","172.30.1.104","172.30.1.205","TCP","66","49671 > 34482 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9750","4.407340","172.30.1.205","172.30.1.104","TCP","54","34482 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9751","4.407686","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9752","4.408463","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9753","4.408470","172.30.1.205","172.30.1.104","TCP","54","34482 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9754","4.410354","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9755","4.410802","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9756","4.410809","172.30.1.205","172.30.1.104","TCP","54","34482 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9757","4.412137","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9758","4.413432","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9759","4.413441","172.30.1.205","172.30.1.104","TCP","54","34482 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9760","4.414402","172.30.1.205","172.30.1.104","TCP","74","41848 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907640 TSecr=0 WS=128" "9761","4.414710","172.30.1.104","172.30.1.205","TCP","66","135 > 41848 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9762","4.414721","172.30.1.205","172.30.1.104","TCP","54","41848 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9763","4.415072","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9764","4.415369","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9765","4.415378","172.30.1.205","172.30.1.104","TCP","54","41848 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9766","4.417582","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9767","4.418019","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9768","4.418026","172.30.1.205","172.30.1.104","TCP","54","41848 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9769","4.419831","172.30.1.205","172.30.1.104","TCP","54","41848 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9770","4.419938","172.30.1.205","172.30.1.104","TCP","74","34486 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907646 TSecr=0 WS=128" "9771","4.420152","172.30.1.104","172.30.1.205","TCP","54","135 > 41848 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9772","4.420160","172.30.1.104","172.30.1.205","TCP","54","135 > 41848 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9773","4.420165","172.30.1.205","172.30.1.104","TCP","54","41848 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9774","4.420235","172.30.1.104","172.30.1.205","TCP","66","49671 > 34486 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9775","4.420243","172.30.1.205","172.30.1.104","TCP","54","34486 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9776","4.420588","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9777","4.423013","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9778","4.423023","172.30.1.205","172.30.1.104","TCP","54","34486 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9779","4.424921","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9780","4.425266","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9781","4.425272","172.30.1.205","172.30.1.104","TCP","54","34486 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9782","4.426664","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9783","4.429699","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9784","4.429709","172.30.1.205","172.30.1.104","TCP","54","34486 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9785","4.430653","172.30.1.205","172.30.1.104","TCP","74","41852 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907657 TSecr=0 WS=128" "9786","4.430940","172.30.1.104","172.30.1.205","TCP","66","135 > 41852 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9787","4.430951","172.30.1.205","172.30.1.104","TCP","54","41852 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9788","4.431304","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9789","4.431593","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9790","4.431602","172.30.1.205","172.30.1.104","TCP","54","41852 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9791","4.433802","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9792","4.434194","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9793","4.434201","172.30.1.205","172.30.1.104","TCP","54","41852 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9794","4.435036","172.30.1.205","172.30.1.104","TCP","54","34446 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9795","4.435083","172.30.1.205","172.30.1.104","TCP","54","34450 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9796","4.435120","172.30.1.205","172.30.1.104","TCP","54","34454 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9797","4.435153","172.30.1.205","172.30.1.104","TCP","54","34458 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9798","4.435187","172.30.1.205","172.30.1.104","TCP","54","34462 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9799","4.435214","172.30.1.205","172.30.1.104","TCP","54","34466 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9800","4.435246","172.30.1.205","172.30.1.104","TCP","54","34470 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9801","4.435273","172.30.1.205","172.30.1.104","TCP","54","34474 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9802","4.435295","172.30.1.205","172.30.1.104","TCP","54","34478 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9803","4.435316","172.30.1.205","172.30.1.104","TCP","54","34482 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9804","4.435333","172.30.1.104","172.30.1.205","TCP","54","49671 > 34446 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9805","4.435352","172.30.1.104","172.30.1.205","TCP","54","49671 > 34450 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9806","4.435372","172.30.1.104","172.30.1.205","TCP","54","49671 > 34446 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9807","4.435377","172.30.1.205","172.30.1.104","TCP","54","34446 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9808","4.435407","172.30.1.205","172.30.1.104","TCP","54","34486 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9809","4.435465","172.30.1.104","172.30.1.205","TCP","54","49671 > 34454 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9810","4.435479","172.30.1.104","172.30.1.205","TCP","54","49671 > 34458 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9811","4.435498","172.30.1.205","172.30.1.104","TCP","54","34442 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "9812","4.435500","172.30.1.104","172.30.1.205","TCP","54","49671 > 34458 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9813","4.435504","172.30.1.205","172.30.1.104","TCP","54","34458 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9814","4.435518","172.30.1.104","172.30.1.205","TCP","54","49671 > 34450 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9815","4.435521","172.30.1.205","172.30.1.104","TCP","54","34450 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9816","4.435545","172.30.1.104","172.30.1.205","TCP","54","49671 > 34454 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9817","4.435551","172.30.1.205","172.30.1.104","TCP","54","34454 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9818","4.435674","172.30.1.104","172.30.1.205","TCP","54","49671 > 34462 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9819","4.435693","172.30.1.104","172.30.1.205","TCP","54","49671 > 34466 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9820","4.435712","172.30.1.104","172.30.1.205","TCP","54","49671 > 34470 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9821","4.435732","172.30.1.104","172.30.1.205","TCP","54","49671 > 34470 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9822","4.435737","172.30.1.205","172.30.1.104","TCP","54","34470 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9823","4.435752","172.30.1.104","172.30.1.205","TCP","54","49671 > 34466 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9824","4.435754","172.30.1.205","172.30.1.104","TCP","54","34466 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9825","4.435771","172.30.1.104","172.30.1.205","TCP","54","49671 > 34462 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9826","4.435773","172.30.1.205","172.30.1.104","TCP","54","34462 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9827","4.435869","172.30.1.104","172.30.1.205","TCP","54","49671 > 34474 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9828","4.435886","172.30.1.104","172.30.1.205","TCP","54","49671 > 34478 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9829","4.435905","172.30.1.104","172.30.1.205","TCP","54","49671 > 34482 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9830","4.435923","172.30.1.104","172.30.1.205","TCP","54","49671 > 34482 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9831","4.435928","172.30.1.205","172.30.1.104","TCP","54","34482 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9832","4.435942","172.30.1.104","172.30.1.205","TCP","54","49671 > 34474 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9833","4.435945","172.30.1.205","172.30.1.104","TCP","54","34474 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9834","4.435960","172.30.1.104","172.30.1.205","TCP","54","49671 > 34478 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9835","4.435963","172.30.1.205","172.30.1.104","TCP","54","34478 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9836","4.435986","172.30.1.104","172.30.1.205","TCP","54","49671 > 34486 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9837","4.436003","172.30.1.104","172.30.1.205","TCP","54","49671 > 34442 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9838","4.436137","172.30.1.104","172.30.1.205","TCP","54","49671 > 34486 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9839","4.436142","172.30.1.205","172.30.1.104","TCP","54","34486 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9840","4.436149","172.30.1.104","172.30.1.205","TCP","54","49671 > 34442 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "9841","4.436150","172.30.1.205","172.30.1.104","TCP","54","34442 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "9842","4.437036","172.30.1.205","172.30.1.104","TCP","54","41852 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9843","4.437148","172.30.1.205","172.30.1.104","TCP","74","34490 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907663 TSecr=0 WS=128" "9844","4.437309","172.30.1.104","172.30.1.205","TCP","54","135 > 41852 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9845","4.437319","172.30.1.104","172.30.1.205","TCP","54","135 > 41852 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9846","4.437324","172.30.1.205","172.30.1.104","TCP","54","41852 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9847","4.437430","172.30.1.104","172.30.1.205","TCP","66","49671 > 34490 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9848","4.437439","172.30.1.205","172.30.1.104","TCP","54","34490 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9849","4.437800","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9850","4.438073","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9851","4.438081","172.30.1.205","172.30.1.104","TCP","54","34490 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9852","4.439948","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9853","4.440301","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9854","4.440307","172.30.1.205","172.30.1.104","TCP","54","34490 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9855","4.441706","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9856","4.443040","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9857","4.443049","172.30.1.205","172.30.1.104","TCP","54","34490 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9858","4.443972","172.30.1.205","172.30.1.104","TCP","74","41856 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907670 TSecr=0 WS=128" "9859","4.444269","172.30.1.104","172.30.1.205","TCP","66","135 > 41856 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9860","4.444280","172.30.1.205","172.30.1.104","TCP","54","41856 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9861","4.444633","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9862","4.444932","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9863","4.444941","172.30.1.205","172.30.1.104","TCP","54","41856 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9864","4.447120","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9865","4.447512","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9866","4.447518","172.30.1.205","172.30.1.104","TCP","54","41856 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9867","4.449347","172.30.1.205","172.30.1.104","TCP","54","41856 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9868","4.449461","172.30.1.205","172.30.1.104","TCP","74","34494 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907675 TSecr=0 WS=128" "9869","4.449641","172.30.1.104","172.30.1.205","TCP","54","135 > 41856 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9870","4.449652","172.30.1.104","172.30.1.205","TCP","54","135 > 41856 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9871","4.449657","172.30.1.205","172.30.1.104","TCP","54","41856 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9872","4.449728","172.30.1.104","172.30.1.205","TCP","66","49671 > 34494 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9873","4.449737","172.30.1.205","172.30.1.104","TCP","54","34494 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9874","4.450090","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9875","4.450428","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9876","4.450443","172.30.1.205","172.30.1.104","TCP","54","34494 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9877","4.452297","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9878","4.452655","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9879","4.452661","172.30.1.205","172.30.1.104","TCP","54","34494 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9880","4.454031","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9881","4.455381","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9882","4.455390","172.30.1.205","172.30.1.104","TCP","54","34494 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9883","4.456308","172.30.1.205","172.30.1.104","TCP","74","41860 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907682 TSecr=0 WS=128" "9884","4.456652","172.30.1.104","172.30.1.205","TCP","66","135 > 41860 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9885","4.456663","172.30.1.205","172.30.1.104","TCP","54","41860 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9886","4.457049","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9887","4.457343","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9888","4.457352","172.30.1.205","172.30.1.104","TCP","54","41860 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9889","4.459515","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9890","4.459904","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9891","4.459910","172.30.1.205","172.30.1.104","TCP","54","41860 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9892","4.461734","172.30.1.205","172.30.1.104","TCP","54","41860 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9893","4.461857","172.30.1.205","172.30.1.104","TCP","74","34498 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907688 TSecr=0 WS=128" "9894","4.462011","172.30.1.104","172.30.1.205","TCP","54","135 > 41860 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9895","4.462032","172.30.1.104","172.30.1.205","TCP","54","135 > 41860 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9896","4.462037","172.30.1.205","172.30.1.104","TCP","54","41860 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9897","4.462159","172.30.1.104","172.30.1.205","TCP","66","49671 > 34498 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9898","4.462168","172.30.1.205","172.30.1.104","TCP","54","34498 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9899","4.462512","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9900","4.462788","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9901","4.462797","172.30.1.205","172.30.1.104","TCP","54","34498 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9902","4.464639","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9903","4.465019","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9904","4.465026","172.30.1.205","172.30.1.104","TCP","54","34498 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9905","4.466380","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9906","4.467680","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9907","4.467689","172.30.1.205","172.30.1.104","TCP","54","34498 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9908","4.468624","172.30.1.205","172.30.1.104","TCP","74","41864 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907695 TSecr=0 WS=128" "9909","4.468930","172.30.1.104","172.30.1.205","TCP","66","135 > 41864 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9910","4.468941","172.30.1.205","172.30.1.104","TCP","54","41864 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9911","4.469293","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9912","4.469590","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9913","4.469599","172.30.1.205","172.30.1.104","TCP","54","41864 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9914","4.471764","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9915","4.472164","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9916","4.472171","172.30.1.205","172.30.1.104","TCP","54","41864 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9917","4.474003","172.30.1.205","172.30.1.104","TCP","54","41864 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9918","4.474115","172.30.1.205","172.30.1.104","TCP","74","34502 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907700 TSecr=0 WS=128" "9919","4.474258","172.30.1.104","172.30.1.205","TCP","54","135 > 41864 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9920","4.474281","172.30.1.104","172.30.1.205","TCP","54","135 > 41864 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9921","4.474286","172.30.1.205","172.30.1.104","TCP","54","41864 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9922","4.474405","172.30.1.104","172.30.1.205","TCP","66","49671 > 34502 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9923","4.474413","172.30.1.205","172.30.1.104","TCP","54","34502 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9924","4.474752","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9925","4.475038","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9926","4.475047","172.30.1.205","172.30.1.104","TCP","54","34502 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9927","4.476927","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9928","4.477327","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9929","4.477333","172.30.1.205","172.30.1.104","TCP","54","34502 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9930","4.478697","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9931","4.481379","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9932","4.481388","172.30.1.205","172.30.1.104","TCP","54","34502 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9933","4.482323","172.30.1.205","172.30.1.104","TCP","74","41868 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907708 TSecr=0 WS=128" "9934","4.482620","172.30.1.104","172.30.1.205","TCP","66","135 > 41868 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9935","4.482630","172.30.1.205","172.30.1.104","TCP","54","41868 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9936","4.483036","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9937","4.483326","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9938","4.483336","172.30.1.205","172.30.1.104","TCP","54","41868 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9939","4.485582","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9940","4.485985","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9941","4.485992","172.30.1.205","172.30.1.104","TCP","54","41868 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9942","4.487780","172.30.1.205","172.30.1.104","TCP","54","41868 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9943","4.487889","172.30.1.205","172.30.1.104","TCP","74","34506 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907714 TSecr=0 WS=128" "9944","4.488055","172.30.1.104","172.30.1.205","TCP","54","135 > 41868 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9945","4.488104","172.30.1.104","172.30.1.205","TCP","54","135 > 41868 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9946","4.488109","172.30.1.205","172.30.1.104","TCP","54","41868 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9947","4.488187","172.30.1.104","172.30.1.205","TCP","66","49671 > 34506 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9948","4.488195","172.30.1.205","172.30.1.104","TCP","54","34506 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9949","4.488542","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9950","4.488827","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9951","4.488836","172.30.1.205","172.30.1.104","TCP","54","34506 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9952","4.490703","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9953","4.491060","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9954","4.491067","172.30.1.205","172.30.1.104","TCP","54","34506 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9955","4.492430","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9956","4.493751","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9957","4.493761","172.30.1.205","172.30.1.104","TCP","54","34506 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9958","4.494686","172.30.1.205","172.30.1.104","TCP","74","41872 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907721 TSecr=0 WS=128" "9959","4.494996","172.30.1.104","172.30.1.205","TCP","66","135 > 41872 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9960","4.495007","172.30.1.205","172.30.1.104","TCP","54","41872 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9961","4.495352","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9962","4.495638","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9963","4.495647","172.30.1.205","172.30.1.104","TCP","54","41872 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9964","4.497867","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9965","4.498244","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9966","4.498251","172.30.1.205","172.30.1.104","TCP","54","41872 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9967","4.500223","172.30.1.205","172.30.1.104","TCP","54","41872 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9968","4.500342","172.30.1.205","172.30.1.104","TCP","74","34510 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907726 TSecr=0 WS=128" "9969","4.500559","172.30.1.104","172.30.1.205","TCP","54","135 > 41872 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9970","4.500568","172.30.1.104","172.30.1.205","TCP","54","135 > 41872 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9971","4.500573","172.30.1.205","172.30.1.104","TCP","54","41872 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9972","4.500624","172.30.1.104","172.30.1.205","TCP","66","49671 > 34510 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9973","4.500636","172.30.1.205","172.30.1.104","TCP","54","34510 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9974","4.501052","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "9975","4.501358","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9976","4.501367","172.30.1.205","172.30.1.104","TCP","54","34510 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9977","4.503373","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "9978","4.503756","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "9979","4.503775","172.30.1.205","172.30.1.104","TCP","54","34510 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "9980","4.505186","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "9981","4.506524","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "9982","4.506542","172.30.1.205","172.30.1.104","TCP","54","34510 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "9983","4.507523","172.30.1.205","172.30.1.104","TCP","74","41876 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907733 TSecr=0 WS=128" "9984","4.507847","172.30.1.104","172.30.1.205","TCP","66","135 > 41876 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9985","4.507858","172.30.1.205","172.30.1.104","TCP","54","41876 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9986","4.508231","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "9987","4.508561","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "9988","4.508570","172.30.1.205","172.30.1.104","TCP","54","41876 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "9989","4.510812","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "9990","4.511209","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "9991","4.511216","172.30.1.205","172.30.1.104","TCP","54","41876 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "9992","4.513045","172.30.1.205","172.30.1.104","TCP","54","41876 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "9993","4.513156","172.30.1.205","172.30.1.104","TCP","74","34514 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907739 TSecr=0 WS=128" "9994","4.513328","172.30.1.104","172.30.1.205","TCP","54","135 > 41876 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9995","4.513351","172.30.1.104","172.30.1.205","TCP","54","135 > 41876 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "9996","4.513357","172.30.1.205","172.30.1.104","TCP","54","41876 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "9997","4.513464","172.30.1.104","172.30.1.205","TCP","66","49671 > 34514 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "9998","4.513472","172.30.1.205","172.30.1.104","TCP","54","34514 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "9999","4.513825","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10000","4.514111","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10001","4.514123","172.30.1.205","172.30.1.104","TCP","54","34514 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10002","4.516099","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10003","4.516451","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10004","4.516458","172.30.1.205","172.30.1.104","TCP","54","34514 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10005","4.517863","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10006","4.519127","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10007","4.519139","172.30.1.205","172.30.1.104","TCP","54","34514 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10008","4.520106","172.30.1.205","172.30.1.104","TCP","74","41880 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907746 TSecr=0 WS=128" "10009","4.520407","172.30.1.104","172.30.1.205","TCP","66","135 > 41880 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10010","4.520418","172.30.1.205","172.30.1.104","TCP","54","41880 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10011","4.520771","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10012","4.521053","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10013","4.521063","172.30.1.205","172.30.1.104","TCP","54","41880 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10014","4.523259","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10015","4.523629","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10016","4.523635","172.30.1.205","172.30.1.104","TCP","54","41880 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10017","4.525489","172.30.1.205","172.30.1.104","TCP","54","41880 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10018","4.525602","172.30.1.205","172.30.1.104","TCP","74","34518 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907752 TSecr=0 WS=128" "10019","4.525767","172.30.1.104","172.30.1.205","TCP","54","135 > 41880 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10020","4.525793","172.30.1.104","172.30.1.205","TCP","54","135 > 41880 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10021","4.525799","172.30.1.205","172.30.1.104","TCP","54","41880 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10022","4.525873","172.30.1.104","172.30.1.205","TCP","66","49671 > 34518 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10023","4.525881","172.30.1.205","172.30.1.104","TCP","54","34518 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10024","4.526231","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10025","4.526537","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10026","4.526551","172.30.1.205","172.30.1.104","TCP","54","34518 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10027","4.528619","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10028","4.528973","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10029","4.528980","172.30.1.205","172.30.1.104","TCP","54","34518 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10030","4.530356","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10031","4.531616","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10032","4.531626","172.30.1.205","172.30.1.104","TCP","54","34518 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10033","4.532575","172.30.1.205","172.30.1.104","TCP","74","41884 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907758 TSecr=0 WS=128" "10034","4.532871","172.30.1.104","172.30.1.205","TCP","66","135 > 41884 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10035","4.532882","172.30.1.205","172.30.1.104","TCP","54","41884 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10036","4.533242","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10037","4.533511","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10038","4.533520","172.30.1.205","172.30.1.104","TCP","54","41884 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10039","4.535685","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10040","4.536043","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10041","4.536051","172.30.1.205","172.30.1.104","TCP","54","41884 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10042","4.537898","172.30.1.205","172.30.1.104","TCP","54","41884 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10043","4.538009","172.30.1.205","172.30.1.104","TCP","74","34522 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907764 TSecr=0 WS=128" "10044","4.538173","172.30.1.104","172.30.1.205","TCP","54","135 > 41884 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10045","4.538202","172.30.1.104","172.30.1.205","TCP","54","135 > 41884 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10046","4.538208","172.30.1.205","172.30.1.104","TCP","54","41884 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10047","4.538292","172.30.1.104","172.30.1.205","TCP","66","49671 > 34522 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10048","4.538301","172.30.1.205","172.30.1.104","TCP","54","34522 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10049","4.538642","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10050","4.538985","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10051","4.538994","172.30.1.205","172.30.1.104","TCP","54","34522 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10052","4.540884","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10053","4.541203","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10054","4.541209","172.30.1.205","172.30.1.104","TCP","54","34522 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10055","4.542576","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10056","4.543813","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10057","4.543825","172.30.1.205","172.30.1.104","TCP","54","34522 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10058","4.544757","172.30.1.205","172.30.1.104","TCP","74","41888 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907771 TSecr=0 WS=128" "10059","4.545040","172.30.1.104","172.30.1.205","TCP","66","135 > 41888 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10060","4.545050","172.30.1.205","172.30.1.104","TCP","54","41888 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10061","4.545394","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10062","4.545695","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10063","4.545709","172.30.1.205","172.30.1.104","TCP","54","41888 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10064","4.547973","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10065","4.548301","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10066","4.548308","172.30.1.205","172.30.1.104","TCP","54","41888 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10067","4.550147","172.30.1.205","172.30.1.104","TCP","54","41888 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10068","4.550270","172.30.1.205","172.30.1.104","TCP","74","34526 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907776 TSecr=0 WS=128" "10069","4.550400","172.30.1.104","172.30.1.205","TCP","54","135 > 41888 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10070","4.550410","172.30.1.104","172.30.1.205","TCP","54","135 > 41888 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10071","4.550416","172.30.1.205","172.30.1.104","TCP","54","41888 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10072","4.550504","172.30.1.104","172.30.1.205","TCP","66","49671 > 34526 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10073","4.550513","172.30.1.205","172.30.1.104","TCP","54","34526 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10074","4.550860","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10075","4.551125","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10076","4.551134","172.30.1.205","172.30.1.104","TCP","54","34526 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10077","4.553033","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10078","4.553410","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10079","4.553417","172.30.1.205","172.30.1.104","TCP","54","34526 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10080","4.554759","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10081","4.556010","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10082","4.556021","172.30.1.205","172.30.1.104","TCP","54","34526 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10083","4.557028","172.30.1.205","172.30.1.104","TCP","74","41892 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907783 TSecr=0 WS=128" "10084","4.557357","172.30.1.104","172.30.1.205","TCP","66","135 > 41892 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10085","4.557368","172.30.1.205","172.30.1.104","TCP","54","41892 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10086","4.557724","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10087","4.558005","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10088","4.558014","172.30.1.205","172.30.1.104","TCP","54","41892 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10089","4.560214","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10090","4.560598","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10091","4.560606","172.30.1.205","172.30.1.104","TCP","54","41892 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10092","4.562438","172.30.1.205","172.30.1.104","TCP","54","41892 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10093","4.562551","172.30.1.205","172.30.1.104","TCP","74","34530 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907788 TSecr=0 WS=128" "10094","4.562715","172.30.1.104","172.30.1.205","TCP","54","135 > 41892 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10095","4.562746","172.30.1.104","172.30.1.205","TCP","54","135 > 41892 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10096","4.562752","172.30.1.205","172.30.1.104","TCP","54","41892 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10097","4.562834","172.30.1.104","172.30.1.205","TCP","66","49671 > 34530 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10098","4.562843","172.30.1.205","172.30.1.104","TCP","54","34530 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10099","4.563212","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10100","4.563476","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10101","4.563485","172.30.1.205","172.30.1.104","TCP","54","34530 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10102","4.565373","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10103","4.565717","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10104","4.565724","172.30.1.205","172.30.1.104","TCP","54","34530 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10105","4.567057","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10106","4.568376","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10107","4.568386","172.30.1.205","172.30.1.104","TCP","54","34530 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10108","4.569336","172.30.1.205","172.30.1.104","TCP","74","41896 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907795 TSecr=0 WS=128" "10109","4.569655","172.30.1.104","172.30.1.205","TCP","66","135 > 41896 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10110","4.569666","172.30.1.205","172.30.1.104","TCP","54","41896 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10111","4.570012","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10112","4.570289","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10113","4.570298","172.30.1.205","172.30.1.104","TCP","54","41896 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10114","4.572463","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10115","4.572826","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10116","4.572842","172.30.1.205","172.30.1.104","TCP","54","41896 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10117","4.574645","172.30.1.205","172.30.1.104","TCP","54","41896 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10118","4.574756","172.30.1.205","172.30.1.104","TCP","74","34534 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907801 TSecr=0 WS=128" "10119","4.574920","172.30.1.104","172.30.1.205","TCP","54","135 > 41896 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10120","4.574940","172.30.1.104","172.30.1.205","TCP","54","135 > 41896 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10121","4.574946","172.30.1.205","172.30.1.104","TCP","54","41896 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10122","4.575028","172.30.1.104","172.30.1.205","TCP","66","49671 > 34534 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10123","4.575036","172.30.1.205","172.30.1.104","TCP","54","34534 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10124","4.575379","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10125","4.575675","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10126","4.575685","172.30.1.205","172.30.1.104","TCP","54","34534 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10127","4.577558","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10128","4.577924","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10129","4.577931","172.30.1.205","172.30.1.104","TCP","54","34534 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10130","4.579269","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10131","4.580668","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10132","4.580680","172.30.1.205","172.30.1.104","TCP","54","34534 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10133","4.581643","172.30.1.205","172.30.1.104","TCP","74","41900 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907808 TSecr=0 WS=128" "10134","4.581953","172.30.1.104","172.30.1.205","TCP","66","135 > 41900 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10135","4.581965","172.30.1.205","172.30.1.104","TCP","54","41900 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10136","4.582309","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10137","4.582587","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10138","4.582596","172.30.1.205","172.30.1.104","TCP","54","41900 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10139","4.584763","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10140","4.585151","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10141","4.585158","172.30.1.205","172.30.1.104","TCP","54","41900 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10142","4.585994","172.30.1.205","172.30.1.104","TCP","54","34494 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10143","4.586043","172.30.1.205","172.30.1.104","TCP","54","34498 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10144","4.586080","172.30.1.205","172.30.1.104","TCP","54","34502 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10145","4.586117","172.30.1.205","172.30.1.104","TCP","54","34506 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10146","4.586152","172.30.1.205","172.30.1.104","TCP","54","34510 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10147","4.586185","172.30.1.205","172.30.1.104","TCP","54","34514 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10148","4.586217","172.30.1.205","172.30.1.104","TCP","54","34518 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10149","4.586244","172.30.1.205","172.30.1.104","TCP","54","34522 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10150","4.586270","172.30.1.205","172.30.1.104","TCP","54","34526 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10151","4.586291","172.30.1.205","172.30.1.104","TCP","54","34530 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10152","4.586298","172.30.1.104","172.30.1.205","TCP","54","49671 > 34494 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10153","4.586316","172.30.1.104","172.30.1.205","TCP","54","49671 > 34498 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10154","4.586347","172.30.1.205","172.30.1.104","TCP","54","34534 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10155","4.586399","172.30.1.104","172.30.1.205","TCP","54","49671 > 34502 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10156","4.586417","172.30.1.104","172.30.1.205","TCP","54","49671 > 34506 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10157","4.586436","172.30.1.104","172.30.1.205","TCP","54","49671 > 34498 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10158","4.586442","172.30.1.205","172.30.1.104","TCP","54","34498 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10159","4.586457","172.30.1.205","172.30.1.104","TCP","54","34490 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10160","4.586462","172.30.1.104","172.30.1.205","TCP","54","49671 > 34494 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10161","4.586465","172.30.1.205","172.30.1.104","TCP","54","34494 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10162","4.586486","172.30.1.104","172.30.1.205","TCP","54","49671 > 34506 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10163","4.586489","172.30.1.205","172.30.1.104","TCP","54","34506 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10164","4.586508","172.30.1.104","172.30.1.205","TCP","54","49671 > 34510 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10165","4.586656","172.30.1.104","172.30.1.205","TCP","54","49671 > 34514 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10166","4.586675","172.30.1.104","172.30.1.205","TCP","54","49671 > 34518 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10167","4.586695","172.30.1.104","172.30.1.205","TCP","54","49671 > 34502 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10168","4.586700","172.30.1.205","172.30.1.104","TCP","54","34502 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10169","4.586714","172.30.1.104","172.30.1.205","TCP","54","49671 > 34518 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10170","4.586716","172.30.1.205","172.30.1.104","TCP","54","34518 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10171","4.586739","172.30.1.104","172.30.1.205","TCP","54","49671 > 34514 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10172","4.586742","172.30.1.205","172.30.1.104","TCP","54","34514 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10173","4.586759","172.30.1.104","172.30.1.205","TCP","54","49671 > 34510 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10174","4.586761","172.30.1.205","172.30.1.104","TCP","54","34510 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10175","4.586780","172.30.1.104","172.30.1.205","TCP","54","49671 > 34522 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10176","4.586801","172.30.1.104","172.30.1.205","TCP","54","49671 > 34526 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10177","4.587132","172.30.1.104","172.30.1.205","TCP","54","49671 > 34530 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10178","4.587148","172.30.1.104","172.30.1.205","TCP","54","49671 > 34522 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10179","4.587153","172.30.1.205","172.30.1.104","TCP","54","34522 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10180","4.587169","172.30.1.104","172.30.1.205","TCP","54","49671 > 34526 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10181","4.587172","172.30.1.205","172.30.1.104","TCP","54","34526 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10182","4.587192","172.30.1.104","172.30.1.205","TCP","54","49671 > 34530 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10183","4.587195","172.30.1.205","172.30.1.104","TCP","54","34530 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10184","4.587211","172.30.1.104","172.30.1.205","TCP","54","49671 > 34534 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10185","4.587232","172.30.1.104","172.30.1.205","TCP","54","49671 > 34490 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10186","4.587252","172.30.1.104","172.30.1.205","TCP","54","49671 > 34534 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10187","4.587255","172.30.1.205","172.30.1.104","TCP","54","34534 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10188","4.587340","172.30.1.104","172.30.1.205","TCP","54","49671 > 34490 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10189","4.587343","172.30.1.205","172.30.1.104","TCP","54","34490 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10190","4.587965","172.30.1.205","172.30.1.104","TCP","54","41900 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10191","4.588074","172.30.1.205","172.30.1.104","TCP","74","34538 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907814 TSecr=0 WS=128" "10192","4.588284","172.30.1.104","172.30.1.205","TCP","54","135 > 41900 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10193","4.588332","172.30.1.104","172.30.1.205","TCP","66","49671 > 34538 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10194","4.588341","172.30.1.205","172.30.1.104","TCP","54","34538 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10195","4.588355","172.30.1.104","172.30.1.205","TCP","54","135 > 41900 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10196","4.588359","172.30.1.205","172.30.1.104","TCP","54","41900 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10197","4.588708","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10198","4.589769","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10199","4.589784","172.30.1.205","172.30.1.104","TCP","54","34538 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10200","4.591663","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10201","4.592031","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10202","4.592038","172.30.1.205","172.30.1.104","TCP","54","34538 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10203","4.593478","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10204","4.594918","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10205","4.594930","172.30.1.205","172.30.1.104","TCP","54","34538 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10206","4.595885","172.30.1.205","172.30.1.104","TCP","74","41904 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907822 TSecr=0 WS=128" "10207","4.596203","172.30.1.104","172.30.1.205","TCP","66","135 > 41904 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10208","4.596213","172.30.1.205","172.30.1.104","TCP","54","41904 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10209","4.596569","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10210","4.596888","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10211","4.596897","172.30.1.205","172.30.1.104","TCP","54","41904 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10212","4.599076","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10213","4.599479","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10214","4.599495","172.30.1.205","172.30.1.104","TCP","54","41904 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10215","4.601319","172.30.1.205","172.30.1.104","TCP","54","41904 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10216","4.601430","172.30.1.205","172.30.1.104","TCP","74","34542 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907827 TSecr=0 WS=128" "10217","4.601587","172.30.1.104","172.30.1.205","TCP","54","135 > 41904 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10218","4.601607","172.30.1.104","172.30.1.205","TCP","54","135 > 41904 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10219","4.601612","172.30.1.205","172.30.1.104","TCP","54","41904 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10220","4.601720","172.30.1.104","172.30.1.205","TCP","66","49671 > 34542 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10221","4.601736","172.30.1.205","172.30.1.104","TCP","54","34542 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10222","4.602134","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10223","4.602420","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10224","4.602430","172.30.1.205","172.30.1.104","TCP","54","34542 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10225","4.604295","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10226","4.604684","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10227","4.604690","172.30.1.205","172.30.1.104","TCP","54","34542 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10228","4.606054","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10229","4.607509","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10230","4.607518","172.30.1.205","172.30.1.104","TCP","54","34542 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10231","4.608458","172.30.1.205","172.30.1.104","TCP","74","41908 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907834 TSecr=0 WS=128" "10232","4.608801","172.30.1.104","172.30.1.205","TCP","66","135 > 41908 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10233","4.608812","172.30.1.205","172.30.1.104","TCP","54","41908 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10234","4.609166","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10235","4.609459","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10236","4.609468","172.30.1.205","172.30.1.104","TCP","54","41908 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10237","4.611679","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10238","4.612077","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10239","4.612084","172.30.1.205","172.30.1.104","TCP","54","41908 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10240","4.613906","172.30.1.205","172.30.1.104","TCP","54","41908 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10241","4.614016","172.30.1.205","172.30.1.104","TCP","74","34546 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907840 TSecr=0 WS=128" "10242","4.614151","172.30.1.104","172.30.1.205","TCP","54","135 > 41908 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10243","4.614180","172.30.1.104","172.30.1.205","TCP","54","135 > 41908 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10244","4.614186","172.30.1.205","172.30.1.104","TCP","54","41908 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10245","4.614269","172.30.1.104","172.30.1.205","TCP","66","49671 > 34546 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10246","4.614277","172.30.1.205","172.30.1.104","TCP","54","34546 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10247","4.614616","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10248","4.614912","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10249","4.614920","172.30.1.205","172.30.1.104","TCP","54","34546 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10250","4.616766","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10251","4.617197","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10252","4.617204","172.30.1.205","172.30.1.104","TCP","54","34546 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10253","4.618537","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10254","4.620016","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10255","4.620025","172.30.1.205","172.30.1.104","TCP","54","34546 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10256","4.620966","172.30.1.205","172.30.1.104","TCP","74","41912 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907847 TSecr=0 WS=128" "10257","4.621285","172.30.1.104","172.30.1.205","TCP","66","135 > 41912 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10258","4.621295","172.30.1.205","172.30.1.104","TCP","54","41912 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10259","4.621644","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10260","4.621928","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10261","4.621936","172.30.1.205","172.30.1.104","TCP","54","41912 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10262","4.624095","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10263","4.624516","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10264","4.624524","172.30.1.205","172.30.1.104","TCP","54","41912 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10265","4.626339","172.30.1.205","172.30.1.104","TCP","54","41912 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10266","4.626450","172.30.1.205","172.30.1.104","TCP","74","34550 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907852 TSecr=0 WS=128" "10267","4.626591","172.30.1.104","172.30.1.205","TCP","54","135 > 41912 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10268","4.626636","172.30.1.104","172.30.1.205","TCP","54","135 > 41912 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10269","4.626642","172.30.1.205","172.30.1.104","TCP","54","41912 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10270","4.626753","172.30.1.104","172.30.1.205","TCP","66","49671 > 34550 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10271","4.626769","172.30.1.205","172.30.1.104","TCP","54","34550 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10272","4.627186","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10273","4.627486","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10274","4.627495","172.30.1.205","172.30.1.104","TCP","54","34550 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10275","4.629400","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10276","4.629773","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10277","4.629780","172.30.1.205","172.30.1.104","TCP","54","34550 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10278","4.631128","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10279","4.632603","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10280","4.632613","172.30.1.205","172.30.1.104","TCP","54","34550 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10281","4.633576","172.30.1.205","172.30.1.104","TCP","74","41916 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907860 TSecr=0 WS=128" "10282","4.633960","172.30.1.104","172.30.1.205","TCP","66","135 > 41916 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10283","4.633971","172.30.1.205","172.30.1.104","TCP","54","41916 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10284","4.634325","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10285","4.634594","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10286","4.634603","172.30.1.205","172.30.1.104","TCP","54","41916 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10287","4.636831","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10288","4.637235","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10289","4.637242","172.30.1.205","172.30.1.104","TCP","54","41916 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10290","4.639075","172.30.1.205","172.30.1.104","TCP","54","41916 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10291","4.639205","172.30.1.205","172.30.1.104","TCP","74","34554 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907865 TSecr=0 WS=128" "10292","4.639382","172.30.1.104","172.30.1.205","TCP","54","135 > 41916 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10293","4.639395","172.30.1.104","172.30.1.205","TCP","54","135 > 41916 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10294","4.639404","172.30.1.205","172.30.1.104","TCP","54","41916 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10295","4.639489","172.30.1.104","172.30.1.205","TCP","66","49671 > 34554 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10296","4.639501","172.30.1.205","172.30.1.104","TCP","54","34554 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10297","4.639893","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10298","4.640169","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10299","4.640178","172.30.1.205","172.30.1.104","TCP","54","34554 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10300","4.642114","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10301","4.642526","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10302","4.642535","172.30.1.205","172.30.1.104","TCP","54","34554 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10303","4.644019","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10304","4.645587","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10305","4.645597","172.30.1.205","172.30.1.104","TCP","54","34554 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10306","4.646574","172.30.1.205","172.30.1.104","TCP","74","41920 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907872 TSecr=0 WS=128" "10307","4.646894","172.30.1.104","172.30.1.205","TCP","66","135 > 41920 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10308","4.646905","172.30.1.205","172.30.1.104","TCP","54","41920 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10309","4.647252","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10310","4.647559","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10311","4.647568","172.30.1.205","172.30.1.104","TCP","54","41920 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10312","4.649785","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10313","4.650176","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10314","4.650183","172.30.1.205","172.30.1.104","TCP","54","41920 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10315","4.651992","172.30.1.205","172.30.1.104","TCP","54","41920 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10316","4.652115","172.30.1.205","172.30.1.104","TCP","74","34558 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907878 TSecr=0 WS=128" "10317","4.652243","172.30.1.104","172.30.1.205","TCP","54","135 > 41920 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10318","4.652293","172.30.1.104","172.30.1.205","TCP","54","135 > 41920 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10319","4.652300","172.30.1.205","172.30.1.104","TCP","54","41920 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10320","4.652385","172.30.1.104","172.30.1.205","TCP","66","49671 > 34558 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10321","4.652393","172.30.1.205","172.30.1.104","TCP","54","34558 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10322","4.652734","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10323","4.653009","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10324","4.653018","172.30.1.205","172.30.1.104","TCP","54","34558 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10325","4.654893","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10326","4.655243","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10327","4.655249","172.30.1.205","172.30.1.104","TCP","54","34558 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10328","4.656591","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10329","4.657928","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10330","4.657938","172.30.1.205","172.30.1.104","TCP","54","34558 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10331","4.658910","172.30.1.205","172.30.1.104","TCP","74","41924 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907885 TSecr=0 WS=128" "10332","4.659197","172.30.1.104","172.30.1.205","TCP","66","135 > 41924 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10333","4.659207","172.30.1.205","172.30.1.104","TCP","54","41924 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10334","4.659553","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10335","4.659824","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10336","4.659833","172.30.1.205","172.30.1.104","TCP","54","41924 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10337","4.662069","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10338","4.662468","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10339","4.662475","172.30.1.205","172.30.1.104","TCP","54","41924 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10340","4.664294","172.30.1.205","172.30.1.104","TCP","54","41924 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10341","4.664424","172.30.1.205","172.30.1.104","TCP","74","34562 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907890 TSecr=0 WS=128" "10342","4.664585","172.30.1.104","172.30.1.205","TCP","54","135 > 41924 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10343","4.664595","172.30.1.104","172.30.1.205","TCP","54","135 > 41924 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10344","4.664602","172.30.1.205","172.30.1.104","TCP","54","41924 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10345","4.664694","172.30.1.104","172.30.1.205","TCP","66","49671 > 34562 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10346","4.664703","172.30.1.205","172.30.1.104","TCP","54","34562 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10347","4.665073","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10348","4.665358","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10349","4.665366","172.30.1.205","172.30.1.104","TCP","54","34562 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10350","4.667254","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10351","4.667610","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10352","4.667617","172.30.1.205","172.30.1.104","TCP","54","34562 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10353","4.669002","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10354","4.670356","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10355","4.670367","172.30.1.205","172.30.1.104","TCP","54","34562 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10356","4.671366","172.30.1.205","172.30.1.104","TCP","74","41928 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907897 TSecr=0 WS=128" "10357","4.671650","172.30.1.104","172.30.1.205","TCP","66","135 > 41928 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10358","4.671661","172.30.1.205","172.30.1.104","TCP","54","41928 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10359","4.672012","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10360","4.672312","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10361","4.672321","172.30.1.205","172.30.1.104","TCP","54","41928 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10362","4.674558","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10363","4.674941","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10364","4.674948","172.30.1.205","172.30.1.104","TCP","54","41928 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10365","4.676757","172.30.1.205","172.30.1.104","TCP","54","41928 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10366","4.676899","172.30.1.205","172.30.1.104","TCP","74","34566 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907903 TSecr=0 WS=128" "10367","4.677027","172.30.1.104","172.30.1.205","TCP","54","135 > 41928 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10368","4.677038","172.30.1.104","172.30.1.205","TCP","54","135 > 41928 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10369","4.677045","172.30.1.205","172.30.1.104","TCP","54","41928 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10370","4.677210","172.30.1.104","172.30.1.205","TCP","66","49671 > 34566 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10371","4.677222","172.30.1.205","172.30.1.104","TCP","54","34566 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10372","4.677565","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10373","4.677842","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10374","4.677850","172.30.1.205","172.30.1.104","TCP","54","34566 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10375","4.679700","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10376","4.680063","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10377","4.680069","172.30.1.205","172.30.1.104","TCP","54","34566 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10378","4.681572","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10379","4.682919","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10380","4.682931","172.30.1.205","172.30.1.104","TCP","54","34566 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10381","4.683913","172.30.1.205","172.30.1.104","TCP","74","41932 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907910 TSecr=0 WS=128" "10382","4.684205","172.30.1.104","172.30.1.205","TCP","66","135 > 41932 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10383","4.684216","172.30.1.205","172.30.1.104","TCP","54","41932 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10384","4.684639","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10385","4.684946","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10386","4.684956","172.30.1.205","172.30.1.104","TCP","54","41932 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10387","4.687163","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10388","4.687545","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10389","4.687552","172.30.1.205","172.30.1.104","TCP","54","41932 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10390","4.689388","172.30.1.205","172.30.1.104","TCP","54","41932 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10391","4.689504","172.30.1.205","172.30.1.104","TCP","74","34570 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907915 TSecr=0 WS=128" "10392","4.689646","172.30.1.104","172.30.1.205","TCP","54","135 > 41932 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10393","4.689675","172.30.1.104","172.30.1.205","TCP","54","135 > 41932 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10394","4.689682","172.30.1.205","172.30.1.104","TCP","54","41932 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10395","4.689789","172.30.1.104","172.30.1.205","TCP","66","49671 > 34570 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10396","4.689798","172.30.1.205","172.30.1.104","TCP","54","34570 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10397","4.690146","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10398","4.690441","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10399","4.690452","172.30.1.205","172.30.1.104","TCP","54","34570 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10400","4.692310","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10401","4.692667","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10402","4.692674","172.30.1.205","172.30.1.104","TCP","54","34570 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10403","4.694051","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10404","4.695448","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10405","4.695458","172.30.1.205","172.30.1.104","TCP","54","34570 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10406","4.696407","172.30.1.205","172.30.1.104","TCP","74","41936 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907922 TSecr=0 WS=128" "10407","4.696716","172.30.1.104","172.30.1.205","TCP","66","135 > 41936 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10408","4.696727","172.30.1.205","172.30.1.104","TCP","54","41936 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10409","4.697100","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10410","4.697380","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10411","4.697390","172.30.1.205","172.30.1.104","TCP","54","41936 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10412","4.699590","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10413","4.699959","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10414","4.699966","172.30.1.205","172.30.1.104","TCP","54","41936 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10415","4.701826","172.30.1.205","172.30.1.104","TCP","54","41936 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10416","4.701943","172.30.1.205","172.30.1.104","TCP","74","34574 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907928 TSecr=0 WS=128" "10417","4.702077","172.30.1.104","172.30.1.205","TCP","54","135 > 41936 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10418","4.702101","172.30.1.104","172.30.1.205","TCP","54","135 > 41936 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10419","4.702108","172.30.1.205","172.30.1.104","TCP","54","41936 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10420","4.702183","172.30.1.104","172.30.1.205","TCP","66","49671 > 34574 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10421","4.702192","172.30.1.205","172.30.1.104","TCP","54","34574 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10422","4.702538","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10423","4.702821","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10424","4.702830","172.30.1.205","172.30.1.104","TCP","54","34574 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10425","4.704696","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10426","4.705078","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10427","4.705086","172.30.1.205","172.30.1.104","TCP","54","34574 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10428","4.706449","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10429","4.707829","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10430","4.707843","172.30.1.205","172.30.1.104","TCP","54","34574 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10431","4.708787","172.30.1.205","172.30.1.104","TCP","74","41940 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907935 TSecr=0 WS=128" "10432","4.709132","172.30.1.104","172.30.1.205","TCP","66","135 > 41940 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10433","4.709143","172.30.1.205","172.30.1.104","TCP","54","41940 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10434","4.709495","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10435","4.709791","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10436","4.709815","172.30.1.205","172.30.1.104","TCP","54","41940 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10437","4.711988","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10438","4.712362","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10439","4.712369","172.30.1.205","172.30.1.104","TCP","54","41940 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10440","4.714187","172.30.1.205","172.30.1.104","TCP","54","41940 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10441","4.714299","172.30.1.205","172.30.1.104","TCP","74","34578 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907940 TSecr=0 WS=128" "10442","4.714448","172.30.1.104","172.30.1.205","TCP","54","135 > 41940 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10443","4.714471","172.30.1.104","172.30.1.205","TCP","54","135 > 41940 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10444","4.714477","172.30.1.205","172.30.1.104","TCP","54","41940 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10445","4.714572","172.30.1.104","172.30.1.205","TCP","66","49671 > 34578 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10446","4.714580","172.30.1.205","172.30.1.104","TCP","54","34578 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10447","4.714932","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10448","4.715241","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10449","4.715250","172.30.1.205","172.30.1.104","TCP","54","34578 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10450","4.717189","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10451","4.717580","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10452","4.717588","172.30.1.205","172.30.1.104","TCP","54","34578 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10453","4.719033","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10454","4.720356","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10455","4.720366","172.30.1.205","172.30.1.104","TCP","54","34578 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10456","4.721343","172.30.1.205","172.30.1.104","TCP","74","41944 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907947 TSecr=0 WS=128" "10457","4.721650","172.30.1.104","172.30.1.205","TCP","66","135 > 41944 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10458","4.721661","172.30.1.205","172.30.1.104","TCP","54","41944 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10459","4.722032","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10460","4.722325","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10461","4.722335","172.30.1.205","172.30.1.104","TCP","54","41944 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10462","4.724496","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10463","4.724884","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10464","4.724891","172.30.1.205","172.30.1.104","TCP","54","41944 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10465","4.726695","172.30.1.205","172.30.1.104","TCP","54","41944 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10466","4.726806","172.30.1.205","172.30.1.104","TCP","74","34582 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907953 TSecr=0 WS=128" "10467","4.726956","172.30.1.104","172.30.1.205","TCP","54","135 > 41944 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10468","4.726966","172.30.1.104","172.30.1.205","TCP","54","135 > 41944 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10469","4.726971","172.30.1.205","172.30.1.104","TCP","54","41944 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10470","4.727076","172.30.1.104","172.30.1.205","TCP","66","49671 > 34582 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10471","4.727092","172.30.1.205","172.30.1.104","TCP","54","34582 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10472","4.727486","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10473","4.727761","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10474","4.727768","172.30.1.205","172.30.1.104","TCP","54","34582 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10475","4.729670","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10476","4.730444","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10477","4.730452","172.30.1.205","172.30.1.104","TCP","54","34582 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10478","4.731823","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10479","4.733208","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10480","4.733218","172.30.1.205","172.30.1.104","TCP","54","34582 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10481","4.734175","172.30.1.205","172.30.1.104","TCP","74","41948 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907960 TSecr=0 WS=128" "10482","4.734462","172.30.1.104","172.30.1.205","TCP","66","135 > 41948 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10483","4.734473","172.30.1.205","172.30.1.104","TCP","54","41948 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10484","4.734820","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10485","4.735101","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10486","4.735111","172.30.1.205","172.30.1.104","TCP","54","41948 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10487","4.737323","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10488","4.737716","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10489","4.737723","172.30.1.205","172.30.1.104","TCP","54","41948 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10490","4.738560","172.30.1.205","172.30.1.104","TCP","54","34542 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10491","4.738609","172.30.1.205","172.30.1.104","TCP","54","34546 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10492","4.738646","172.30.1.205","172.30.1.104","TCP","54","34550 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10493","4.738675","172.30.1.205","172.30.1.104","TCP","54","34554 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10494","4.738704","172.30.1.205","172.30.1.104","TCP","54","34558 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10495","4.738731","172.30.1.205","172.30.1.104","TCP","54","34562 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10496","4.738763","172.30.1.205","172.30.1.104","TCP","54","34566 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10497","4.738790","172.30.1.205","172.30.1.104","TCP","54","34570 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10498","4.738821","172.30.1.205","172.30.1.104","TCP","54","34574 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10499","4.738848","172.30.1.205","172.30.1.104","TCP","54","34578 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10500","4.738870","172.30.1.205","172.30.1.104","TCP","54","34582 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10501","4.738893","172.30.1.104","172.30.1.205","TCP","54","49671 > 34542 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10502","4.738917","172.30.1.104","172.30.1.205","TCP","54","49671 > 34546 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10503","4.738938","172.30.1.104","172.30.1.205","TCP","54","49671 > 34542 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10504","4.738944","172.30.1.205","172.30.1.104","TCP","54","34542 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10505","4.738965","172.30.1.104","172.30.1.205","TCP","54","49671 > 34550 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10506","4.738987","172.30.1.104","172.30.1.205","TCP","54","49671 > 34554 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10507","4.739010","172.30.1.205","172.30.1.104","TCP","54","34538 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10508","4.739085","172.30.1.104","172.30.1.205","TCP","54","49671 > 34558 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10509","4.739104","172.30.1.104","172.30.1.205","TCP","54","49671 > 34558 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10510","4.739110","172.30.1.205","172.30.1.104","TCP","54","34558 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10511","4.739124","172.30.1.104","172.30.1.205","TCP","54","49671 > 34554 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10512","4.739127","172.30.1.205","172.30.1.104","TCP","54","34554 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10513","4.739144","172.30.1.104","172.30.1.205","TCP","54","49671 > 34546 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10514","4.739147","172.30.1.205","172.30.1.104","TCP","54","34546 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10515","4.739164","172.30.1.104","172.30.1.205","TCP","54","49671 > 34550 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10516","4.739167","172.30.1.205","172.30.1.104","TCP","54","34550 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10517","4.739184","172.30.1.104","172.30.1.205","TCP","54","49671 > 34562 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10518","4.739206","172.30.1.104","172.30.1.205","TCP","54","49671 > 34566 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10519","4.739346","172.30.1.104","172.30.1.205","TCP","54","49671 > 34570 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10520","4.739365","172.30.1.104","172.30.1.205","TCP","54","49671 > 34562 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10521","4.739370","172.30.1.205","172.30.1.104","TCP","54","34562 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10522","4.739395","172.30.1.104","172.30.1.205","TCP","54","49671 > 34574 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10523","4.739425","172.30.1.104","172.30.1.205","TCP","54","49671 > 34574 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10524","4.739429","172.30.1.205","172.30.1.104","TCP","54","34574 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10525","4.739444","172.30.1.104","172.30.1.205","TCP","54","49671 > 34566 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10526","4.739447","172.30.1.205","172.30.1.104","TCP","54","34566 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10527","4.739464","172.30.1.104","172.30.1.205","TCP","54","49671 > 34570 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10528","4.739467","172.30.1.205","172.30.1.104","TCP","54","34570 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10529","4.739484","172.30.1.104","172.30.1.205","TCP","54","49671 > 34578 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10530","4.739628","172.30.1.104","172.30.1.205","TCP","54","49671 > 34582 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10531","4.739646","172.30.1.104","172.30.1.205","TCP","54","49671 > 34578 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10532","4.739657","172.30.1.205","172.30.1.104","TCP","54","34578 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10533","4.739669","172.30.1.104","172.30.1.205","TCP","54","49671 > 34582 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10534","4.739672","172.30.1.205","172.30.1.104","TCP","54","34582 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10535","4.739697","172.30.1.104","172.30.1.205","TCP","54","49671 > 34538 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10536","4.739801","172.30.1.104","172.30.1.205","TCP","54","49671 > 34538 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10537","4.739805","172.30.1.205","172.30.1.104","TCP","54","34538 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10538","4.740860","172.30.1.205","172.30.1.104","TCP","54","41948 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10539","4.740972","172.30.1.205","172.30.1.104","TCP","74","34586 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907967 TSecr=0 WS=128" "10540","4.741128","172.30.1.104","172.30.1.205","TCP","54","135 > 41948 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10541","4.741146","172.30.1.104","172.30.1.205","TCP","54","135 > 41948 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10542","4.741150","172.30.1.205","172.30.1.104","TCP","54","41948 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10543","4.741267","172.30.1.104","172.30.1.205","TCP","66","49671 > 34586 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10544","4.741276","172.30.1.205","172.30.1.104","TCP","54","34586 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10545","4.741637","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10546","4.741922","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10547","4.741931","172.30.1.205","172.30.1.104","TCP","54","34586 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10548","4.743812","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10549","4.744181","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10550","4.744187","172.30.1.205","172.30.1.104","TCP","54","34586 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10551","4.745582","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10552","4.747099","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10553","4.747108","172.30.1.205","172.30.1.104","TCP","54","34586 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10554","4.748033","172.30.1.205","172.30.1.104","TCP","74","41952 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907974 TSecr=0 WS=128" "10555","4.748373","172.30.1.104","172.30.1.205","TCP","66","135 > 41952 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10556","4.748384","172.30.1.205","172.30.1.104","TCP","54","41952 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10557","4.748732","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10558","4.749049","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10559","4.749060","172.30.1.205","172.30.1.104","TCP","54","41952 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10560","4.751254","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10561","4.751705","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10562","4.751711","172.30.1.205","172.30.1.104","TCP","54","41952 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10563","4.753534","172.30.1.205","172.30.1.104","TCP","54","41952 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10564","4.753648","172.30.1.205","172.30.1.104","TCP","74","34590 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907980 TSecr=0 WS=128" "10565","4.753804","172.30.1.104","172.30.1.205","TCP","54","135 > 41952 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10566","4.753845","172.30.1.104","172.30.1.205","TCP","54","135 > 41952 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10567","4.753851","172.30.1.205","172.30.1.104","TCP","54","41952 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10568","4.753925","172.30.1.104","172.30.1.205","TCP","66","49671 > 34590 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10569","4.753933","172.30.1.205","172.30.1.104","TCP","54","34590 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10570","4.754277","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10571","4.754565","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10572","4.754574","172.30.1.205","172.30.1.104","TCP","54","34590 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10573","4.756547","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10574","4.756947","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10575","4.756954","172.30.1.205","172.30.1.104","TCP","54","34590 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10576","4.758314","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10577","4.759665","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10578","4.759675","172.30.1.205","172.30.1.104","TCP","54","34590 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10579","4.760610","172.30.1.205","172.30.1.104","TCP","74","41956 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907987 TSecr=0 WS=128" "10580","4.760921","172.30.1.104","172.30.1.205","TCP","66","135 > 41956 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10581","4.760933","172.30.1.205","172.30.1.104","TCP","54","41956 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10582","4.761285","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10583","4.761667","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10584","4.761676","172.30.1.205","172.30.1.104","TCP","54","41956 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10585","4.763845","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10586","4.764254","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10587","4.764261","172.30.1.205","172.30.1.104","TCP","54","41956 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10588","4.766084","172.30.1.205","172.30.1.104","TCP","54","41956 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10589","4.766195","172.30.1.205","172.30.1.104","TCP","74","34594 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499907992 TSecr=0 WS=128" "10590","4.766364","172.30.1.104","172.30.1.205","TCP","54","135 > 41956 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10591","4.766400","172.30.1.104","172.30.1.205","TCP","54","135 > 41956 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10592","4.766405","172.30.1.205","172.30.1.104","TCP","54","41956 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10593","4.766482","172.30.1.104","172.30.1.205","TCP","66","49671 > 34594 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10594","4.766490","172.30.1.205","172.30.1.104","TCP","54","34594 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10595","4.766850","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10596","4.768242","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10597","4.768253","172.30.1.205","172.30.1.104","TCP","54","34594 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10598","4.770156","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10599","4.771768","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10600","4.771774","172.30.1.205","172.30.1.104","TCP","54","34594 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10601","4.773156","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10602","4.774527","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10603","4.774537","172.30.1.205","172.30.1.104","TCP","54","34594 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10604","4.775475","172.30.1.205","172.30.1.104","TCP","74","41960 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908001 TSecr=0 WS=128" "10605","4.775788","172.30.1.104","172.30.1.205","TCP","66","135 > 41960 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10606","4.775799","172.30.1.205","172.30.1.104","TCP","54","41960 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10607","4.776144","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10608","4.776453","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10609","4.776462","172.30.1.205","172.30.1.104","TCP","54","41960 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10610","4.778660","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10611","4.779046","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10612","4.779052","172.30.1.205","172.30.1.104","TCP","54","41960 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10613","4.780864","172.30.1.205","172.30.1.104","TCP","54","41960 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10614","4.780972","172.30.1.205","172.30.1.104","TCP","74","34598 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908007 TSecr=0 WS=128" "10615","4.781153","172.30.1.104","172.30.1.205","TCP","54","135 > 41960 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10616","4.781181","172.30.1.104","172.30.1.205","TCP","54","135 > 41960 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10617","4.781187","172.30.1.205","172.30.1.104","TCP","54","41960 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10618","4.781262","172.30.1.104","172.30.1.205","TCP","66","49671 > 34598 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10619","4.781270","172.30.1.205","172.30.1.104","TCP","54","34598 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10620","4.781618","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10621","4.782693","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10622","4.782700","172.30.1.205","172.30.1.104","TCP","54","34598 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10623","4.784576","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10624","4.784927","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10625","4.784934","172.30.1.205","172.30.1.104","TCP","54","34598 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10626","4.786285","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10627","4.787622","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10628","4.787631","172.30.1.205","172.30.1.104","TCP","54","34598 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10629","4.788555","172.30.1.205","172.30.1.104","TCP","74","41964 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908014 TSecr=0 WS=128" "10630","4.788844","172.30.1.104","172.30.1.205","TCP","66","135 > 41964 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10631","4.788854","172.30.1.205","172.30.1.104","TCP","54","41964 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10632","4.789206","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10633","4.789504","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10634","4.789516","172.30.1.205","172.30.1.104","TCP","54","41964 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10635","4.791696","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10636","4.792086","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10637","4.792093","172.30.1.205","172.30.1.104","TCP","54","41964 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10638","4.793929","172.30.1.205","172.30.1.104","TCP","54","41964 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10639","4.794040","172.30.1.205","172.30.1.104","TCP","74","34602 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908020 TSecr=0 WS=128" "10640","4.794201","172.30.1.104","172.30.1.205","TCP","54","135 > 41964 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10641","4.794244","172.30.1.104","172.30.1.205","TCP","54","135 > 41964 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10642","4.794249","172.30.1.205","172.30.1.104","TCP","54","41964 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10643","4.794340","172.30.1.104","172.30.1.205","TCP","66","49671 > 34602 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10644","4.794348","172.30.1.205","172.30.1.104","TCP","54","34602 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10645","4.794691","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10646","4.795012","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10647","4.795021","172.30.1.205","172.30.1.104","TCP","54","34602 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10648","4.796916","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10649","4.797282","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10650","4.797289","172.30.1.205","172.30.1.104","TCP","54","34602 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10651","4.798634","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10652","4.800033","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10653","4.800042","172.30.1.205","172.30.1.104","TCP","54","34602 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10654","4.800998","172.30.1.205","172.30.1.104","TCP","74","41968 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908027 TSecr=0 WS=128" "10655","4.801284","172.30.1.104","172.30.1.205","TCP","66","135 > 41968 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10656","4.801294","172.30.1.205","172.30.1.104","TCP","54","41968 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10657","4.801647","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10658","4.801959","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10659","4.801973","172.30.1.205","172.30.1.104","TCP","54","41968 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10660","4.804226","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10661","4.804598","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10662","4.804604","172.30.1.205","172.30.1.104","TCP","54","41968 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10663","4.806429","172.30.1.205","172.30.1.104","TCP","54","41968 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10664","4.806543","172.30.1.205","172.30.1.104","TCP","74","34606 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908032 TSecr=0 WS=128" "10665","4.806744","172.30.1.104","172.30.1.205","TCP","54","135 > 41968 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10666","4.806789","172.30.1.104","172.30.1.205","TCP","54","135 > 41968 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10667","4.806795","172.30.1.205","172.30.1.104","TCP","54","41968 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10668","4.806828","172.30.1.104","172.30.1.205","TCP","66","49671 > 34606 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10669","4.806836","172.30.1.205","172.30.1.104","TCP","54","34606 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10670","4.807180","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10671","4.808791","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10672","4.808800","172.30.1.205","172.30.1.104","TCP","54","34606 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10673","4.810664","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10674","4.811004","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10675","4.811011","172.30.1.205","172.30.1.104","TCP","54","34606 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10676","4.812348","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10677","4.813777","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10678","4.813787","172.30.1.205","172.30.1.104","TCP","54","34606 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10679","4.814727","172.30.1.205","172.30.1.104","TCP","74","41972 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908041 TSecr=0 WS=128" "10680","4.815023","172.30.1.104","172.30.1.205","TCP","66","135 > 41972 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10681","4.815034","172.30.1.205","172.30.1.104","TCP","54","41972 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10682","4.815379","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10683","4.815650","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10684","4.815659","172.30.1.205","172.30.1.104","TCP","54","41972 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10685","4.817885","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10686","4.818284","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10687","4.818290","172.30.1.205","172.30.1.104","TCP","54","41972 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10688","4.820090","172.30.1.205","172.30.1.104","TCP","54","41972 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10689","4.820201","172.30.1.205","172.30.1.104","TCP","74","34610 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908046 TSecr=0 WS=128" "10690","4.820358","172.30.1.104","172.30.1.205","TCP","54","135 > 41972 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10691","4.820395","172.30.1.104","172.30.1.205","TCP","54","135 > 41972 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10692","4.820401","172.30.1.205","172.30.1.104","TCP","54","41972 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10693","4.820468","172.30.1.104","172.30.1.205","TCP","66","49671 > 34610 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10694","4.820476","172.30.1.205","172.30.1.104","TCP","54","34610 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10695","4.820861","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10696","4.821155","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10697","4.821164","172.30.1.205","172.30.1.104","TCP","54","34610 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10698","4.823035","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10699","4.823417","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10700","4.823423","172.30.1.205","172.30.1.104","TCP","54","34610 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10701","4.824770","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10702","4.826247","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10703","4.826256","172.30.1.205","172.30.1.104","TCP","54","34610 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10704","4.827200","172.30.1.205","172.30.1.104","TCP","74","41976 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908053 TSecr=0 WS=128" "10705","4.827498","172.30.1.104","172.30.1.205","TCP","66","135 > 41976 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10706","4.827509","172.30.1.205","172.30.1.104","TCP","54","41976 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10707","4.827872","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10708","4.828197","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10709","4.828206","172.30.1.205","172.30.1.104","TCP","54","41976 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10710","4.830487","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10711","4.830887","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10712","4.830893","172.30.1.205","172.30.1.104","TCP","54","41976 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10713","4.832745","172.30.1.205","172.30.1.104","TCP","54","41976 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10714","4.832883","172.30.1.205","172.30.1.104","TCP","74","34614 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908059 TSecr=0 WS=128" "10715","4.833040","172.30.1.104","172.30.1.205","TCP","54","135 > 41976 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10716","4.833048","172.30.1.104","172.30.1.205","TCP","54","135 > 41976 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10717","4.833054","172.30.1.205","172.30.1.104","TCP","54","41976 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10718","4.833156","172.30.1.104","172.30.1.205","TCP","66","49671 > 34614 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10719","4.833164","172.30.1.205","172.30.1.104","TCP","54","34614 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10720","4.833505","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10721","4.833760","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10722","4.833769","172.30.1.205","172.30.1.104","TCP","54","34614 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10723","4.835668","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10724","4.836033","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10725","4.836039","172.30.1.205","172.30.1.104","TCP","54","34614 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10726","4.837413","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10727","4.838881","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10728","4.838890","172.30.1.205","172.30.1.104","TCP","54","34614 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10729","4.839835","172.30.1.205","172.30.1.104","TCP","74","41980 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908066 TSecr=0 WS=128" "10730","4.840178","172.30.1.104","172.30.1.205","TCP","66","135 > 41980 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10731","4.840188","172.30.1.205","172.30.1.104","TCP","54","41980 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10732","4.840532","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10733","4.840817","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10734","4.840827","172.30.1.205","172.30.1.104","TCP","54","41980 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10735","4.843014","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10736","4.843469","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10737","4.843476","172.30.1.205","172.30.1.104","TCP","54","41980 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10738","4.845287","172.30.1.205","172.30.1.104","TCP","54","41980 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10739","4.845407","172.30.1.205","172.30.1.104","TCP","74","34618 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908071 TSecr=0 WS=128" "10740","4.845635","172.30.1.104","172.30.1.205","TCP","54","135 > 41980 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10741","4.845680","172.30.1.104","172.30.1.205","TCP","66","49671 > 34618 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10742","4.845689","172.30.1.205","172.30.1.104","TCP","54","34618 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10743","4.845703","172.30.1.104","172.30.1.205","TCP","54","135 > 41980 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10744","4.845707","172.30.1.205","172.30.1.104","TCP","54","41980 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10745","4.846080","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10746","4.846419","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10747","4.846435","172.30.1.205","172.30.1.104","TCP","54","34618 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10748","4.848497","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10749","4.848909","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10750","4.848916","172.30.1.205","172.30.1.104","TCP","54","34618 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10751","4.850250","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10752","4.852542","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10753","4.852551","172.30.1.205","172.30.1.104","TCP","54","34618 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10754","4.853496","172.30.1.205","172.30.1.104","TCP","74","41984 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908079 TSecr=0 WS=128" "10755","4.853797","172.30.1.104","172.30.1.205","TCP","66","135 > 41984 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10756","4.853808","172.30.1.205","172.30.1.104","TCP","54","41984 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10757","4.854151","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10758","4.854447","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10759","4.854456","172.30.1.205","172.30.1.104","TCP","54","41984 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10760","4.856613","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10761","4.857009","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10762","4.857017","172.30.1.205","172.30.1.104","TCP","54","41984 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10763","4.858836","172.30.1.205","172.30.1.104","TCP","54","41984 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10764","4.858950","172.30.1.205","172.30.1.104","TCP","74","34622 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908085 TSecr=0 WS=128" "10765","4.859091","172.30.1.104","172.30.1.205","TCP","54","135 > 41984 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10766","4.859122","172.30.1.104","172.30.1.205","TCP","54","135 > 41984 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10767","4.859127","172.30.1.205","172.30.1.104","TCP","54","41984 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10768","4.859255","172.30.1.104","172.30.1.205","TCP","66","49671 > 34622 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10769","4.859262","172.30.1.205","172.30.1.104","TCP","54","34622 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10770","4.859603","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10771","4.859890","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10772","4.859899","172.30.1.205","172.30.1.104","TCP","54","34622 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10773","4.861790","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10774","4.862171","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10775","4.862178","172.30.1.205","172.30.1.104","TCP","54","34622 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10776","4.863526","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10777","4.864904","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10778","4.864913","172.30.1.205","172.30.1.104","TCP","54","34622 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10779","4.865851","172.30.1.205","172.30.1.104","TCP","74","41988 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908092 TSecr=0 WS=128" "10780","4.866143","172.30.1.104","172.30.1.205","TCP","66","135 > 41988 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10781","4.866154","172.30.1.205","172.30.1.104","TCP","54","41988 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10782","4.866510","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10783","4.866806","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10784","4.866815","172.30.1.205","172.30.1.104","TCP","54","41988 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10785","4.869016","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10786","4.869383","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10787","4.869390","172.30.1.205","172.30.1.104","TCP","54","41988 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10788","4.871182","172.30.1.205","172.30.1.104","TCP","54","41988 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10789","4.871295","172.30.1.205","172.30.1.104","TCP","74","34626 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908097 TSecr=0 WS=128" "10790","4.871471","172.30.1.104","172.30.1.205","TCP","54","135 > 41988 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10791","4.871501","172.30.1.104","172.30.1.205","TCP","54","135 > 41988 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10792","4.871507","172.30.1.205","172.30.1.104","TCP","54","41988 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10793","4.871604","172.30.1.104","172.30.1.205","TCP","66","49671 > 34626 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10794","4.871612","172.30.1.205","172.30.1.104","TCP","54","34626 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10795","4.871955","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10796","4.872258","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10797","4.872267","172.30.1.205","172.30.1.104","TCP","54","34626 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10798","4.874155","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10799","4.874539","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10800","4.874545","172.30.1.205","172.30.1.104","TCP","54","34626 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10801","4.875890","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10802","4.877281","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10803","4.877290","172.30.1.205","172.30.1.104","TCP","54","34626 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10804","4.878235","172.30.1.205","172.30.1.104","TCP","74","41992 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908104 TSecr=0 WS=128" "10805","4.878611","172.30.1.104","172.30.1.205","TCP","66","135 > 41992 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10806","4.878622","172.30.1.205","172.30.1.104","TCP","54","41992 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10807","4.878969","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10808","4.879267","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10809","4.879276","172.30.1.205","172.30.1.104","TCP","54","41992 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10810","4.881468","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10811","4.881868","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10812","4.881874","172.30.1.205","172.30.1.104","TCP","54","41992 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10813","4.883678","172.30.1.205","172.30.1.104","TCP","54","41992 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10814","4.883787","172.30.1.205","172.30.1.104","TCP","74","34630 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908110 TSecr=0 WS=128" "10815","4.883994","172.30.1.104","172.30.1.205","TCP","54","135 > 41992 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10816","4.884003","172.30.1.104","172.30.1.205","TCP","54","135 > 41992 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10817","4.884008","172.30.1.205","172.30.1.104","TCP","54","41992 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10818","4.884084","172.30.1.104","172.30.1.205","TCP","66","49671 > 34630 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10819","4.884092","172.30.1.205","172.30.1.104","TCP","54","34630 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10820","4.884438","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10821","4.884748","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10822","4.884755","172.30.1.205","172.30.1.104","TCP","54","34630 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10823","4.886608","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10824","4.886967","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10825","4.886974","172.30.1.205","172.30.1.104","TCP","54","34630 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10826","4.888299","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10827","4.889669","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10828","4.889688","172.30.1.205","172.30.1.104","TCP","54","34630 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10829","4.890646","172.30.1.205","172.30.1.104","TCP","74","41996 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908117 TSecr=0 WS=128" "10830","4.890934","172.30.1.104","172.30.1.205","TCP","66","135 > 41996 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10831","4.890944","172.30.1.205","172.30.1.104","TCP","54","41996 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10832","4.891285","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10833","4.891575","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10834","4.891588","172.30.1.205","172.30.1.104","TCP","54","41996 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10835","4.893788","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10836","4.894201","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10837","4.894209","172.30.1.205","172.30.1.104","TCP","54","41996 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10838","4.895072","172.30.1.205","172.30.1.104","TCP","54","34590 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10839","4.895120","172.30.1.205","172.30.1.104","TCP","54","34594 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10840","4.895151","172.30.1.205","172.30.1.104","TCP","54","34598 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10841","4.895185","172.30.1.205","172.30.1.104","TCP","54","34602 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10842","4.895217","172.30.1.205","172.30.1.104","TCP","54","34606 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10843","4.895247","172.30.1.205","172.30.1.104","TCP","54","34610 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10844","4.895278","172.30.1.205","172.30.1.104","TCP","54","34614 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10845","4.895309","172.30.1.205","172.30.1.104","TCP","54","34618 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10846","4.895339","172.30.1.205","172.30.1.104","TCP","54","34622 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10847","4.895370","172.30.1.205","172.30.1.104","TCP","54","34626 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10848","4.895400","172.30.1.205","172.30.1.104","TCP","54","34630 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10849","4.895469","172.30.1.205","172.30.1.104","TCP","54","34586 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "10850","4.895662","172.30.1.104","172.30.1.205","TCP","54","49671 > 34590 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10851","4.895678","172.30.1.104","172.30.1.205","TCP","54","49671 > 34594 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10852","4.895709","172.30.1.104","172.30.1.205","TCP","54","49671 > 34590 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10853","4.895716","172.30.1.205","172.30.1.104","TCP","54","34590 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10854","4.895738","172.30.1.104","172.30.1.205","TCP","54","49671 > 34598 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10855","4.895761","172.30.1.104","172.30.1.205","TCP","54","49671 > 34602 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10856","4.895805","172.30.1.104","172.30.1.205","TCP","54","49671 > 34602 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10857","4.895810","172.30.1.205","172.30.1.104","TCP","54","34602 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10858","4.895823","172.30.1.104","172.30.1.205","TCP","54","49671 > 34606 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10859","4.895886","172.30.1.104","172.30.1.205","TCP","54","49671 > 34606 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10860","4.895891","172.30.1.205","172.30.1.104","TCP","54","34606 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10861","4.895907","172.30.1.104","172.30.1.205","TCP","54","49671 > 34610 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10862","4.895931","172.30.1.104","172.30.1.205","TCP","54","49671 > 34614 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10863","4.895950","172.30.1.104","172.30.1.205","TCP","54","49671 > 34614 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10864","4.895954","172.30.1.205","172.30.1.104","TCP","54","34614 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10865","4.895970","172.30.1.104","172.30.1.205","TCP","54","49671 > 34618 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10866","4.895990","172.30.1.104","172.30.1.205","TCP","54","49671 > 34610 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10867","4.895993","172.30.1.205","172.30.1.104","TCP","54","34610 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10868","4.896010","172.30.1.104","172.30.1.205","TCP","54","49671 > 34622 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10869","4.896096","172.30.1.104","172.30.1.205","TCP","54","49671 > 34622 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10870","4.896100","172.30.1.205","172.30.1.104","TCP","54","34622 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10871","4.896125","172.30.1.104","172.30.1.205","TCP","54","49671 > 34618 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10872","4.896127","172.30.1.205","172.30.1.104","TCP","54","34618 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10873","4.896157","172.30.1.104","172.30.1.205","TCP","54","49671 > 34626 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10874","4.896499","172.30.1.104","172.30.1.205","TCP","54","49671 > 34630 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10875","4.896516","172.30.1.104","172.30.1.205","TCP","54","49671 > 34630 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10876","4.896521","172.30.1.205","172.30.1.104","TCP","54","34630 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10877","4.896536","172.30.1.104","172.30.1.205","TCP","54","49671 > 34626 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10878","4.896539","172.30.1.205","172.30.1.104","TCP","54","34626 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10879","4.896558","172.30.1.104","172.30.1.205","TCP","54","49671 > 34594 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10880","4.896561","172.30.1.205","172.30.1.104","TCP","54","34594 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10881","4.896637","172.30.1.104","172.30.1.205","TCP","54","49671 > 34598 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10882","4.896641","172.30.1.205","172.30.1.104","TCP","54","34598 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10883","4.896656","172.30.1.104","172.30.1.205","TCP","54","49671 > 34586 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10884","4.896676","172.30.1.104","172.30.1.205","TCP","54","49671 > 34586 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "10885","4.896679","172.30.1.205","172.30.1.104","TCP","54","34586 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "10886","4.897095","172.30.1.205","172.30.1.104","TCP","54","41996 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10887","4.897204","172.30.1.205","172.30.1.104","TCP","74","34634 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908123 TSecr=0 WS=128" "10888","4.897350","172.30.1.104","172.30.1.205","TCP","54","135 > 41996 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10889","4.897393","172.30.1.104","172.30.1.205","TCP","54","135 > 41996 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10890","4.897397","172.30.1.205","172.30.1.104","TCP","54","41996 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10891","4.897482","172.30.1.104","172.30.1.205","TCP","66","49671 > 34634 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10892","4.897490","172.30.1.205","172.30.1.104","TCP","54","34634 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10893","4.897842","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10894","4.898145","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10895","4.898153","172.30.1.205","172.30.1.104","TCP","54","34634 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10896","4.900021","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10897","4.900386","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10898","4.900393","172.30.1.205","172.30.1.104","TCP","54","34634 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10899","4.901756","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10900","4.903262","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10901","4.903273","172.30.1.205","172.30.1.104","TCP","54","34634 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10902","4.904225","172.30.1.205","172.30.1.104","TCP","74","42000 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908130 TSecr=0 WS=128" "10903","4.904532","172.30.1.104","172.30.1.205","TCP","66","135 > 42000 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10904","4.904542","172.30.1.205","172.30.1.104","TCP","54","42000 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10905","4.904925","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10906","4.905253","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10907","4.905262","172.30.1.205","172.30.1.104","TCP","54","42000 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10908","4.907421","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10909","4.907848","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10910","4.907854","172.30.1.205","172.30.1.104","TCP","54","42000 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10911","4.909663","172.30.1.205","172.30.1.104","TCP","54","42000 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10912","4.909773","172.30.1.205","172.30.1.104","TCP","74","34638 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908136 TSecr=0 WS=128" "10913","4.909951","172.30.1.104","172.30.1.205","TCP","54","135 > 42000 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10914","4.910041","172.30.1.104","172.30.1.205","TCP","54","135 > 42000 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10915","4.910046","172.30.1.205","172.30.1.104","TCP","54","42000 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10916","4.910082","172.30.1.104","172.30.1.205","TCP","66","49671 > 34638 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10917","4.910090","172.30.1.205","172.30.1.104","TCP","54","34638 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10918","4.910428","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10919","4.910766","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10920","4.910774","172.30.1.205","172.30.1.104","TCP","54","34638 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10921","4.912607","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10922","4.912980","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10923","4.912987","172.30.1.205","172.30.1.104","TCP","54","34638 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10924","4.914329","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10925","4.915729","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10926","4.915738","172.30.1.205","172.30.1.104","TCP","54","34638 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10927","4.916653","172.30.1.205","172.30.1.104","TCP","74","42004 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908143 TSecr=0 WS=128" "10928","4.916964","172.30.1.104","172.30.1.205","TCP","66","135 > 42004 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10929","4.916976","172.30.1.205","172.30.1.104","TCP","54","42004 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10930","4.917330","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10931","4.917616","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10932","4.917624","172.30.1.205","172.30.1.104","TCP","54","42004 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10933","4.919771","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10934","4.920142","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10935","4.920149","172.30.1.205","172.30.1.104","TCP","54","42004 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10936","4.921954","172.30.1.205","172.30.1.104","TCP","54","42004 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10937","4.922063","172.30.1.205","172.30.1.104","TCP","74","34642 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908148 TSecr=0 WS=128" "10938","4.922216","172.30.1.104","172.30.1.205","TCP","54","135 > 42004 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10939","4.922238","172.30.1.104","172.30.1.205","TCP","54","135 > 42004 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10940","4.922243","172.30.1.205","172.30.1.104","TCP","54","42004 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10941","4.922315","172.30.1.104","172.30.1.205","TCP","66","49671 > 34642 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10942","4.922323","172.30.1.205","172.30.1.104","TCP","54","34642 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10943","4.922663","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10944","4.922957","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10945","4.922966","172.30.1.205","172.30.1.104","TCP","54","34642 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10946","4.924822","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10947","4.926861","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10948","4.926869","172.30.1.205","172.30.1.104","TCP","54","34642 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10949","4.928443","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10950","4.929801","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10951","4.929810","172.30.1.205","172.30.1.104","TCP","54","34642 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10952","4.930740","172.30.1.205","172.30.1.104","TCP","74","42008 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908157 TSecr=0 WS=128" "10953","4.931043","172.30.1.104","172.30.1.205","TCP","66","135 > 42008 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10954","4.931054","172.30.1.205","172.30.1.104","TCP","54","42008 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10955","4.931394","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10956","4.931689","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10957","4.931697","172.30.1.205","172.30.1.104","TCP","54","42008 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10958","4.933889","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10959","4.934294","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10960","4.934301","172.30.1.205","172.30.1.104","TCP","54","42008 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10961","4.936115","172.30.1.205","172.30.1.104","TCP","54","42008 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10962","4.936223","172.30.1.205","172.30.1.104","TCP","74","34646 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908162 TSecr=0 WS=128" "10963","4.936417","172.30.1.104","172.30.1.205","TCP","54","135 > 42008 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10964","4.936427","172.30.1.104","172.30.1.205","TCP","54","135 > 42008 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10965","4.936432","172.30.1.205","172.30.1.104","TCP","54","42008 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10966","4.936536","172.30.1.104","172.30.1.205","TCP","66","49671 > 34646 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10967","4.936543","172.30.1.205","172.30.1.104","TCP","54","34646 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10968","4.936932","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10969","4.937249","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10970","4.937256","172.30.1.205","172.30.1.104","TCP","54","34646 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10971","4.939143","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10972","4.939617","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10973","4.939623","172.30.1.205","172.30.1.104","TCP","54","34646 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10974","4.940979","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "10975","4.943137","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "10976","4.943146","172.30.1.205","172.30.1.104","TCP","54","34646 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "10977","4.944075","172.30.1.205","172.30.1.104","TCP","74","42012 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908170 TSecr=0 WS=128" "10978","4.944376","172.30.1.104","172.30.1.205","TCP","66","135 > 42012 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10979","4.944398","172.30.1.205","172.30.1.104","TCP","54","42012 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10980","4.944740","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "10981","4.945025","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10982","4.945034","172.30.1.205","172.30.1.104","TCP","54","42012 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10983","4.947251","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "10984","4.947625","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "10985","4.947632","172.30.1.205","172.30.1.104","TCP","54","42012 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "10986","4.949465","172.30.1.205","172.30.1.104","TCP","54","42012 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "10987","4.949570","172.30.1.205","172.30.1.104","TCP","74","34650 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908175 TSecr=0 WS=128" "10988","4.949714","172.30.1.104","172.30.1.205","TCP","54","135 > 42012 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10989","4.949749","172.30.1.104","172.30.1.205","TCP","54","135 > 42012 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "10990","4.949754","172.30.1.205","172.30.1.104","TCP","54","42012 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "10991","4.949848","172.30.1.104","172.30.1.205","TCP","66","49671 > 34650 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "10992","4.949856","172.30.1.205","172.30.1.104","TCP","54","34650 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "10993","4.950195","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "10994","4.950472","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "10995","4.950481","172.30.1.205","172.30.1.104","TCP","54","34650 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "10996","4.952332","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "10997","4.952675","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "10998","4.952681","172.30.1.205","172.30.1.104","TCP","54","34650 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "10999","4.954032","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11000","4.955417","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11001","4.955426","172.30.1.205","172.30.1.104","TCP","54","34650 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11002","4.956341","172.30.1.205","172.30.1.104","TCP","74","42016 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908182 TSecr=0 WS=128" "11003","4.956732","172.30.1.104","172.30.1.205","TCP","66","135 > 42016 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11004","4.956742","172.30.1.205","172.30.1.104","TCP","54","42016 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11005","4.957106","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11006","4.957393","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11007","4.957402","172.30.1.205","172.30.1.104","TCP","54","42016 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11008","4.959555","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11009","4.959930","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11010","4.959936","172.30.1.205","172.30.1.104","TCP","54","42016 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11011","4.961760","172.30.1.205","172.30.1.104","TCP","54","42016 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11012","4.961867","172.30.1.205","172.30.1.104","TCP","74","34654 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908188 TSecr=0 WS=128" "11013","4.962082","172.30.1.104","172.30.1.205","TCP","54","135 > 42016 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11014","4.962093","172.30.1.104","172.30.1.205","TCP","54","135 > 42016 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11015","4.962100","172.30.1.205","172.30.1.104","TCP","54","42016 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11016","4.962110","172.30.1.104","172.30.1.205","TCP","66","49671 > 34654 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11017","4.962124","172.30.1.205","172.30.1.104","TCP","54","34654 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11018","4.962515","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11019","4.962788","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11020","4.962797","172.30.1.205","172.30.1.104","TCP","54","34654 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11021","4.964685","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11022","4.965071","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11023","4.965077","172.30.1.205","172.30.1.104","TCP","54","34654 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11024","4.966434","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11025","4.967825","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11026","4.967852","172.30.1.205","172.30.1.104","TCP","54","34654 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11027","4.969020","172.30.1.205","172.30.1.104","TCP","74","42020 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908195 TSecr=0 WS=128" "11028","4.969330","172.30.1.104","172.30.1.205","TCP","66","135 > 42020 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11029","4.969341","172.30.1.205","172.30.1.104","TCP","54","42020 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11030","4.969693","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11031","4.969962","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11032","4.969971","172.30.1.205","172.30.1.104","TCP","54","42020 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11033","4.972160","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11034","4.972513","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11035","4.972520","172.30.1.205","172.30.1.104","TCP","54","42020 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11036","4.974353","172.30.1.205","172.30.1.104","TCP","54","42020 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11037","4.974462","172.30.1.205","172.30.1.104","TCP","74","34658 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908200 TSecr=0 WS=128" "11038","4.974586","172.30.1.104","172.30.1.205","TCP","54","135 > 42020 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11039","4.974617","172.30.1.104","172.30.1.205","TCP","54","135 > 42020 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11040","4.974622","172.30.1.205","172.30.1.104","TCP","54","42020 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11041","4.974740","172.30.1.104","172.30.1.205","TCP","66","49671 > 34658 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11042","4.974747","172.30.1.205","172.30.1.104","TCP","54","34658 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11043","4.975119","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11044","4.975391","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11045","4.975399","172.30.1.205","172.30.1.104","TCP","54","34658 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11046","4.977342","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11047","4.977691","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11048","4.977697","172.30.1.205","172.30.1.104","TCP","54","34658 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11049","4.979091","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11050","4.980502","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11051","4.980511","172.30.1.205","172.30.1.104","TCP","54","34658 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11052","4.981454","172.30.1.205","172.30.1.104","TCP","74","42024 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908207 TSecr=0 WS=128" "11053","4.981750","172.30.1.104","172.30.1.205","TCP","66","135 > 42024 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11054","4.981761","172.30.1.205","172.30.1.104","TCP","54","42024 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11055","4.982105","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11056","4.982431","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11057","4.982440","172.30.1.205","172.30.1.104","TCP","54","42024 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11058","4.984627","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11059","4.985005","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11060","4.985012","172.30.1.205","172.30.1.104","TCP","54","42024 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11061","4.986817","172.30.1.205","172.30.1.104","TCP","54","42024 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11062","4.986931","172.30.1.205","172.30.1.104","TCP","74","34662 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908213 TSecr=0 WS=128" "11063","4.987085","172.30.1.104","172.30.1.205","TCP","54","135 > 42024 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11064","4.987152","172.30.1.104","172.30.1.205","TCP","54","135 > 42024 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11065","4.987157","172.30.1.205","172.30.1.104","TCP","54","42024 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11066","4.987244","172.30.1.104","172.30.1.205","TCP","66","49671 > 34662 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11067","4.987251","172.30.1.205","172.30.1.104","TCP","54","34662 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11068","4.987612","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11069","4.987912","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11070","4.987920","172.30.1.205","172.30.1.104","TCP","54","34662 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11071","4.989793","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11072","4.990147","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11073","4.990153","172.30.1.205","172.30.1.104","TCP","54","34662 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11074","4.991492","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11075","4.992867","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11076","4.992876","172.30.1.205","172.30.1.104","TCP","54","34662 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11077","4.993809","172.30.1.205","172.30.1.104","TCP","74","42028 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908220 TSecr=0 WS=128" "11078","4.994100","172.30.1.104","172.30.1.205","TCP","66","135 > 42028 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11079","4.994110","172.30.1.205","172.30.1.104","TCP","54","42028 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11080","4.994456","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11081","4.994753","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11082","4.994762","172.30.1.205","172.30.1.104","TCP","54","42028 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11083","4.996978","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11084","4.997398","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11085","4.997404","172.30.1.205","172.30.1.104","TCP","54","42028 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11086","4.999189","172.30.1.205","172.30.1.104","TCP","54","42028 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11087","4.999297","172.30.1.205","172.30.1.104","TCP","74","34666 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908225 TSecr=0 WS=128" "11088","4.999459","172.30.1.104","172.30.1.205","TCP","54","135 > 42028 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11089","4.999488","172.30.1.104","172.30.1.205","TCP","54","135 > 42028 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11090","4.999493","172.30.1.205","172.30.1.104","TCP","54","42028 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11091","4.999566","172.30.1.104","172.30.1.205","TCP","66","49671 > 34666 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11092","4.999574","172.30.1.205","172.30.1.104","TCP","54","34666 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11093","4.999913","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11094","5.000194","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11095","5.000203","172.30.1.205","172.30.1.104","TCP","54","34666 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11096","5.002084","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11097","5.002452","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11098","5.002458","172.30.1.205","172.30.1.104","TCP","54","34666 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11099","5.003776","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11100","5.005148","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11101","5.005157","172.30.1.205","172.30.1.104","TCP","54","34666 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11102","5.006086","172.30.1.205","172.30.1.104","TCP","74","42032 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908232 TSecr=0 WS=128" "11103","5.006381","172.30.1.104","172.30.1.205","TCP","66","135 > 42032 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11104","5.006391","172.30.1.205","172.30.1.104","TCP","54","42032 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11105","5.006731","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11106","5.007052","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11107","5.007061","172.30.1.205","172.30.1.104","TCP","54","42032 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11108","5.009238","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11109","5.009612","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11110","5.009619","172.30.1.205","172.30.1.104","TCP","54","42032 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11111","5.011418","172.30.1.205","172.30.1.104","TCP","54","42032 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11112","5.011541","172.30.1.205","172.30.1.104","TCP","74","34670 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908237 TSecr=0 WS=128" "11113","5.011666","172.30.1.104","172.30.1.205","TCP","54","135 > 42032 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11114","5.011689","172.30.1.104","172.30.1.205","TCP","54","135 > 42032 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11115","5.011695","172.30.1.205","172.30.1.104","TCP","54","42032 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11116","5.011825","172.30.1.104","172.30.1.205","TCP","66","49671 > 34670 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11117","5.011834","172.30.1.205","172.30.1.104","TCP","54","34670 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11118","5.012183","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11119","5.012477","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11120","5.012490","172.30.1.205","172.30.1.104","TCP","54","34670 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11121","5.014469","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11122","5.014978","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11123","5.014985","172.30.1.205","172.30.1.104","TCP","54","34670 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11124","5.016344","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11125","5.017833","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11126","5.017845","172.30.1.205","172.30.1.104","TCP","54","34670 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11127","5.018856","172.30.1.205","172.30.1.104","TCP","74","42036 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908245 TSecr=0 WS=128" "11128","5.019161","172.30.1.104","172.30.1.205","TCP","66","135 > 42036 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11129","5.019173","172.30.1.205","172.30.1.104","TCP","54","42036 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11130","5.019524","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11131","5.019807","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11132","5.019820","172.30.1.205","172.30.1.104","TCP","54","42036 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11133","5.022144","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11134","5.022601","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11135","5.022608","172.30.1.205","172.30.1.104","TCP","54","42036 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11136","5.024429","172.30.1.205","172.30.1.104","TCP","54","42036 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11137","5.024560","172.30.1.205","172.30.1.104","TCP","74","34674 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908250 TSecr=0 WS=128" "11138","5.024690","172.30.1.104","172.30.1.205","TCP","54","135 > 42036 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11139","5.024729","172.30.1.104","172.30.1.205","TCP","54","135 > 42036 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11140","5.024737","172.30.1.205","172.30.1.104","TCP","54","42036 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11141","5.024873","172.30.1.104","172.30.1.205","TCP","66","49671 > 34674 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11142","5.024883","172.30.1.205","172.30.1.104","TCP","54","34674 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11143","5.025242","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11144","5.025543","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11145","5.025552","172.30.1.205","172.30.1.104","TCP","54","34674 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11146","5.027445","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11147","5.027859","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11148","5.027865","172.30.1.205","172.30.1.104","TCP","54","34674 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11149","5.029248","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11150","5.030697","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11151","5.030708","172.30.1.205","172.30.1.104","TCP","54","34674 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11152","5.031706","172.30.1.205","172.30.1.104","TCP","74","42040 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908258 TSecr=0 WS=128" "11153","5.032013","172.30.1.104","172.30.1.205","TCP","66","135 > 42040 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11154","5.032026","172.30.1.205","172.30.1.104","TCP","54","42040 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11155","5.032391","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11156","5.032681","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11157","5.032690","172.30.1.205","172.30.1.104","TCP","54","42040 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11158","5.034895","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11159","5.035285","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11160","5.035291","172.30.1.205","172.30.1.104","TCP","54","42040 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11161","5.037135","172.30.1.205","172.30.1.104","TCP","54","42040 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11162","5.037252","172.30.1.205","172.30.1.104","TCP","74","34678 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908263 TSecr=0 WS=128" "11163","5.037385","172.30.1.104","172.30.1.205","TCP","54","135 > 42040 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11164","5.037398","172.30.1.104","172.30.1.205","TCP","54","135 > 42040 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11165","5.037405","172.30.1.205","172.30.1.104","TCP","54","42040 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11166","5.037510","172.30.1.104","172.30.1.205","TCP","66","49671 > 34678 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11167","5.037518","172.30.1.205","172.30.1.104","TCP","54","34678 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11168","5.037860","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11169","5.040206","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11170","5.040218","172.30.1.205","172.30.1.104","TCP","54","34678 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11171","5.042161","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11172","5.042558","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11173","5.042565","172.30.1.205","172.30.1.104","TCP","54","34678 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11174","5.043912","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11175","5.045418","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11176","5.045429","172.30.1.205","172.30.1.104","TCP","54","34678 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11177","5.046393","172.30.1.205","172.30.1.104","TCP","74","42044 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908272 TSecr=0 WS=128" "11178","5.046731","172.30.1.104","172.30.1.205","TCP","66","135 > 42044 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11179","5.046746","172.30.1.205","172.30.1.104","TCP","54","42044 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11180","5.047128","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11181","5.047435","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11182","5.047444","172.30.1.205","172.30.1.104","TCP","54","42044 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11183","5.049652","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11184","5.050102","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11185","5.050111","172.30.1.205","172.30.1.104","TCP","54","42044 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11186","5.051010","172.30.1.205","172.30.1.104","TCP","54","34634 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11187","5.051059","172.30.1.205","172.30.1.104","TCP","54","34638 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11188","5.051096","172.30.1.205","172.30.1.104","TCP","54","34642 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11189","5.051129","172.30.1.205","172.30.1.104","TCP","54","34646 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11190","5.051162","172.30.1.205","172.30.1.104","TCP","54","34650 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11191","5.051190","172.30.1.205","172.30.1.104","TCP","54","34654 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11192","5.051223","172.30.1.205","172.30.1.104","TCP","54","34658 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11193","5.051246","172.30.1.205","172.30.1.104","TCP","54","34662 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11194","5.051258","172.30.1.104","172.30.1.205","TCP","54","49671 > 34634 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11195","5.051297","172.30.1.205","172.30.1.104","TCP","54","34666 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11196","5.051326","172.30.1.205","172.30.1.104","TCP","54","34670 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11197","5.051352","172.30.1.205","172.30.1.104","TCP","54","34674 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11198","5.051383","172.30.1.205","172.30.1.104","TCP","54","34678 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11199","5.051609","172.30.1.104","172.30.1.205","TCP","54","49671 > 34638 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11200","5.051626","172.30.1.104","172.30.1.205","TCP","54","49671 > 34634 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11201","5.051634","172.30.1.205","172.30.1.104","TCP","54","34634 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11202","5.051645","172.30.1.104","172.30.1.205","TCP","54","49671 > 34642 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11203","5.051667","172.30.1.104","172.30.1.205","TCP","54","49671 > 34638 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11204","5.051675","172.30.1.205","172.30.1.104","TCP","54","34638 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11205","5.051709","172.30.1.104","172.30.1.205","TCP","54","49671 > 34646 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11206","5.051729","172.30.1.104","172.30.1.205","TCP","54","49671 > 34642 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11207","5.051733","172.30.1.205","172.30.1.104","TCP","54","34642 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11208","5.051749","172.30.1.104","172.30.1.205","TCP","54","49671 > 34650 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11209","5.051800","172.30.1.104","172.30.1.205","TCP","54","49671 > 34654 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11210","5.051817","172.30.1.104","172.30.1.205","TCP","54","49671 > 34654 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11211","5.051821","172.30.1.205","172.30.1.104","TCP","54","34654 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11212","5.051838","172.30.1.104","172.30.1.205","TCP","54","49671 > 34658 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11213","5.051859","172.30.1.104","172.30.1.205","TCP","54","49671 > 34658 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11214","5.051863","172.30.1.205","172.30.1.104","TCP","54","34658 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11215","5.051878","172.30.1.104","172.30.1.205","TCP","54","49671 > 34662 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11216","5.051896","172.30.1.104","172.30.1.205","TCP","54","49671 > 34666 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11217","5.051916","172.30.1.104","172.30.1.205","TCP","54","49671 > 34670 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11218","5.051937","172.30.1.104","172.30.1.205","TCP","54","49671 > 34666 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11219","5.051941","172.30.1.205","172.30.1.104","TCP","54","34666 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11220","5.051956","172.30.1.104","172.30.1.205","TCP","54","49671 > 34674 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11221","5.051986","172.30.1.104","172.30.1.205","TCP","54","49671 > 34662 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11222","5.051989","172.30.1.205","172.30.1.104","TCP","54","34662 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11223","5.052029","172.30.1.104","172.30.1.205","TCP","54","49671 > 34678 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11224","5.052050","172.30.1.104","172.30.1.205","TCP","54","49671 > 34678 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11225","5.052053","172.30.1.205","172.30.1.104","TCP","54","34678 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11226","5.052068","172.30.1.104","172.30.1.205","TCP","54","49671 > 34674 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11227","5.052071","172.30.1.205","172.30.1.104","TCP","54","34674 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11228","5.052087","172.30.1.104","172.30.1.205","TCP","54","49671 > 34670 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11229","5.052090","172.30.1.205","172.30.1.104","TCP","54","34670 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11230","5.052110","172.30.1.104","172.30.1.205","TCP","54","49671 > 34646 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11231","5.052114","172.30.1.205","172.30.1.104","TCP","54","34646 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11232","5.052128","172.30.1.104","172.30.1.205","TCP","54","49671 > 34650 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11233","5.052131","172.30.1.205","172.30.1.104","TCP","54","34650 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11234","5.053004","172.30.1.205","172.30.1.104","TCP","54","42044 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11235","5.053124","172.30.1.205","172.30.1.104","TCP","74","34682 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908279 TSecr=0 WS=128" "11236","5.053277","172.30.1.104","172.30.1.205","TCP","54","135 > 42044 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11237","5.053291","172.30.1.104","172.30.1.205","TCP","54","135 > 42044 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11238","5.053296","172.30.1.205","172.30.1.104","TCP","54","42044 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11239","5.053394","172.30.1.104","172.30.1.205","TCP","66","49671 > 34682 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11240","5.053402","172.30.1.205","172.30.1.104","TCP","54","34682 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11241","5.053759","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11242","5.054040","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11243","5.054049","172.30.1.205","172.30.1.104","TCP","54","34682 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11244","5.055932","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11245","5.056292","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11246","5.056299","172.30.1.205","172.30.1.104","TCP","54","34682 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11247","5.057698","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11248","5.059285","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11249","5.059297","172.30.1.205","172.30.1.104","TCP","54","34682 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11250","5.060284","172.30.1.205","172.30.1.104","TCP","74","42048 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908286 TSecr=0 WS=128" "11251","5.060572","172.30.1.104","172.30.1.205","TCP","66","135 > 42048 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11252","5.060583","172.30.1.205","172.30.1.104","TCP","54","42048 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11253","5.060974","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11254","5.061253","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11255","5.061262","172.30.1.205","172.30.1.104","TCP","54","42048 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11256","5.063448","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11257","5.063871","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11258","5.063878","172.30.1.205","172.30.1.104","TCP","54","42048 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11259","5.065708","172.30.1.205","172.30.1.104","TCP","54","42048 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11260","5.065822","172.30.1.205","172.30.1.104","TCP","74","34686 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908292 TSecr=0 WS=128" "11261","5.065984","172.30.1.104","172.30.1.205","TCP","54","135 > 42048 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11262","5.066034","172.30.1.104","172.30.1.205","TCP","54","135 > 42048 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11263","5.066040","172.30.1.205","172.30.1.104","TCP","54","42048 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11264","5.066124","172.30.1.104","172.30.1.205","TCP","66","49671 > 34686 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11265","5.066132","172.30.1.205","172.30.1.104","TCP","54","34686 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11266","5.066472","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11267","5.066759","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11268","5.066768","172.30.1.205","172.30.1.104","TCP","54","34686 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11269","5.068635","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11270","5.069019","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11271","5.069026","172.30.1.205","172.30.1.104","TCP","54","34686 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11272","5.070368","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11273","5.071841","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11274","5.071852","172.30.1.205","172.30.1.104","TCP","54","34686 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11275","5.072828","172.30.1.205","172.30.1.104","TCP","74","42052 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908299 TSecr=0 WS=128" "11276","5.073113","172.30.1.104","172.30.1.205","TCP","66","135 > 42052 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11277","5.073123","172.30.1.205","172.30.1.104","TCP","54","42052 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11278","5.073467","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11279","5.073783","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11280","5.073792","172.30.1.205","172.30.1.104","TCP","54","42052 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11281","5.075961","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11282","5.076348","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11283","5.076355","172.30.1.205","172.30.1.104","TCP","54","42052 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11284","5.078181","172.30.1.205","172.30.1.104","TCP","54","42052 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11285","5.078302","172.30.1.205","172.30.1.104","TCP","74","34690 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908304 TSecr=0 WS=128" "11286","5.078552","172.30.1.104","172.30.1.205","TCP","54","135 > 42052 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11287","5.078608","172.30.1.104","172.30.1.205","TCP","66","49671 > 34690 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11288","5.078617","172.30.1.205","172.30.1.104","TCP","54","34690 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11289","5.078649","172.30.1.104","172.30.1.205","TCP","54","135 > 42052 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11290","5.078655","172.30.1.205","172.30.1.104","TCP","54","42052 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11291","5.078995","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11292","5.079345","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11293","5.079352","172.30.1.205","172.30.1.104","TCP","54","34690 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11294","5.081234","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11295","5.081589","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11296","5.081595","172.30.1.205","172.30.1.104","TCP","54","34690 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11297","5.082926","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11298","5.084370","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11299","5.084379","172.30.1.205","172.30.1.104","TCP","54","34690 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11300","5.085341","172.30.1.205","172.30.1.104","TCP","74","42056 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908311 TSecr=0 WS=128" "11301","5.085672","172.30.1.104","172.30.1.205","TCP","66","135 > 42056 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11302","5.085683","172.30.1.205","172.30.1.104","TCP","54","42056 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11303","5.086024","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11304","5.086310","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11305","5.086319","172.30.1.205","172.30.1.104","TCP","54","42056 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11306","5.088475","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11307","5.088913","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11308","5.088920","172.30.1.205","172.30.1.104","TCP","54","42056 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11309","5.090710","172.30.1.205","172.30.1.104","TCP","54","42056 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11310","5.090821","172.30.1.205","172.30.1.104","TCP","74","34694 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908317 TSecr=0 WS=128" "11311","5.090965","172.30.1.104","172.30.1.205","TCP","54","135 > 42056 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11312","5.091038","172.30.1.104","172.30.1.205","TCP","54","135 > 42056 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11313","5.091045","172.30.1.205","172.30.1.104","TCP","54","42056 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11314","5.091117","172.30.1.104","172.30.1.205","TCP","66","49671 > 34694 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11315","5.091125","172.30.1.205","172.30.1.104","TCP","54","34694 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11316","5.091464","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11317","5.091763","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11318","5.091772","172.30.1.205","172.30.1.104","TCP","54","34694 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11319","5.093652","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11320","5.094007","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11321","5.094013","172.30.1.205","172.30.1.104","TCP","54","34694 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11322","5.095341","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11323","5.096859","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11324","5.096868","172.30.1.205","172.30.1.104","TCP","54","34694 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11325","5.097803","172.30.1.205","172.30.1.104","TCP","74","42060 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908324 TSecr=0 WS=128" "11326","5.098101","172.30.1.104","172.30.1.205","TCP","66","135 > 42060 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11327","5.098111","172.30.1.205","172.30.1.104","TCP","54","42060 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11328","5.098452","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11329","5.098745","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11330","5.098754","172.30.1.205","172.30.1.104","TCP","54","42060 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11331","5.100966","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11332","5.101348","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11333","5.101354","172.30.1.205","172.30.1.104","TCP","54","42060 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11334","5.103155","172.30.1.205","172.30.1.104","TCP","54","42060 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11335","5.103264","172.30.1.205","172.30.1.104","TCP","74","34698 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908329 TSecr=0 WS=128" "11336","5.103416","172.30.1.104","172.30.1.205","TCP","54","135 > 42060 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11337","5.103430","172.30.1.104","172.30.1.205","TCP","54","135 > 42060 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11338","5.103436","172.30.1.205","172.30.1.104","TCP","54","42060 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11339","5.103545","172.30.1.104","172.30.1.205","TCP","66","49671 > 34698 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11340","5.103553","172.30.1.205","172.30.1.104","TCP","54","34698 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11341","5.103909","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11342","5.104190","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11343","5.104199","172.30.1.205","172.30.1.104","TCP","54","34698 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11344","5.106074","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11345","5.106428","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11346","5.106434","172.30.1.205","172.30.1.104","TCP","54","34698 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11347","5.107763","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11348","5.109161","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11349","5.109170","172.30.1.205","172.30.1.104","TCP","54","34698 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11350","5.110103","172.30.1.205","172.30.1.104","TCP","74","42064 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908336 TSecr=0 WS=128" "11351","5.110410","172.30.1.104","172.30.1.205","TCP","66","135 > 42064 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11352","5.110421","172.30.1.205","172.30.1.104","TCP","54","42064 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11353","5.110764","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11354","5.111045","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11355","5.111054","172.30.1.205","172.30.1.104","TCP","54","42064 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11356","5.113238","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11357","5.113617","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11358","5.113623","172.30.1.205","172.30.1.104","TCP","54","42064 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11359","5.115411","172.30.1.205","172.30.1.104","TCP","54","42064 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11360","5.115522","172.30.1.205","172.30.1.104","TCP","74","34702 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908341 TSecr=0 WS=128" "11361","5.115686","172.30.1.104","172.30.1.205","TCP","54","135 > 42064 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11362","5.115729","172.30.1.104","172.30.1.205","TCP","54","135 > 42064 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11363","5.115735","172.30.1.205","172.30.1.104","TCP","54","42064 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11364","5.115820","172.30.1.104","172.30.1.205","TCP","66","49671 > 34702 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11365","5.115828","172.30.1.205","172.30.1.104","TCP","54","34702 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11366","5.116173","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11367","5.116484","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11368","5.116493","172.30.1.205","172.30.1.104","TCP","54","34702 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11369","5.118383","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11370","5.118789","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11371","5.118797","172.30.1.205","172.30.1.104","TCP","54","34702 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11372","5.120139","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11373","5.121605","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11374","5.121614","172.30.1.205","172.30.1.104","TCP","54","34702 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11375","5.122556","172.30.1.205","172.30.1.104","TCP","74","42068 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908348 TSecr=0 WS=128" "11376","5.122869","172.30.1.104","172.30.1.205","TCP","66","135 > 42068 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11377","5.122880","172.30.1.205","172.30.1.104","TCP","54","42068 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11378","5.123223","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11379","5.123524","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11380","5.123532","172.30.1.205","172.30.1.104","TCP","54","42068 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11381","5.125754","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11382","5.126183","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11383","5.126191","172.30.1.205","172.30.1.104","TCP","54","42068 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11384","5.127999","172.30.1.205","172.30.1.104","TCP","54","42068 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11385","5.128112","172.30.1.205","172.30.1.104","TCP","74","34706 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908354 TSecr=0 WS=128" "11386","5.128256","172.30.1.104","172.30.1.205","TCP","54","135 > 42068 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11387","5.128320","172.30.1.104","172.30.1.205","TCP","54","135 > 42068 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11388","5.128327","172.30.1.205","172.30.1.104","TCP","54","42068 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11389","5.128363","172.30.1.104","172.30.1.205","TCP","66","49671 > 34706 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11390","5.128372","172.30.1.205","172.30.1.104","TCP","54","34706 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11391","5.128710","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11392","5.130783","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11393","5.130790","172.30.1.205","172.30.1.104","TCP","54","34706 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11394","5.132662","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11395","5.133030","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11396","5.133037","172.30.1.205","172.30.1.104","TCP","54","34706 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11397","5.134394","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11398","5.137594","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11399","5.137603","172.30.1.205","172.30.1.104","TCP","54","34706 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11400","5.138552","172.30.1.205","172.30.1.104","TCP","74","42072 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908364 TSecr=0 WS=128" "11401","5.138893","172.30.1.104","172.30.1.205","TCP","66","135 > 42072 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11402","5.138904","172.30.1.205","172.30.1.104","TCP","54","42072 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11403","5.139258","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11404","5.139584","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11405","5.139593","172.30.1.205","172.30.1.104","TCP","54","42072 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11406","5.141796","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11407","5.142182","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11408","5.142189","172.30.1.205","172.30.1.104","TCP","54","42072 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11409","5.143989","172.30.1.205","172.30.1.104","TCP","54","42072 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11410","5.144102","172.30.1.205","172.30.1.104","TCP","74","34710 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908370 TSecr=0 WS=128" "11411","5.144247","172.30.1.104","172.30.1.205","TCP","54","135 > 42072 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11412","5.144263","172.30.1.104","172.30.1.205","TCP","54","135 > 42072 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11413","5.144269","172.30.1.205","172.30.1.104","TCP","54","42072 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11414","5.144373","172.30.1.104","172.30.1.205","TCP","66","49671 > 34710 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11415","5.144382","172.30.1.205","172.30.1.104","TCP","54","34710 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11416","5.144721","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11417","5.145026","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11418","5.145035","172.30.1.205","172.30.1.104","TCP","54","34710 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11419","5.146920","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11420","5.147308","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11421","5.147314","172.30.1.205","172.30.1.104","TCP","54","34710 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11422","5.148660","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11423","5.150040","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11424","5.150049","172.30.1.205","172.30.1.104","TCP","54","34710 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11425","5.151001","172.30.1.205","172.30.1.104","TCP","74","42076 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908377 TSecr=0 WS=128" "11426","5.151302","172.30.1.104","172.30.1.205","TCP","66","135 > 42076 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11427","5.151314","172.30.1.205","172.30.1.104","TCP","54","42076 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11428","5.151667","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11429","5.151943","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11430","5.151952","172.30.1.205","172.30.1.104","TCP","54","42076 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11431","5.154146","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11432","5.154506","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11433","5.154513","172.30.1.205","172.30.1.104","TCP","54","42076 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11434","5.156306","172.30.1.205","172.30.1.104","TCP","54","42076 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11435","5.156421","172.30.1.205","172.30.1.104","TCP","74","34714 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908382 TSecr=0 WS=128" "11436","5.156571","172.30.1.104","172.30.1.205","TCP","54","135 > 42076 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11437","5.156583","172.30.1.104","172.30.1.205","TCP","54","135 > 42076 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11438","5.156589","172.30.1.205","172.30.1.104","TCP","54","42076 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11439","5.156696","172.30.1.104","172.30.1.205","TCP","66","49671 > 34714 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11440","5.156705","172.30.1.205","172.30.1.104","TCP","54","34714 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11441","5.157075","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11442","5.157372","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11443","5.157381","172.30.1.205","172.30.1.104","TCP","54","34714 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11444","5.159220","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11445","5.159581","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11446","5.159587","172.30.1.205","172.30.1.104","TCP","54","34714 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11447","5.160952","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11448","5.162345","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11449","5.162355","172.30.1.205","172.30.1.104","TCP","54","34714 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11450","5.163290","172.30.1.205","172.30.1.104","TCP","74","42080 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908389 TSecr=0 WS=128" "11451","5.163594","172.30.1.104","172.30.1.205","TCP","66","135 > 42080 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11452","5.163604","172.30.1.205","172.30.1.104","TCP","54","42080 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11453","5.163948","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11454","5.164232","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11455","5.164240","172.30.1.205","172.30.1.104","TCP","54","42080 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11456","5.166418","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11457","5.166803","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11458","5.166809","172.30.1.205","172.30.1.104","TCP","54","42080 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11459","5.168642","172.30.1.205","172.30.1.104","TCP","54","42080 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11460","5.168799","172.30.1.205","172.30.1.104","TCP","74","34718 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908395 TSecr=0 WS=128" "11461","5.168884","172.30.1.104","172.30.1.205","TCP","54","135 > 42080 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11462","5.168901","172.30.1.104","172.30.1.205","TCP","54","135 > 42080 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11463","5.168907","172.30.1.205","172.30.1.104","TCP","54","42080 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11464","5.169098","172.30.1.104","172.30.1.205","TCP","66","49671 > 34718 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11465","5.169106","172.30.1.205","172.30.1.104","TCP","54","34718 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11466","5.169473","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11467","5.169757","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11468","5.169766","172.30.1.205","172.30.1.104","TCP","54","34718 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11469","5.171692","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11470","5.172072","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11471","5.172078","172.30.1.205","172.30.1.104","TCP","54","34718 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11472","5.173429","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11473","5.174795","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11474","5.174804","172.30.1.205","172.30.1.104","TCP","54","34718 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11475","5.175721","172.30.1.205","172.30.1.104","TCP","74","42084 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908402 TSecr=0 WS=128" "11476","5.176037","172.30.1.104","172.30.1.205","TCP","66","135 > 42084 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11477","5.176058","172.30.1.205","172.30.1.104","TCP","54","42084 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11478","5.176629","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11479","5.176913","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11480","5.176922","172.30.1.205","172.30.1.104","TCP","54","42084 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11481","5.179099","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11482","5.179500","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11483","5.179514","172.30.1.205","172.30.1.104","TCP","54","42084 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11484","5.181335","172.30.1.205","172.30.1.104","TCP","54","42084 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11485","5.181442","172.30.1.205","172.30.1.104","TCP","74","34722 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908407 TSecr=0 WS=128" "11486","5.181629","172.30.1.104","172.30.1.205","TCP","54","135 > 42084 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11487","5.181637","172.30.1.104","172.30.1.205","TCP","54","135 > 42084 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11488","5.181642","172.30.1.205","172.30.1.104","TCP","54","42084 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11489","5.181742","172.30.1.104","172.30.1.205","TCP","66","49671 > 34722 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11490","5.181750","172.30.1.205","172.30.1.104","TCP","54","34722 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11491","5.182093","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11492","5.182393","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11493","5.182401","172.30.1.205","172.30.1.104","TCP","54","34722 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11494","5.184272","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11495","5.184659","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11496","5.184665","172.30.1.205","172.30.1.104","TCP","54","34722 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11497","5.186017","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11498","5.187402","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11499","5.187411","172.30.1.205","172.30.1.104","TCP","54","34722 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11500","5.188390","172.30.1.205","172.30.1.104","TCP","74","42088 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908414 TSecr=0 WS=128" "11501","5.188677","172.30.1.104","172.30.1.205","TCP","66","135 > 42088 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11502","5.188686","172.30.1.205","172.30.1.104","TCP","54","42088 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11503","5.189050","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11504","5.189337","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11505","5.189346","172.30.1.205","172.30.1.104","TCP","54","42088 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11506","5.191543","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11507","5.191937","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11508","5.191949","172.30.1.205","172.30.1.104","TCP","54","42088 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11509","5.193976","172.30.1.205","172.30.1.104","TCP","54","42088 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11510","5.194084","172.30.1.205","172.30.1.104","TCP","74","34726 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908420 TSecr=0 WS=128" "11511","5.194261","172.30.1.104","172.30.1.205","TCP","54","135 > 42088 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11512","5.194270","172.30.1.104","172.30.1.205","TCP","54","135 > 42088 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11513","5.194286","172.30.1.205","172.30.1.104","TCP","54","42088 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11514","5.194350","172.30.1.104","172.30.1.205","TCP","66","49671 > 34726 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11515","5.194358","172.30.1.205","172.30.1.104","TCP","54","34726 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11516","5.194718","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11517","5.195008","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11518","5.195016","172.30.1.205","172.30.1.104","TCP","54","34726 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11519","5.196909","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11520","5.197267","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11521","5.197273","172.30.1.205","172.30.1.104","TCP","54","34726 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11522","5.198620","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11523","5.200108","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11524","5.200117","172.30.1.205","172.30.1.104","TCP","54","34726 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11525","5.201087","172.30.1.205","172.30.1.104","TCP","74","42092 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908427 TSecr=0 WS=128" "11526","5.201379","172.30.1.104","172.30.1.205","TCP","66","135 > 42092 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11527","5.201389","172.30.1.205","172.30.1.104","TCP","54","42092 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11528","5.201767","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11529","5.202048","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11530","5.202057","172.30.1.205","172.30.1.104","TCP","54","42092 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11531","5.204217","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11532","5.204593","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11533","5.204599","172.30.1.205","172.30.1.104","TCP","54","42092 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11534","5.211626","172.30.1.205","172.30.1.104","TCP","54","34682 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11535","5.211674","172.30.1.205","172.30.1.104","TCP","54","34686 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11536","5.211704","172.30.1.205","172.30.1.104","TCP","54","34690 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11537","5.211737","172.30.1.205","172.30.1.104","TCP","54","34694 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11538","5.211764","172.30.1.205","172.30.1.104","TCP","54","34698 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11539","5.211791","172.30.1.205","172.30.1.104","TCP","54","34702 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11540","5.211818","172.30.1.205","172.30.1.104","TCP","54","34706 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11541","5.211853","172.30.1.205","172.30.1.104","TCP","54","34710 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11542","5.211877","172.30.1.205","172.30.1.104","TCP","54","34714 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11543","5.211899","172.30.1.205","172.30.1.104","TCP","54","34718 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11544","5.211906","172.30.1.104","172.30.1.205","TCP","54","49671 > 34682 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11545","5.211948","172.30.1.205","172.30.1.104","TCP","54","34722 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11546","5.211975","172.30.1.205","172.30.1.104","TCP","54","34726 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11547","5.212039","172.30.1.104","172.30.1.205","TCP","54","49671 > 34686 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11548","5.212063","172.30.1.104","172.30.1.205","TCP","54","49671 > 34682 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11549","5.212071","172.30.1.205","172.30.1.104","TCP","54","34682 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11550","5.212089","172.30.1.104","172.30.1.205","TCP","54","49671 > 34686 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11551","5.212092","172.30.1.205","172.30.1.104","TCP","54","34686 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11552","5.212116","172.30.1.104","172.30.1.205","TCP","54","49671 > 34690 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11553","5.212146","172.30.1.104","172.30.1.205","TCP","54","49671 > 34694 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11554","5.212175","172.30.1.104","172.30.1.205","TCP","54","49671 > 34690 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11555","5.212180","172.30.1.205","172.30.1.104","TCP","54","34690 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11556","5.212201","172.30.1.104","172.30.1.205","TCP","54","49671 > 34698 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11557","5.212229","172.30.1.104","172.30.1.205","TCP","54","49671 > 34702 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11558","5.212341","172.30.1.104","172.30.1.205","TCP","54","49671 > 34706 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11559","5.212367","172.30.1.104","172.30.1.205","TCP","54","49671 > 34706 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11560","5.212372","172.30.1.205","172.30.1.104","TCP","54","34706 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11561","5.212395","172.30.1.104","172.30.1.205","TCP","54","49671 > 34702 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11562","5.212398","172.30.1.205","172.30.1.104","TCP","54","34702 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11563","5.212422","172.30.1.104","172.30.1.205","TCP","54","49671 > 34694 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11564","5.212425","172.30.1.205","172.30.1.104","TCP","54","34694 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11565","5.212460","172.30.1.104","172.30.1.205","TCP","54","49671 > 34698 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11566","5.212464","172.30.1.205","172.30.1.104","TCP","54","34698 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11567","5.212492","172.30.1.104","172.30.1.205","TCP","54","49671 > 34710 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11568","5.212517","172.30.1.104","172.30.1.205","TCP","54","49671 > 34714 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11569","5.212542","172.30.1.104","172.30.1.205","TCP","54","49671 > 34718 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11570","5.212568","172.30.1.104","172.30.1.205","TCP","54","49671 > 34722 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11571","5.212593","172.30.1.104","172.30.1.205","TCP","54","49671 > 34722 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11572","5.212598","172.30.1.205","172.30.1.104","TCP","54","34722 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11573","5.212618","172.30.1.104","172.30.1.205","TCP","54","49671 > 34710 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11574","5.212622","172.30.1.205","172.30.1.104","TCP","54","34710 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11575","5.212644","172.30.1.104","172.30.1.205","TCP","54","49671 > 34714 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11576","5.212647","172.30.1.205","172.30.1.104","TCP","54","34714 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11577","5.212669","172.30.1.104","172.30.1.205","TCP","54","49671 > 34718 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11578","5.212672","172.30.1.205","172.30.1.104","TCP","54","34718 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11579","5.212694","172.30.1.104","172.30.1.205","TCP","54","49671 > 34726 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11580","5.212719","172.30.1.104","172.30.1.205","TCP","54","49671 > 34726 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11581","5.212722","172.30.1.205","172.30.1.104","TCP","54","34726 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11582","5.213658","172.30.1.205","172.30.1.104","TCP","54","42092 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11583","5.213784","172.30.1.205","172.30.1.104","TCP","74","34730 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908440 TSecr=0 WS=128" "11584","5.213916","172.30.1.104","172.30.1.205","TCP","54","135 > 42092 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11585","5.213951","172.30.1.104","172.30.1.205","TCP","54","135 > 42092 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11586","5.213955","172.30.1.205","172.30.1.104","TCP","54","42092 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11587","5.214081","172.30.1.104","172.30.1.205","TCP","66","49671 > 34730 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11588","5.214089","172.30.1.205","172.30.1.104","TCP","54","34730 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11589","5.214439","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11590","5.214771","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11591","5.214780","172.30.1.205","172.30.1.104","TCP","54","34730 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11592","5.216660","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11593","5.218208","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11594","5.218215","172.30.1.205","172.30.1.104","TCP","54","34730 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11595","5.219586","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11596","5.221013","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11597","5.221023","172.30.1.205","172.30.1.104","TCP","54","34730 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11598","5.221972","172.30.1.205","172.30.1.104","TCP","74","42096 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908448 TSecr=0 WS=128" "11599","5.222269","172.30.1.104","172.30.1.205","TCP","66","135 > 42096 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11600","5.222284","172.30.1.205","172.30.1.104","TCP","54","42096 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11601","5.222637","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11602","5.222917","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11603","5.222926","172.30.1.205","172.30.1.104","TCP","54","42096 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11604","5.225170","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11605","5.225563","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11606","5.225570","172.30.1.205","172.30.1.104","TCP","54","42096 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11607","5.227384","172.30.1.205","172.30.1.104","TCP","54","42096 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11608","5.227493","172.30.1.205","172.30.1.104","TCP","74","34734 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908453 TSecr=0 WS=128" "11609","5.227653","172.30.1.104","172.30.1.205","TCP","54","135 > 42096 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11610","5.227682","172.30.1.104","172.30.1.205","TCP","54","135 > 42096 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11611","5.227688","172.30.1.205","172.30.1.104","TCP","54","42096 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11612","5.227795","172.30.1.104","172.30.1.205","TCP","66","49671 > 34734 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11613","5.227807","172.30.1.205","172.30.1.104","TCP","54","34734 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11614","5.228183","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11615","5.228458","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11616","5.228466","172.30.1.205","172.30.1.104","TCP","54","34734 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11617","5.230398","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11618","5.230741","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11619","5.230747","172.30.1.205","172.30.1.104","TCP","54","34734 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11620","5.232138","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11621","5.233519","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11622","5.233529","172.30.1.205","172.30.1.104","TCP","54","34734 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11623","5.234450","172.30.1.205","172.30.1.104","TCP","74","42100 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908460 TSecr=0 WS=128" "11624","5.234753","172.30.1.104","172.30.1.205","TCP","66","135 > 42100 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11625","5.234763","172.30.1.205","172.30.1.104","TCP","54","42100 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11626","5.235129","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11627","5.235422","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11628","5.235430","172.30.1.205","172.30.1.104","TCP","54","42100 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11629","5.237631","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11630","5.238021","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11631","5.238027","172.30.1.205","172.30.1.104","TCP","54","42100 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11632","5.239959","172.30.1.205","172.30.1.104","TCP","54","42100 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11633","5.240068","172.30.1.205","172.30.1.104","TCP","74","34738 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908466 TSecr=0 WS=128" "11634","5.240243","172.30.1.104","172.30.1.205","TCP","54","135 > 42100 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11635","5.240267","172.30.1.104","172.30.1.205","TCP","54","135 > 42100 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11636","5.240272","172.30.1.205","172.30.1.104","TCP","54","42100 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11637","5.240398","172.30.1.104","172.30.1.205","TCP","66","49671 > 34738 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11638","5.240406","172.30.1.205","172.30.1.104","TCP","54","34738 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11639","5.240754","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11640","5.241052","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11641","5.241060","172.30.1.205","172.30.1.104","TCP","54","34738 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11642","5.242976","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11643","5.243353","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11644","5.243359","172.30.1.205","172.30.1.104","TCP","54","34738 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11645","5.244701","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11646","5.246176","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11647","5.246185","172.30.1.205","172.30.1.104","TCP","54","34738 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11648","5.247151","172.30.1.205","172.30.1.104","TCP","74","42104 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908473 TSecr=0 WS=128" "11649","5.247469","172.30.1.104","172.30.1.205","TCP","66","135 > 42104 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11650","5.247483","172.30.1.205","172.30.1.104","TCP","54","42104 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11651","5.247828","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11652","5.248121","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11653","5.248130","172.30.1.205","172.30.1.104","TCP","54","42104 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11654","5.250334","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11655","5.250714","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11656","5.250721","172.30.1.205","172.30.1.104","TCP","54","42104 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11657","5.252530","172.30.1.205","172.30.1.104","TCP","54","42104 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11658","5.252639","172.30.1.205","172.30.1.104","TCP","74","34742 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908479 TSecr=0 WS=128" "11659","5.252792","172.30.1.104","172.30.1.205","TCP","54","135 > 42104 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11660","5.252813","172.30.1.104","172.30.1.205","TCP","54","135 > 42104 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11661","5.252819","172.30.1.205","172.30.1.104","TCP","54","42104 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11662","5.252901","172.30.1.104","172.30.1.205","TCP","66","49671 > 34742 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11663","5.252909","172.30.1.205","172.30.1.104","TCP","54","34742 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11664","5.253272","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11665","5.253554","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11666","5.253562","172.30.1.205","172.30.1.104","TCP","54","34742 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11667","5.255436","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11668","5.255862","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11669","5.255868","172.30.1.205","172.30.1.104","TCP","54","34742 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11670","5.257274","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11671","5.258770","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11672","5.258779","172.30.1.205","172.30.1.104","TCP","54","34742 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11673","5.259698","172.30.1.205","172.30.1.104","TCP","74","42108 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908486 TSecr=0 WS=128" "11674","5.260053","172.30.1.104","172.30.1.205","TCP","66","135 > 42108 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11675","5.260073","172.30.1.205","172.30.1.104","TCP","54","42108 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11676","5.260600","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11677","5.260887","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11678","5.260897","172.30.1.205","172.30.1.104","TCP","54","42108 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11679","5.263082","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11680","5.263489","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11681","5.263495","172.30.1.205","172.30.1.104","TCP","54","42108 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11682","5.265314","172.30.1.205","172.30.1.104","TCP","54","42108 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11683","5.265423","172.30.1.205","172.30.1.104","TCP","74","34746 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908491 TSecr=0 WS=128" "11684","5.265573","172.30.1.104","172.30.1.205","TCP","54","135 > 42108 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11685","5.265612","172.30.1.104","172.30.1.205","TCP","54","135 > 42108 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11686","5.265617","172.30.1.205","172.30.1.104","TCP","54","42108 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11687","5.265689","172.30.1.104","172.30.1.205","TCP","66","49671 > 34746 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11688","5.265697","172.30.1.205","172.30.1.104","TCP","54","34746 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11689","5.266043","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11690","5.266335","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11691","5.266343","172.30.1.205","172.30.1.104","TCP","54","34746 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11692","5.268210","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11693","5.268567","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11694","5.268573","172.30.1.205","172.30.1.104","TCP","54","34746 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11695","5.269947","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11696","5.271343","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11697","5.271352","172.30.1.205","172.30.1.104","TCP","54","34746 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11698","5.272274","172.30.1.205","172.30.1.104","TCP","74","42112 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908498 TSecr=0 WS=128" "11699","5.272556","172.30.1.104","172.30.1.205","TCP","66","135 > 42112 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11700","5.272566","172.30.1.205","172.30.1.104","TCP","54","42112 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11701","5.272939","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11702","5.273233","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11703","5.273248","172.30.1.205","172.30.1.104","TCP","54","42112 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11704","5.275536","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11705","5.275926","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11706","5.275934","172.30.1.205","172.30.1.104","TCP","54","42112 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11707","5.277795","172.30.1.205","172.30.1.104","TCP","54","42112 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11708","5.277914","172.30.1.205","172.30.1.104","TCP","74","34750 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908504 TSecr=0 WS=128" "11709","5.278070","172.30.1.104","172.30.1.205","TCP","54","135 > 42112 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11710","5.278079","172.30.1.104","172.30.1.205","TCP","54","135 > 42112 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11711","5.278084","172.30.1.205","172.30.1.104","TCP","54","42112 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11712","5.278201","172.30.1.104","172.30.1.205","TCP","66","49671 > 34750 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11713","5.278209","172.30.1.205","172.30.1.104","TCP","54","34750 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11714","5.278569","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11715","5.278840","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11716","5.278848","172.30.1.205","172.30.1.104","TCP","54","34750 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11717","5.280735","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11718","5.282304","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11719","5.282311","172.30.1.205","172.30.1.104","TCP","54","34750 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11720","5.283726","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11721","5.285124","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11722","5.285143","172.30.1.205","172.30.1.104","TCP","54","34750 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11723","5.286257","172.30.1.205","172.30.1.104","TCP","74","42116 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908512 TSecr=0 WS=128" "11724","5.286551","172.30.1.104","172.30.1.205","TCP","66","135 > 42116 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11725","5.286561","172.30.1.205","172.30.1.104","TCP","54","42116 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11726","5.286911","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11727","5.287239","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11728","5.287260","172.30.1.205","172.30.1.104","TCP","54","42116 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11729","5.289666","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11730","5.290068","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11731","5.290075","172.30.1.205","172.30.1.104","TCP","54","42116 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11732","5.291884","172.30.1.205","172.30.1.104","TCP","54","42116 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11733","5.291992","172.30.1.205","172.30.1.104","TCP","74","34754 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908518 TSecr=0 WS=128" "11734","5.292140","172.30.1.104","172.30.1.205","TCP","54","135 > 42116 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11735","5.292193","172.30.1.104","172.30.1.205","TCP","54","135 > 42116 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11736","5.292198","172.30.1.205","172.30.1.104","TCP","54","42116 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11737","5.292265","172.30.1.104","172.30.1.205","TCP","66","49671 > 34754 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11738","5.292273","172.30.1.205","172.30.1.104","TCP","54","34754 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11739","5.292635","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11740","5.292924","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11741","5.292932","172.30.1.205","172.30.1.104","TCP","54","34754 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11742","5.294794","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11743","5.295166","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11744","5.295172","172.30.1.205","172.30.1.104","TCP","54","34754 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11745","5.296526","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11746","5.298013","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11747","5.298023","172.30.1.205","172.30.1.104","TCP","54","34754 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11748","5.298963","172.30.1.205","172.30.1.104","TCP","74","42120 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908525 TSecr=0 WS=128" "11749","5.299278","172.30.1.104","172.30.1.205","TCP","66","135 > 42120 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11750","5.299288","172.30.1.205","172.30.1.104","TCP","54","42120 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11751","5.299632","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11752","5.299948","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11753","5.299957","172.30.1.205","172.30.1.104","TCP","54","42120 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11754","5.302167","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11755","5.302569","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11756","5.302581","172.30.1.205","172.30.1.104","TCP","54","42120 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11757","5.304537","172.30.1.205","172.30.1.104","TCP","54","42120 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11758","5.304647","172.30.1.205","172.30.1.104","TCP","74","34758 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908531 TSecr=0 WS=128" "11759","5.304814","172.30.1.104","172.30.1.205","TCP","54","135 > 42120 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11760","5.304828","172.30.1.104","172.30.1.205","TCP","54","135 > 42120 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11761","5.304834","172.30.1.205","172.30.1.104","TCP","54","42120 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11762","5.304939","172.30.1.104","172.30.1.205","TCP","66","49671 > 34758 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11763","5.304947","172.30.1.205","172.30.1.104","TCP","54","34758 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11764","5.305296","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11765","5.305590","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11766","5.305599","172.30.1.205","172.30.1.104","TCP","54","34758 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11767","5.307478","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11768","5.307839","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11769","5.307845","172.30.1.205","172.30.1.104","TCP","54","34758 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11770","5.309224","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11771","5.310665","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11772","5.310677","172.30.1.205","172.30.1.104","TCP","54","34758 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11773","5.311661","172.30.1.205","172.30.1.104","TCP","74","42124 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908538 TSecr=0 WS=128" "11774","5.311978","172.30.1.104","172.30.1.205","TCP","66","135 > 42124 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11775","5.311995","172.30.1.205","172.30.1.104","TCP","54","42124 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11776","5.312412","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11777","5.312702","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11778","5.312712","172.30.1.205","172.30.1.104","TCP","54","42124 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11779","5.314956","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11780","5.315343","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11781","5.315350","172.30.1.205","172.30.1.104","TCP","54","42124 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11782","5.317197","172.30.1.205","172.30.1.104","TCP","54","42124 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11783","5.317315","172.30.1.205","172.30.1.104","TCP","74","34762 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908543 TSecr=0 WS=128" "11784","5.317483","172.30.1.104","172.30.1.205","TCP","54","135 > 42124 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11785","5.317502","172.30.1.104","172.30.1.205","TCP","54","135 > 42124 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11786","5.317507","172.30.1.205","172.30.1.104","TCP","54","42124 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11787","5.317600","172.30.1.104","172.30.1.205","TCP","66","49671 > 34762 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11788","5.317609","172.30.1.205","172.30.1.104","TCP","54","34762 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11789","5.317954","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11790","5.318267","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11791","5.318276","172.30.1.205","172.30.1.104","TCP","54","34762 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11792","5.320152","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11793","5.320545","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11794","5.320551","172.30.1.205","172.30.1.104","TCP","54","34762 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11795","5.321951","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11796","5.323426","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11797","5.323436","172.30.1.205","172.30.1.104","TCP","54","34762 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11798","5.324382","172.30.1.205","172.30.1.104","TCP","74","42128 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908550 TSecr=0 WS=128" "11799","5.324720","172.30.1.104","172.30.1.205","TCP","66","135 > 42128 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11800","5.324730","172.30.1.205","172.30.1.104","TCP","54","42128 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11801","5.325103","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11802","5.325403","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11803","5.325413","172.30.1.205","172.30.1.104","TCP","54","42128 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11804","5.327602","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11805","5.328000","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11806","5.328007","172.30.1.205","172.30.1.104","TCP","54","42128 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11807","5.329849","172.30.1.205","172.30.1.104","TCP","54","42128 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11808","5.329964","172.30.1.205","172.30.1.104","TCP","74","34766 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908556 TSecr=0 WS=128" "11809","5.330136","172.30.1.104","172.30.1.205","TCP","54","135 > 42128 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11810","5.330169","172.30.1.104","172.30.1.205","TCP","54","135 > 42128 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11811","5.330174","172.30.1.205","172.30.1.104","TCP","54","42128 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11812","5.330396","172.30.1.104","172.30.1.205","TCP","66","49671 > 34766 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11813","5.330404","172.30.1.205","172.30.1.104","TCP","54","34766 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11814","5.330750","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11815","5.331091","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11816","5.331101","172.30.1.205","172.30.1.104","TCP","54","34766 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11817","5.333000","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11818","5.333404","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11819","5.333414","172.30.1.205","172.30.1.104","TCP","54","34766 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11820","5.334759","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11821","5.336870","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11822","5.336888","172.30.1.205","172.30.1.104","TCP","54","34766 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11823","5.337946","172.30.1.205","172.30.1.104","TCP","74","42132 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908564 TSecr=0 WS=128" "11824","5.338272","172.30.1.104","172.30.1.205","TCP","66","135 > 42132 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11825","5.338282","172.30.1.205","172.30.1.104","TCP","54","42132 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11826","5.338634","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11827","5.338959","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11828","5.338968","172.30.1.205","172.30.1.104","TCP","54","42132 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11829","5.341178","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11830","5.341600","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11831","5.341607","172.30.1.205","172.30.1.104","TCP","54","42132 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11832","5.343407","172.30.1.205","172.30.1.104","TCP","54","42132 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11833","5.343522","172.30.1.205","172.30.1.104","TCP","74","34770 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908569 TSecr=0 WS=128" "11834","5.343684","172.30.1.104","172.30.1.205","TCP","54","135 > 42132 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11835","5.343706","172.30.1.104","172.30.1.205","TCP","54","135 > 42132 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11836","5.343712","172.30.1.205","172.30.1.104","TCP","54","42132 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11837","5.343802","172.30.1.104","172.30.1.205","TCP","66","49671 > 34770 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11838","5.343811","172.30.1.205","172.30.1.104","TCP","54","34770 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11839","5.344162","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11840","5.344454","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11841","5.344462","172.30.1.205","172.30.1.104","TCP","54","34770 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11842","5.346372","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11843","5.346715","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11844","5.346722","172.30.1.205","172.30.1.104","TCP","54","34770 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11845","5.348058","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11846","5.349529","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11847","5.349538","172.30.1.205","172.30.1.104","TCP","54","34770 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11848","5.350485","172.30.1.205","172.30.1.104","TCP","74","42136 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908576 TSecr=0 WS=128" "11849","5.350834","172.30.1.104","172.30.1.205","TCP","66","135 > 42136 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11850","5.350845","172.30.1.205","172.30.1.104","TCP","54","42136 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11851","5.351190","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11852","5.351489","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11853","5.351500","172.30.1.205","172.30.1.104","TCP","54","42136 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11854","5.353740","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11855","5.354116","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11856","5.354123","172.30.1.205","172.30.1.104","TCP","54","42136 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11857","5.355115","172.30.1.205","172.30.1.104","TCP","54","34734 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11858","5.355164","172.30.1.205","172.30.1.104","TCP","54","34738 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11859","5.355202","172.30.1.205","172.30.1.104","TCP","54","34742 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11860","5.355235","172.30.1.205","172.30.1.104","TCP","54","34746 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11861","5.355268","172.30.1.205","172.30.1.104","TCP","54","34750 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11862","5.355302","172.30.1.205","172.30.1.104","TCP","54","34754 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11863","5.355335","172.30.1.205","172.30.1.104","TCP","54","34758 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11864","5.355363","172.30.1.205","172.30.1.104","TCP","54","34762 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11865","5.355395","172.30.1.205","172.30.1.104","TCP","54","34766 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11866","5.355422","172.30.1.205","172.30.1.104","TCP","54","34770 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11867","5.355493","172.30.1.104","172.30.1.205","TCP","54","49671 > 34734 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11868","5.355512","172.30.1.205","172.30.1.104","TCP","54","34730 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "11869","5.355549","172.30.1.104","172.30.1.205","TCP","54","49671 > 34738 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11870","5.355555","172.30.1.104","172.30.1.205","TCP","54","49671 > 34734 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11871","5.355561","172.30.1.205","172.30.1.104","TCP","54","34734 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11872","5.355563","172.30.1.104","172.30.1.205","TCP","54","49671 > 34742 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11873","5.355570","172.30.1.104","172.30.1.205","TCP","54","49671 > 34746 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11874","5.355589","172.30.1.104","172.30.1.205","TCP","54","49671 > 34746 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11875","5.355593","172.30.1.205","172.30.1.104","TCP","54","34746 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11876","5.355780","172.30.1.104","172.30.1.205","TCP","54","49671 > 34750 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11877","5.355796","172.30.1.104","172.30.1.205","TCP","54","49671 > 34750 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11878","5.355801","172.30.1.205","172.30.1.104","TCP","54","34750 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11879","5.355816","172.30.1.104","172.30.1.205","TCP","54","49671 > 34738 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11880","5.355818","172.30.1.205","172.30.1.104","TCP","54","34738 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11881","5.355837","172.30.1.104","172.30.1.205","TCP","54","49671 > 34742 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11882","5.355839","172.30.1.205","172.30.1.104","TCP","54","34742 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11883","5.355857","172.30.1.104","172.30.1.205","TCP","54","49671 > 34754 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11884","5.355877","172.30.1.104","172.30.1.205","TCP","54","49671 > 34758 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11885","5.356012","172.30.1.104","172.30.1.205","TCP","54","49671 > 34762 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11886","5.356018","172.30.1.104","172.30.1.205","TCP","54","49671 > 34754 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11887","5.356022","172.30.1.205","172.30.1.104","TCP","54","34754 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11888","5.356028","172.30.1.104","172.30.1.205","TCP","54","49671 > 34766 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11889","5.356268","172.30.1.104","172.30.1.205","TCP","54","49671 > 34766 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11890","5.356273","172.30.1.205","172.30.1.104","TCP","54","34766 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11891","5.356279","172.30.1.104","172.30.1.205","TCP","54","49671 > 34770 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11892","5.356284","172.30.1.104","172.30.1.205","TCP","54","49671 > 34770 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11893","5.356289","172.30.1.205","172.30.1.104","TCP","54","34770 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11894","5.356290","172.30.1.104","172.30.1.205","TCP","54","49671 > 34758 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11895","5.356291","172.30.1.205","172.30.1.104","TCP","54","34758 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11896","5.356293","172.30.1.104","172.30.1.205","TCP","54","49671 > 34762 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11897","5.356294","172.30.1.205","172.30.1.104","TCP","54","34762 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11898","5.356296","172.30.1.104","172.30.1.205","TCP","54","49671 > 34730 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11899","5.356298","172.30.1.104","172.30.1.205","TCP","54","49671 > 34730 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "11900","5.356300","172.30.1.205","172.30.1.104","TCP","54","34730 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "11901","5.356894","172.30.1.205","172.30.1.104","TCP","54","42136 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11902","5.357012","172.30.1.205","172.30.1.104","TCP","74","34774 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908583 TSecr=0 WS=128" "11903","5.357164","172.30.1.104","172.30.1.205","TCP","54","135 > 42136 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11904","5.357206","172.30.1.104","172.30.1.205","TCP","54","135 > 42136 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11905","5.357210","172.30.1.205","172.30.1.104","TCP","54","42136 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11906","5.357314","172.30.1.104","172.30.1.205","TCP","66","49671 > 34774 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11907","5.357322","172.30.1.205","172.30.1.104","TCP","54","34774 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11908","5.357682","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11909","5.357989","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11910","5.357998","172.30.1.205","172.30.1.104","TCP","54","34774 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11911","5.359873","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11912","5.360218","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11913","5.360224","172.30.1.205","172.30.1.104","TCP","54","34774 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11914","5.361615","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11915","5.363016","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11916","5.363025","172.30.1.205","172.30.1.104","TCP","54","34774 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11917","5.363988","172.30.1.205","172.30.1.104","TCP","74","42140 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908590 TSecr=0 WS=128" "11918","5.364270","172.30.1.104","172.30.1.205","TCP","66","135 > 42140 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11919","5.364282","172.30.1.205","172.30.1.104","TCP","54","42140 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11920","5.364637","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11921","5.364945","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11922","5.364955","172.30.1.205","172.30.1.104","TCP","54","42140 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11923","5.367171","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11924","5.367557","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11925","5.367564","172.30.1.205","172.30.1.104","TCP","54","42140 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11926","5.369390","172.30.1.205","172.30.1.104","TCP","54","42140 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11927","5.369505","172.30.1.205","172.30.1.104","TCP","74","34778 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908595 TSecr=0 WS=128" "11928","5.369655","172.30.1.104","172.30.1.205","TCP","54","135 > 42140 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11929","5.369665","172.30.1.104","172.30.1.205","TCP","54","135 > 42140 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11930","5.369670","172.30.1.205","172.30.1.104","TCP","54","42140 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11931","5.369827","172.30.1.104","172.30.1.205","TCP","66","49671 > 34778 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11932","5.369835","172.30.1.205","172.30.1.104","TCP","54","34778 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11933","5.370179","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11934","5.370466","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11935","5.370475","172.30.1.205","172.30.1.104","TCP","54","34778 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11936","5.372353","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11937","5.372748","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11938","5.372760","172.30.1.205","172.30.1.104","TCP","54","34778 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11939","5.374330","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11940","5.375786","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11941","5.375804","172.30.1.205","172.30.1.104","TCP","54","34778 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11942","5.376863","172.30.1.205","172.30.1.104","TCP","74","42144 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908603 TSecr=0 WS=128" "11943","5.377156","172.30.1.104","172.30.1.205","TCP","66","135 > 42144 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11944","5.377167","172.30.1.205","172.30.1.104","TCP","54","42144 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11945","5.377528","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11946","5.377812","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11947","5.377822","172.30.1.205","172.30.1.104","TCP","54","42144 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11948","5.380001","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11949","5.380364","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11950","5.380370","172.30.1.205","172.30.1.104","TCP","54","42144 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11951","5.382190","172.30.1.205","172.30.1.104","TCP","54","42144 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11952","5.382300","172.30.1.205","172.30.1.104","TCP","74","34782 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908608 TSecr=0 WS=128" "11953","5.382486","172.30.1.104","172.30.1.205","TCP","54","135 > 42144 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11954","5.382497","172.30.1.104","172.30.1.205","TCP","54","135 > 42144 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11955","5.382502","172.30.1.205","172.30.1.104","TCP","54","42144 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11956","5.382572","172.30.1.104","172.30.1.205","TCP","66","49671 > 34782 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11957","5.382583","172.30.1.205","172.30.1.104","TCP","54","34782 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11958","5.382942","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11959","5.384449","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11960","5.384470","172.30.1.205","172.30.1.104","TCP","54","34782 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11961","5.386570","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11962","5.386953","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11963","5.386959","172.30.1.205","172.30.1.104","TCP","54","34782 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11964","5.388305","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11965","5.389712","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11966","5.389721","172.30.1.205","172.30.1.104","TCP","54","34782 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11967","5.390660","172.30.1.205","172.30.1.104","TCP","74","42148 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908617 TSecr=0 WS=128" "11968","5.390964","172.30.1.104","172.30.1.205","TCP","66","135 > 42148 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11969","5.390976","172.30.1.205","172.30.1.104","TCP","54","42148 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11970","5.391333","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11971","5.391613","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11972","5.391622","172.30.1.205","172.30.1.104","TCP","54","42148 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11973","5.393856","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11974","5.394275","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "11975","5.394282","172.30.1.205","172.30.1.104","TCP","54","42148 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "11976","5.396097","172.30.1.205","172.30.1.104","TCP","54","42148 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "11977","5.396212","172.30.1.205","172.30.1.104","TCP","74","34786 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908622 TSecr=0 WS=128" "11978","5.396391","172.30.1.104","172.30.1.205","TCP","54","135 > 42148 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11979","5.396401","172.30.1.104","172.30.1.205","TCP","54","135 > 42148 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "11980","5.396406","172.30.1.205","172.30.1.104","TCP","54","42148 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "11981","5.396476","172.30.1.104","172.30.1.205","TCP","66","49671 > 34786 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11982","5.396484","172.30.1.205","172.30.1.104","TCP","54","34786 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11983","5.396856","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "11984","5.397764","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11985","5.397773","172.30.1.205","172.30.1.104","TCP","54","34786 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11986","5.399656","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "11987","5.400012","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "11988","5.400018","172.30.1.205","172.30.1.104","TCP","54","34786 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "11989","5.401403","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "11990","5.402882","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "11991","5.402891","172.30.1.205","172.30.1.104","TCP","54","34786 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "11992","5.403814","172.30.1.205","172.30.1.104","TCP","74","42152 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908630 TSecr=0 WS=128" "11993","5.404097","172.30.1.104","172.30.1.205","TCP","66","135 > 42152 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "11994","5.404108","172.30.1.205","172.30.1.104","TCP","54","42152 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "11995","5.404455","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "11996","5.406844","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "11997","5.406853","172.30.1.205","172.30.1.104","TCP","54","42152 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "11998","5.409097","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "11999","5.409800","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12000","5.409807","172.30.1.205","172.30.1.104","TCP","54","42152 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12001","5.411634","172.30.1.205","172.30.1.104","TCP","54","42152 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12002","5.411754","172.30.1.205","172.30.1.104","TCP","74","34790 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908638 TSecr=0 WS=128" "12003","5.411915","172.30.1.104","172.30.1.205","TCP","54","135 > 42152 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12004","5.412126","172.30.1.104","172.30.1.205","TCP","66","49671 > 34790 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12005","5.412136","172.30.1.205","172.30.1.104","TCP","54","34790 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12006","5.412508","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12007","5.412697","172.30.1.104","172.30.1.205","TCP","54","135 > 42152 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12008","5.412704","172.30.1.205","172.30.1.104","TCP","54","42152 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12009","5.412822","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12010","5.412830","172.30.1.205","172.30.1.104","TCP","54","34790 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12011","5.414705","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12012","5.415071","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12013","5.415077","172.30.1.205","172.30.1.104","TCP","54","34790 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12014","5.416422","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12015","5.417957","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12016","5.417975","172.30.1.205","172.30.1.104","TCP","54","34790 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12017","5.419125","172.30.1.205","172.30.1.104","TCP","74","42156 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908645 TSecr=0 WS=128" "12018","5.419454","172.30.1.104","172.30.1.205","TCP","66","135 > 42156 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12019","5.419465","172.30.1.205","172.30.1.104","TCP","54","42156 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12020","5.419813","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12021","5.420113","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12022","5.420130","172.30.1.205","172.30.1.104","TCP","54","42156 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12023","5.422578","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12024","5.422959","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12025","5.422965","172.30.1.205","172.30.1.104","TCP","54","42156 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12026","5.424771","172.30.1.205","172.30.1.104","TCP","54","42156 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12027","5.424890","172.30.1.205","172.30.1.104","TCP","74","34794 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908651 TSecr=0 WS=128" "12028","5.425047","172.30.1.104","172.30.1.205","TCP","54","135 > 42156 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12029","5.425056","172.30.1.104","172.30.1.205","TCP","54","135 > 42156 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12030","5.425060","172.30.1.205","172.30.1.104","TCP","54","42156 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12031","5.425192","172.30.1.104","172.30.1.205","TCP","66","49671 > 34794 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12032","5.425200","172.30.1.205","172.30.1.104","TCP","54","34794 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12033","5.425552","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12034","5.426553","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12035","5.426560","172.30.1.205","172.30.1.104","TCP","54","34794 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12036","5.428423","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12037","5.428799","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12038","5.428806","172.30.1.205","172.30.1.104","TCP","54","34794 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12039","5.430165","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12040","5.431626","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12041","5.431636","172.30.1.205","172.30.1.104","TCP","54","34794 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12042","5.432562","172.30.1.205","172.30.1.104","TCP","74","42160 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908658 TSecr=0 WS=128" "12043","5.432966","172.30.1.104","172.30.1.205","TCP","66","135 > 42160 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12044","5.432977","172.30.1.205","172.30.1.104","TCP","54","42160 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12045","5.433327","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12046","5.433617","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12047","5.433626","172.30.1.205","172.30.1.104","TCP","54","42160 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12048","5.435811","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12049","5.436238","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12050","5.436244","172.30.1.205","172.30.1.104","TCP","54","42160 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12051","5.438074","172.30.1.205","172.30.1.104","TCP","54","42160 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12052","5.438185","172.30.1.205","172.30.1.104","TCP","74","34798 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908664 TSecr=0 WS=128" "12053","5.438351","172.30.1.104","172.30.1.205","TCP","54","135 > 42160 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12054","5.438359","172.30.1.104","172.30.1.205","TCP","54","135 > 42160 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12055","5.438371","172.30.1.205","172.30.1.104","TCP","54","42160 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12056","5.438462","172.30.1.104","172.30.1.205","TCP","66","49671 > 34798 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12057","5.438470","172.30.1.205","172.30.1.104","TCP","54","34798 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12058","5.438819","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12059","5.439109","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12060","5.439120","172.30.1.205","172.30.1.104","TCP","54","34798 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12061","5.441052","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12062","5.441413","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12063","5.441420","172.30.1.205","172.30.1.104","TCP","54","34798 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12064","5.442765","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12065","5.444214","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12066","5.444226","172.30.1.205","172.30.1.104","TCP","54","34798 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12067","5.445212","172.30.1.205","172.30.1.104","TCP","74","42164 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908671 TSecr=0 WS=128" "12068","5.445526","172.30.1.104","172.30.1.205","TCP","66","135 > 42164 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12069","5.445537","172.30.1.205","172.30.1.104","TCP","54","42164 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12070","5.445899","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12071","5.446172","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12072","5.446180","172.30.1.205","172.30.1.104","TCP","54","42164 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12073","5.448382","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12074","5.448769","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12075","5.448786","172.30.1.205","172.30.1.104","TCP","54","42164 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12076","5.450603","172.30.1.205","172.30.1.104","TCP","54","42164 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12077","5.450715","172.30.1.205","172.30.1.104","TCP","74","34802 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908677 TSecr=0 WS=128" "12078","5.450896","172.30.1.104","172.30.1.205","TCP","54","135 > 42164 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12079","5.450933","172.30.1.104","172.30.1.205","TCP","54","135 > 42164 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12080","5.450938","172.30.1.205","172.30.1.104","TCP","54","42164 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12081","5.451010","172.30.1.104","172.30.1.205","TCP","66","49671 > 34802 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12082","5.451018","172.30.1.205","172.30.1.104","TCP","54","34802 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12083","5.451362","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12084","5.451642","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12085","5.451651","172.30.1.205","172.30.1.104","TCP","54","34802 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12086","5.453588","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12087","5.453968","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12088","5.453981","172.30.1.205","172.30.1.104","TCP","54","34802 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12089","5.455554","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12090","5.457089","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12091","5.457098","172.30.1.205","172.30.1.104","TCP","54","34802 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12092","5.458125","172.30.1.205","172.30.1.104","TCP","74","42168 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908684 TSecr=0 WS=128" "12093","5.458482","172.30.1.104","172.30.1.205","TCP","66","135 > 42168 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12094","5.458503","172.30.1.205","172.30.1.104","TCP","54","42168 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12095","5.459010","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12096","5.459304","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12097","5.459317","172.30.1.205","172.30.1.104","TCP","54","42168 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12098","5.461512","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12099","5.461911","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12100","5.461918","172.30.1.205","172.30.1.104","TCP","54","42168 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12101","5.463726","172.30.1.205","172.30.1.104","TCP","54","42168 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12102","5.463836","172.30.1.205","172.30.1.104","TCP","74","34806 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908690 TSecr=0 WS=128" "12103","5.464021","172.30.1.104","172.30.1.205","TCP","54","135 > 42168 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12104","5.464045","172.30.1.104","172.30.1.205","TCP","54","135 > 42168 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12105","5.464050","172.30.1.205","172.30.1.104","TCP","54","42168 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12106","5.464122","172.30.1.104","172.30.1.205","TCP","66","49671 > 34806 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12107","5.464130","172.30.1.205","172.30.1.104","TCP","54","34806 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12108","5.464474","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12109","5.464767","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12110","5.464786","172.30.1.205","172.30.1.104","TCP","54","34806 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12111","5.466663","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12112","5.467026","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12113","5.467032","172.30.1.205","172.30.1.104","TCP","54","34806 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12114","5.468391","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12115","5.469833","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12116","5.469845","172.30.1.205","172.30.1.104","TCP","54","34806 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12117","5.470791","172.30.1.205","172.30.1.104","TCP","74","42172 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908697 TSecr=0 WS=128" "12118","5.471092","172.30.1.104","172.30.1.205","TCP","66","135 > 42172 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12119","5.471113","172.30.1.205","172.30.1.104","TCP","54","42172 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12120","5.471708","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12121","5.471997","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12122","5.472006","172.30.1.205","172.30.1.104","TCP","54","42172 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12123","5.474212","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12124","5.474623","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12125","5.474630","172.30.1.205","172.30.1.104","TCP","54","42172 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12126","5.476436","172.30.1.205","172.30.1.104","TCP","54","42172 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12127","5.476549","172.30.1.205","172.30.1.104","TCP","74","34810 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908702 TSecr=0 WS=128" "12128","5.476691","172.30.1.104","172.30.1.205","TCP","54","135 > 42172 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12129","5.476712","172.30.1.104","172.30.1.205","TCP","54","135 > 42172 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12130","5.476717","172.30.1.205","172.30.1.104","TCP","54","42172 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12131","5.476838","172.30.1.104","172.30.1.205","TCP","66","49671 > 34810 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12132","5.476847","172.30.1.205","172.30.1.104","TCP","54","34810 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12133","5.477198","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12134","5.478172","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12135","5.478181","172.30.1.205","172.30.1.104","TCP","54","34810 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12136","5.480059","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12137","5.480443","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12138","5.480455","172.30.1.205","172.30.1.104","TCP","54","34810 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12139","5.482033","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12140","5.483504","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12141","5.483514","172.30.1.205","172.30.1.104","TCP","54","34810 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12142","5.484441","172.30.1.205","172.30.1.104","TCP","74","42176 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908710 TSecr=0 WS=128" "12143","5.484745","172.30.1.104","172.30.1.205","TCP","66","135 > 42176 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12144","5.484756","172.30.1.205","172.30.1.104","TCP","54","42176 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12145","5.485122","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12146","5.485401","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12147","5.485410","172.30.1.205","172.30.1.104","TCP","54","42176 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12148","5.487586","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12149","5.487966","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12150","5.487972","172.30.1.205","172.30.1.104","TCP","54","42176 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12151","5.489794","172.30.1.205","172.30.1.104","TCP","54","42176 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12152","5.489903","172.30.1.205","172.30.1.104","TCP","74","34814 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908716 TSecr=0 WS=128" "12153","5.490083","172.30.1.104","172.30.1.205","TCP","54","135 > 42176 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12154","5.490098","172.30.1.104","172.30.1.205","TCP","54","135 > 42176 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12155","5.490103","172.30.1.205","172.30.1.104","TCP","54","42176 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12156","5.490174","172.30.1.104","172.30.1.205","TCP","66","49671 > 34814 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12157","5.490182","172.30.1.205","172.30.1.104","TCP","54","34814 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12158","5.490532","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12159","5.490861","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12160","5.490870","172.30.1.205","172.30.1.104","TCP","54","34814 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12161","5.492753","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12162","5.493167","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12163","5.493174","172.30.1.205","172.30.1.104","TCP","54","34814 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12164","5.494512","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12165","5.495995","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12166","5.496005","172.30.1.205","172.30.1.104","TCP","54","34814 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12167","5.496949","172.30.1.205","172.30.1.104","TCP","74","42180 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908723 TSecr=0 WS=128" "12168","5.497261","172.30.1.104","172.30.1.205","TCP","66","135 > 42180 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12169","5.497272","172.30.1.205","172.30.1.104","TCP","54","42180 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12170","5.497623","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12171","5.497901","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12172","5.497910","172.30.1.205","172.30.1.104","TCP","54","42180 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12173","5.500077","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12174","5.500453","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12175","5.500466","172.30.1.205","172.30.1.104","TCP","54","42180 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12176","5.502554","172.30.1.205","172.30.1.104","TCP","54","42180 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12177","5.502665","172.30.1.205","172.30.1.104","TCP","74","34818 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908729 TSecr=0 WS=128" "12178","5.502812","172.30.1.104","172.30.1.205","TCP","54","135 > 42180 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12179","5.502839","172.30.1.104","172.30.1.205","TCP","54","135 > 42180 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12180","5.502845","172.30.1.205","172.30.1.104","TCP","54","42180 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12181","5.502919","172.30.1.104","172.30.1.205","TCP","66","49671 > 34818 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12182","5.502927","172.30.1.205","172.30.1.104","TCP","54","34818 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12183","5.503270","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12184","5.503557","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12185","5.503566","172.30.1.205","172.30.1.104","TCP","54","34818 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12186","5.505547","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12187","5.505900","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12188","5.505906","172.30.1.205","172.30.1.104","TCP","54","34818 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12189","5.507289","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12190","5.508692","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12191","5.508701","172.30.1.205","172.30.1.104","TCP","54","34818 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12192","5.509698","172.30.1.205","172.30.1.104","TCP","74","42184 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908736 TSecr=0 WS=128" "12193","5.510090","172.30.1.104","172.30.1.205","TCP","66","135 > 42184 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12194","5.510101","172.30.1.205","172.30.1.104","TCP","54","42184 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12195","5.510451","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12196","5.510730","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12197","5.510739","172.30.1.205","172.30.1.104","TCP","54","42184 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12198","5.512931","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12199","5.513297","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12200","5.513304","172.30.1.205","172.30.1.104","TCP","54","42184 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12201","5.514147","172.30.1.205","172.30.1.104","TCP","54","34778 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12202","5.514196","172.30.1.205","172.30.1.104","TCP","54","34782 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12203","5.514232","172.30.1.205","172.30.1.104","TCP","54","34786 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12204","5.514264","172.30.1.205","172.30.1.104","TCP","54","34790 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12205","5.514298","172.30.1.205","172.30.1.104","TCP","54","34794 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12206","5.514324","172.30.1.205","172.30.1.104","TCP","54","34798 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12207","5.514356","172.30.1.205","172.30.1.104","TCP","54","34802 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12208","5.514378","172.30.1.205","172.30.1.104","TCP","54","34806 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12209","5.514393","172.30.1.104","172.30.1.205","TCP","54","49671 > 34778 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12210","5.514429","172.30.1.205","172.30.1.104","TCP","54","34810 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12211","5.514462","172.30.1.205","172.30.1.104","TCP","54","34814 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12212","5.514484","172.30.1.205","172.30.1.104","TCP","54","34818 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12213","5.514507","172.30.1.104","172.30.1.205","TCP","54","49671 > 34782 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12214","5.514525","172.30.1.104","172.30.1.205","TCP","54","49671 > 34778 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12215","5.514531","172.30.1.205","172.30.1.104","TCP","54","34778 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12216","5.514554","172.30.1.104","172.30.1.205","TCP","54","49671 > 34782 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12217","5.514557","172.30.1.205","172.30.1.104","TCP","54","34782 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12218","5.514579","172.30.1.104","172.30.1.205","TCP","54","49671 > 34786 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12219","5.514601","172.30.1.104","172.30.1.205","TCP","54","49671 > 34790 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12220","5.514621","172.30.1.205","172.30.1.104","TCP","54","34774 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12221","5.514765","172.30.1.104","172.30.1.205","TCP","54","49671 > 34794 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12222","5.514780","172.30.1.104","172.30.1.205","TCP","54","49671 > 34798 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12223","5.514800","172.30.1.104","172.30.1.205","TCP","54","49671 > 34786 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12224","5.514806","172.30.1.205","172.30.1.104","TCP","54","34786 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12225","5.514820","172.30.1.104","172.30.1.205","TCP","54","49671 > 34798 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12226","5.514823","172.30.1.205","172.30.1.104","TCP","54","34798 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12227","5.514841","172.30.1.104","172.30.1.205","TCP","54","49671 > 34790 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12228","5.514843","172.30.1.205","172.30.1.104","TCP","54","34790 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12229","5.514870","172.30.1.104","172.30.1.205","TCP","54","49671 > 34794 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12230","5.514874","172.30.1.205","172.30.1.104","TCP","54","34794 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12231","5.514898","172.30.1.104","172.30.1.205","TCP","54","49671 > 34802 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12232","5.514926","172.30.1.104","172.30.1.205","TCP","54","49671 > 34806 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12233","5.514953","172.30.1.104","172.30.1.205","TCP","54","49671 > 34810 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12234","5.514980","172.30.1.104","172.30.1.205","TCP","54","49671 > 34802 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12235","5.514985","172.30.1.205","172.30.1.104","TCP","54","34802 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12236","5.515010","172.30.1.104","172.30.1.205","TCP","54","49671 > 34806 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12237","5.515015","172.30.1.205","172.30.1.104","TCP","54","34806 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12238","5.515040","172.30.1.104","172.30.1.205","TCP","54","49671 > 34810 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12239","5.515044","172.30.1.205","172.30.1.104","TCP","54","34810 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12240","5.515069","172.30.1.104","172.30.1.205","TCP","54","49671 > 34814 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12241","5.515098","172.30.1.104","172.30.1.205","TCP","54","49671 > 34818 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12242","5.515124","172.30.1.104","172.30.1.205","TCP","54","49671 > 34814 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12243","5.515129","172.30.1.205","172.30.1.104","TCP","54","34814 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12244","5.515151","172.30.1.104","172.30.1.205","TCP","54","49671 > 34818 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12245","5.515154","172.30.1.205","172.30.1.104","TCP","54","34818 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12246","5.515529","172.30.1.104","172.30.1.205","TCP","54","49671 > 34774 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12247","5.515554","172.30.1.104","172.30.1.205","TCP","54","49671 > 34774 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12248","5.515559","172.30.1.205","172.30.1.104","TCP","54","34774 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12249","5.516230","172.30.1.205","172.30.1.104","TCP","54","42184 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12250","5.516342","172.30.1.205","172.30.1.104","TCP","74","34822 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908742 TSecr=0 WS=128" "12251","5.516496","172.30.1.104","172.30.1.205","TCP","54","135 > 42184 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12252","5.516506","172.30.1.104","172.30.1.205","TCP","54","135 > 42184 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12253","5.516512","172.30.1.205","172.30.1.104","TCP","54","42184 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12254","5.516719","172.30.1.104","172.30.1.205","TCP","66","49671 > 34822 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12255","5.516728","172.30.1.205","172.30.1.104","TCP","54","34822 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12256","5.517111","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12257","5.517421","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12258","5.517436","172.30.1.205","172.30.1.104","TCP","54","34822 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12259","5.519399","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12260","5.519769","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12261","5.519777","172.30.1.205","172.30.1.104","TCP","54","34822 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12262","5.521204","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12263","5.522717","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12264","5.522729","172.30.1.205","172.30.1.104","TCP","54","34822 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12265","5.523715","172.30.1.205","172.30.1.104","TCP","74","42188 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908750 TSecr=0 WS=128" "12266","5.524017","172.30.1.104","172.30.1.205","TCP","66","135 > 42188 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12267","5.524030","172.30.1.205","172.30.1.104","TCP","54","42188 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12268","5.524391","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12269","5.524689","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12270","5.524698","172.30.1.205","172.30.1.104","TCP","54","42188 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12271","5.526942","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12272","5.527332","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12273","5.527339","172.30.1.205","172.30.1.104","TCP","54","42188 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12274","5.529195","172.30.1.205","172.30.1.104","TCP","54","42188 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12275","5.529310","172.30.1.205","172.30.1.104","TCP","74","34826 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908755 TSecr=0 WS=128" "12276","5.529487","172.30.1.104","172.30.1.205","TCP","54","135 > 42188 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12277","5.529521","172.30.1.104","172.30.1.205","TCP","54","135 > 42188 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12278","5.529528","172.30.1.205","172.30.1.104","TCP","54","42188 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12279","5.529632","172.30.1.104","172.30.1.205","TCP","66","49671 > 34826 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12280","5.529647","172.30.1.205","172.30.1.104","TCP","54","34826 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12281","5.529992","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12282","5.530300","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12283","5.530309","172.30.1.205","172.30.1.104","TCP","54","34826 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12284","5.532189","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12285","5.532571","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12286","5.532577","172.30.1.205","172.30.1.104","TCP","54","34826 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12287","5.533948","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12288","5.535403","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12289","5.535414","172.30.1.205","172.30.1.104","TCP","54","34826 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12290","5.536355","172.30.1.205","172.30.1.104","TCP","74","42192 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908762 TSecr=0 WS=128" "12291","5.536826","172.30.1.104","172.30.1.205","TCP","66","135 > 42192 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12292","5.536837","172.30.1.205","172.30.1.104","TCP","54","42192 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12293","5.537203","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12294","5.537495","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12295","5.537504","172.30.1.205","172.30.1.104","TCP","54","42192 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12296","5.539686","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12297","5.540083","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12298","5.540090","172.30.1.205","172.30.1.104","TCP","54","42192 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12299","5.541929","172.30.1.205","172.30.1.104","TCP","54","42192 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12300","5.542043","172.30.1.205","172.30.1.104","TCP","74","34830 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908768 TSecr=0 WS=128" "12301","5.542225","172.30.1.104","172.30.1.205","TCP","54","135 > 42192 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12302","5.542249","172.30.1.104","172.30.1.205","TCP","54","135 > 42192 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12303","5.542254","172.30.1.205","172.30.1.104","TCP","54","42192 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12304","5.542350","172.30.1.104","172.30.1.205","TCP","66","49671 > 34830 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12305","5.542359","172.30.1.205","172.30.1.104","TCP","54","34830 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12306","5.542710","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12307","5.542996","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12308","5.543005","172.30.1.205","172.30.1.104","TCP","54","34830 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12309","5.545028","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12310","5.545407","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12311","5.545413","172.30.1.205","172.30.1.104","TCP","54","34830 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12312","5.546762","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12313","5.548303","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12314","5.548312","172.30.1.205","172.30.1.104","TCP","54","34830 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12315","5.549337","172.30.1.205","172.30.1.104","TCP","74","42196 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908775 TSecr=0 WS=128" "12316","5.549691","172.30.1.104","172.30.1.205","TCP","66","135 > 42196 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12317","5.549703","172.30.1.205","172.30.1.104","TCP","54","42196 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12318","5.550051","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12319","5.550365","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12320","5.550373","172.30.1.205","172.30.1.104","TCP","54","42196 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12321","5.552593","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12322","5.552997","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12323","5.553004","172.30.1.205","172.30.1.104","TCP","54","42196 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12324","5.554919","172.30.1.205","172.30.1.104","TCP","54","42196 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12325","5.555031","172.30.1.205","172.30.1.104","TCP","74","34834 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908781 TSecr=0 WS=128" "12326","5.555191","172.30.1.104","172.30.1.205","TCP","54","135 > 42196 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12327","5.555215","172.30.1.104","172.30.1.205","TCP","54","135 > 42196 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12328","5.555220","172.30.1.205","172.30.1.104","TCP","54","42196 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12329","5.555350","172.30.1.104","172.30.1.205","TCP","66","49671 > 34834 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12330","5.555358","172.30.1.205","172.30.1.104","TCP","54","34834 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12331","5.555729","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12332","5.557619","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12333","5.557628","172.30.1.205","172.30.1.104","TCP","54","34834 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12334","5.559637","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12335","5.560012","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12336","5.560023","172.30.1.205","172.30.1.104","TCP","54","34834 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12337","5.561409","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12338","5.562905","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12339","5.562916","172.30.1.205","172.30.1.104","TCP","54","34834 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12340","5.563899","172.30.1.205","172.30.1.104","TCP","74","42200 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908790 TSecr=0 WS=128" "12341","5.564200","172.30.1.104","172.30.1.205","TCP","66","135 > 42200 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12342","5.564210","172.30.1.205","172.30.1.104","TCP","54","42200 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12343","5.564598","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12344","5.564912","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12345","5.564921","172.30.1.205","172.30.1.104","TCP","54","42200 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12346","5.567109","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12347","5.567495","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12348","5.567502","172.30.1.205","172.30.1.104","TCP","54","42200 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12349","5.569338","172.30.1.205","172.30.1.104","TCP","54","42200 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12350","5.569455","172.30.1.205","172.30.1.104","TCP","74","34838 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908795 TSecr=0 WS=128" "12351","5.569605","172.30.1.104","172.30.1.205","TCP","54","135 > 42200 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12352","5.569629","172.30.1.104","172.30.1.205","TCP","54","135 > 42200 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12353","5.569634","172.30.1.205","172.30.1.104","TCP","54","42200 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12354","5.569722","172.30.1.104","172.30.1.205","TCP","66","49671 > 34838 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12355","5.569730","172.30.1.205","172.30.1.104","TCP","54","34838 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12356","5.570074","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12357","5.570581","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12358","5.570590","172.30.1.205","172.30.1.104","TCP","54","34838 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12359","5.572473","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12360","5.572833","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12361","5.572839","172.30.1.205","172.30.1.104","TCP","54","34838 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12362","5.574202","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12363","5.575676","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12364","5.575686","172.30.1.205","172.30.1.104","TCP","54","34838 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12365","5.576618","172.30.1.205","172.30.1.104","TCP","74","42204 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908803 TSecr=0 WS=128" "12366","5.576928","172.30.1.104","172.30.1.205","TCP","66","135 > 42204 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12367","5.576939","172.30.1.205","172.30.1.104","TCP","54","42204 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12368","5.577296","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12369","5.577588","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12370","5.577597","172.30.1.205","172.30.1.104","TCP","54","42204 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12371","5.579786","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12372","5.580174","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12373","5.580181","172.30.1.205","172.30.1.104","TCP","54","42204 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12374","5.582089","172.30.1.205","172.30.1.104","TCP","54","42204 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12375","5.582203","172.30.1.205","172.30.1.104","TCP","74","34842 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908808 TSecr=0 WS=128" "12376","5.582370","172.30.1.104","172.30.1.205","TCP","54","135 > 42204 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12377","5.582381","172.30.1.104","172.30.1.205","TCP","54","135 > 42204 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12378","5.582386","172.30.1.205","172.30.1.104","TCP","54","42204 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12379","5.582468","172.30.1.104","172.30.1.205","TCP","66","49671 > 34842 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12380","5.582476","172.30.1.205","172.30.1.104","TCP","54","34842 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12381","5.582858","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12382","5.583169","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12383","5.583177","172.30.1.205","172.30.1.104","TCP","54","34842 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12384","5.585108","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12385","5.585462","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12386","5.585466","172.30.1.205","172.30.1.104","TCP","54","34842 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12387","5.586861","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12388","5.588279","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12389","5.588288","172.30.1.205","172.30.1.104","TCP","54","34842 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12390","5.589256","172.30.1.205","172.30.1.104","TCP","74","42208 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908815 TSecr=0 WS=128" "12391","5.589645","172.30.1.104","172.30.1.205","TCP","66","135 > 42208 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12392","5.589656","172.30.1.205","172.30.1.104","TCP","54","42208 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12393","5.590004","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12394","5.590299","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12395","5.590307","172.30.1.205","172.30.1.104","TCP","54","42208 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12396","5.592498","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12397","5.592869","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12398","5.592876","172.30.1.205","172.30.1.104","TCP","54","42208 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12399","5.594775","172.30.1.205","172.30.1.104","TCP","54","42208 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12400","5.594886","172.30.1.205","172.30.1.104","TCP","74","34846 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908821 TSecr=0 WS=128" "12401","5.595070","172.30.1.104","172.30.1.205","TCP","54","135 > 42208 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12402","5.595094","172.30.1.104","172.30.1.205","TCP","54","135 > 42208 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12403","5.595099","172.30.1.205","172.30.1.104","TCP","54","42208 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12404","5.595204","172.30.1.104","172.30.1.205","TCP","66","49671 > 34846 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12405","5.595213","172.30.1.205","172.30.1.104","TCP","54","34846 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12406","5.595581","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12407","5.597143","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12408","5.597152","172.30.1.205","172.30.1.104","TCP","54","34846 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12409","5.599080","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12410","5.599440","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12411","5.599447","172.30.1.205","172.30.1.104","TCP","54","34846 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12412","5.600835","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12413","5.602317","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12414","5.602335","172.30.1.205","172.30.1.104","TCP","54","34846 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12415","5.603442","172.30.1.205","172.30.1.104","TCP","74","42212 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908829 TSecr=0 WS=128" "12416","5.603782","172.30.1.104","172.30.1.205","TCP","66","135 > 42212 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12417","5.603791","172.30.1.205","172.30.1.104","TCP","54","42212 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12418","5.604173","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12419","5.604453","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12420","5.604462","172.30.1.205","172.30.1.104","TCP","54","42212 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12421","5.606769","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12422","5.607208","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12423","5.607214","172.30.1.205","172.30.1.104","TCP","54","42212 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12424","5.609136","172.30.1.205","172.30.1.104","TCP","54","42212 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12425","5.609245","172.30.1.205","172.30.1.104","TCP","74","34850 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908835 TSecr=0 WS=128" "12426","5.609399","172.30.1.104","172.30.1.205","TCP","54","135 > 42212 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12427","5.609501","172.30.1.104","172.30.1.205","TCP","54","135 > 42212 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12428","5.609507","172.30.1.205","172.30.1.104","TCP","54","42212 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12429","5.609550","172.30.1.104","172.30.1.205","TCP","66","49671 > 34850 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12430","5.609570","172.30.1.205","172.30.1.104","TCP","54","34850 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12431","5.609913","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12432","5.610190","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12433","5.610197","172.30.1.205","172.30.1.104","TCP","54","34850 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12434","5.612095","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12435","5.612486","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12436","5.612492","172.30.1.205","172.30.1.104","TCP","54","34850 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12437","5.613877","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12438","5.615356","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12439","5.615365","172.30.1.205","172.30.1.104","TCP","54","34850 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12440","5.616309","172.30.1.205","172.30.1.104","TCP","74","42216 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908842 TSecr=0 WS=128" "12441","5.616595","172.30.1.104","172.30.1.205","TCP","66","135 > 42216 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12442","5.616606","172.30.1.205","172.30.1.104","TCP","54","42216 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12443","5.616990","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12444","5.617311","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12445","5.617321","172.30.1.205","172.30.1.104","TCP","54","42216 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12446","5.619515","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12447","5.619904","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12448","5.619910","172.30.1.205","172.30.1.104","TCP","54","42216 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12449","5.621773","172.30.1.205","172.30.1.104","TCP","54","42216 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12450","5.621892","172.30.1.205","172.30.1.104","TCP","74","34854 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908848 TSecr=0 WS=128" "12451","5.622045","172.30.1.104","172.30.1.205","TCP","54","135 > 42216 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12452","5.622057","172.30.1.104","172.30.1.205","TCP","54","135 > 42216 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12453","5.622063","172.30.1.205","172.30.1.104","TCP","54","42216 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12454","5.622155","172.30.1.104","172.30.1.205","TCP","66","49671 > 34854 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12455","5.622164","172.30.1.205","172.30.1.104","TCP","54","34854 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12456","5.622508","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12457","5.623480","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12458","5.623488","172.30.1.205","172.30.1.104","TCP","54","34854 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12459","5.625406","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12460","5.625755","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12461","5.625762","172.30.1.205","172.30.1.104","TCP","54","34854 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12462","5.627112","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12463","5.628643","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12464","5.628652","172.30.1.205","172.30.1.104","TCP","54","34854 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12465","5.629670","172.30.1.205","172.30.1.104","TCP","74","42220 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908856 TSecr=0 WS=128" "12466","5.629982","172.30.1.104","172.30.1.205","TCP","66","135 > 42220 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12467","5.629993","172.30.1.205","172.30.1.104","TCP","54","42220 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12468","5.630343","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12469","5.630618","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12470","5.630627","172.30.1.205","172.30.1.104","TCP","54","42220 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12471","5.632846","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12472","5.633212","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12473","5.633222","172.30.1.205","172.30.1.104","TCP","54","42220 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12474","5.635123","172.30.1.205","172.30.1.104","TCP","54","42220 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12475","5.635255","172.30.1.205","172.30.1.104","TCP","74","34858 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908861 TSecr=0 WS=128" "12476","5.635446","172.30.1.104","172.30.1.205","TCP","54","135 > 42220 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12477","5.635474","172.30.1.104","172.30.1.205","TCP","54","135 > 42220 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12478","5.635481","172.30.1.205","172.30.1.104","TCP","54","42220 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12479","5.635566","172.30.1.104","172.30.1.205","TCP","66","49671 > 34858 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12480","5.635574","172.30.1.205","172.30.1.104","TCP","54","34858 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12481","5.635938","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12482","5.636694","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12483","5.636703","172.30.1.205","172.30.1.104","TCP","54","34858 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12484","5.638594","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12485","5.639006","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12486","5.639013","172.30.1.205","172.30.1.104","TCP","54","34858 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12487","5.640371","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12488","5.641842","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12489","5.641853","172.30.1.205","172.30.1.104","TCP","54","34858 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12490","5.642835","172.30.1.205","172.30.1.104","TCP","74","42224 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908869 TSecr=0 WS=128" "12491","5.643133","172.30.1.104","172.30.1.205","TCP","66","135 > 42224 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12492","5.643146","172.30.1.205","172.30.1.104","TCP","54","42224 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12493","5.643509","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12494","5.643773","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12495","5.643782","172.30.1.205","172.30.1.104","TCP","54","42224 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12496","5.646022","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12497","5.646436","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12498","5.646443","172.30.1.205","172.30.1.104","TCP","54","42224 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12499","5.648258","172.30.1.205","172.30.1.104","TCP","54","42224 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12500","5.648372","172.30.1.205","172.30.1.104","TCP","74","34862 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908874 TSecr=0 WS=128" "12501","5.648515","172.30.1.104","172.30.1.205","TCP","54","135 > 42224 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12502","5.648530","172.30.1.104","172.30.1.205","TCP","54","135 > 42224 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12503","5.648536","172.30.1.205","172.30.1.104","TCP","54","42224 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12504","5.648642","172.30.1.104","172.30.1.205","TCP","66","49671 > 34862 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12505","5.648650","172.30.1.205","172.30.1.104","TCP","54","34862 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12506","5.649028","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12507","5.649300","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12508","5.649307","172.30.1.205","172.30.1.104","TCP","54","34862 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12509","5.651184","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12510","5.651551","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12511","5.651558","172.30.1.205","172.30.1.104","TCP","54","34862 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12512","5.652931","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12513","5.654454","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12514","5.654464","172.30.1.205","172.30.1.104","TCP","54","34862 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12515","5.655396","172.30.1.205","172.30.1.104","TCP","74","42228 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908881 TSecr=0 WS=128" "12516","5.655698","172.30.1.104","172.30.1.205","TCP","66","135 > 42228 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12517","5.655709","172.30.1.205","172.30.1.104","TCP","54","42228 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12518","5.656060","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12519","5.656347","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12520","5.656356","172.30.1.205","172.30.1.104","TCP","54","42228 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12521","5.658558","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12522","5.658976","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12523","5.658982","172.30.1.205","172.30.1.104","TCP","54","42228 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12524","5.660791","172.30.1.205","172.30.1.104","TCP","54","42228 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12525","5.660899","172.30.1.205","172.30.1.104","TCP","74","34866 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908887 TSecr=0 WS=128" "12526","5.661062","172.30.1.104","172.30.1.205","TCP","54","135 > 42228 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12527","5.661070","172.30.1.104","172.30.1.205","TCP","54","135 > 42228 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12528","5.661075","172.30.1.205","172.30.1.104","TCP","54","42228 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12529","5.661151","172.30.1.104","172.30.1.205","TCP","66","49671 > 34866 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12530","5.661159","172.30.1.205","172.30.1.104","TCP","54","34866 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12531","5.661506","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12532","5.661778","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12533","5.661786","172.30.1.205","172.30.1.104","TCP","54","34866 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12534","5.663625","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12535","5.664007","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12536","5.664014","172.30.1.205","172.30.1.104","TCP","54","34866 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12537","5.665392","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12538","5.666807","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12539","5.666816","172.30.1.205","172.30.1.104","TCP","54","34866 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12540","5.667739","172.30.1.205","172.30.1.104","TCP","74","42232 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908894 TSecr=0 WS=128" "12541","5.668054","172.30.1.104","172.30.1.205","TCP","66","135 > 42232 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12542","5.668064","172.30.1.205","172.30.1.104","TCP","54","42232 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12543","5.668410","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12544","5.668693","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12545","5.668702","172.30.1.205","172.30.1.104","TCP","54","42232 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12546","5.670882","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12547","5.671286","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12548","5.671293","172.30.1.205","172.30.1.104","TCP","54","42232 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12549","5.672153","172.30.1.205","172.30.1.104","TCP","54","34826 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12550","5.672200","172.30.1.205","172.30.1.104","TCP","54","34830 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12551","5.672236","172.30.1.205","172.30.1.104","TCP","54","34834 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12552","5.672269","172.30.1.205","172.30.1.104","TCP","54","34838 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12553","5.672296","172.30.1.205","172.30.1.104","TCP","54","34842 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12554","5.672323","172.30.1.205","172.30.1.104","TCP","54","34846 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12555","5.672350","172.30.1.205","172.30.1.104","TCP","54","34850 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12556","5.672381","172.30.1.205","172.30.1.104","TCP","54","34854 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12557","5.672404","172.30.1.205","172.30.1.104","TCP","54","34858 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12558","5.672425","172.30.1.104","172.30.1.205","TCP","54","49671 > 34826 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12559","5.672453","172.30.1.205","172.30.1.104","TCP","54","34862 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12560","5.672482","172.30.1.205","172.30.1.104","TCP","54","34866 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12561","5.672554","172.30.1.205","172.30.1.104","TCP","54","34822 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12562","5.672706","172.30.1.104","172.30.1.205","TCP","54","49671 > 34830 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12563","5.672725","172.30.1.104","172.30.1.205","TCP","54","49671 > 34826 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12564","5.672732","172.30.1.205","172.30.1.104","TCP","54","34826 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12565","5.672746","172.30.1.104","172.30.1.205","TCP","54","49671 > 34830 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12566","5.672749","172.30.1.205","172.30.1.104","TCP","54","34830 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12567","5.672769","172.30.1.104","172.30.1.205","TCP","54","49671 > 34834 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12568","5.672793","172.30.1.104","172.30.1.205","TCP","54","49671 > 34838 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12569","5.672810","172.30.1.104","172.30.1.205","TCP","54","49671 > 34842 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12570","5.672843","172.30.1.104","172.30.1.205","TCP","54","49671 > 34846 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12571","5.672862","172.30.1.104","172.30.1.205","TCP","54","49671 > 34834 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12572","5.672868","172.30.1.205","172.30.1.104","TCP","54","34834 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12573","5.672881","172.30.1.104","172.30.1.205","TCP","54","49671 > 34850 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12574","5.672902","172.30.1.104","172.30.1.205","TCP","54","49671 > 34854 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12575","5.672922","172.30.1.104","172.30.1.205","TCP","54","49671 > 34850 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12576","5.672926","172.30.1.205","172.30.1.104","TCP","54","34850 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12577","5.672942","172.30.1.104","172.30.1.205","TCP","54","49671 > 34846 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12578","5.672945","172.30.1.205","172.30.1.104","TCP","54","34846 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12579","5.672963","172.30.1.104","172.30.1.205","TCP","54","49671 > 34858 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12580","5.672981","172.30.1.104","172.30.1.205","TCP","54","49671 > 34862 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12581","5.673001","172.30.1.104","172.30.1.205","TCP","54","49671 > 34866 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12582","5.673020","172.30.1.104","172.30.1.205","TCP","54","49671 > 34866 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12583","5.673024","172.30.1.205","172.30.1.104","TCP","54","34866 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12584","5.673039","172.30.1.104","172.30.1.205","TCP","54","49671 > 34862 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12585","5.673042","172.30.1.205","172.30.1.104","TCP","54","34862 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12586","5.673059","172.30.1.104","172.30.1.205","TCP","54","49671 > 34858 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12587","5.673061","172.30.1.205","172.30.1.104","TCP","54","34858 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12588","5.673080","172.30.1.104","172.30.1.205","TCP","54","49671 > 34854 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12589","5.673083","172.30.1.205","172.30.1.104","TCP","54","34854 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12590","5.673099","172.30.1.104","172.30.1.205","TCP","54","49671 > 34838 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12591","5.673102","172.30.1.205","172.30.1.104","TCP","54","34838 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12592","5.673118","172.30.1.104","172.30.1.205","TCP","54","49671 > 34842 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12593","5.673121","172.30.1.205","172.30.1.104","TCP","54","34842 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12594","5.673138","172.30.1.104","172.30.1.205","TCP","54","49671 > 34822 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12595","5.673161","172.30.1.104","172.30.1.205","TCP","54","49671 > 34822 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12596","5.673164","172.30.1.205","172.30.1.104","TCP","54","34822 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12597","5.674122","172.30.1.205","172.30.1.104","TCP","54","42232 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12598","5.674244","172.30.1.205","172.30.1.104","TCP","74","34870 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908900 TSecr=0 WS=128" "12599","5.674361","172.30.1.104","172.30.1.205","TCP","54","135 > 42232 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12600","5.674381","172.30.1.104","172.30.1.205","TCP","54","135 > 42232 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12601","5.674386","172.30.1.205","172.30.1.104","TCP","54","42232 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12602","5.674551","172.30.1.104","172.30.1.205","TCP","66","49671 > 34870 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12603","5.674559","172.30.1.205","172.30.1.104","TCP","54","34870 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12604","5.674913","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12605","5.675194","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12606","5.675202","172.30.1.205","172.30.1.104","TCP","54","34870 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12607","5.677091","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12608","5.677465","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12609","5.677471","172.30.1.205","172.30.1.104","TCP","54","34870 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12610","5.678814","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12611","5.680284","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12612","5.680293","172.30.1.205","172.30.1.104","TCP","54","34870 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12613","5.681245","172.30.1.205","172.30.1.104","TCP","74","42236 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908907 TSecr=0 WS=128" "12614","5.681991","172.30.1.104","172.30.1.205","TCP","66","135 > 42236 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12615","5.682001","172.30.1.205","172.30.1.104","TCP","54","42236 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12616","5.682351","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12617","5.682634","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12618","5.682643","172.30.1.205","172.30.1.104","TCP","54","42236 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12619","5.684837","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12620","5.685220","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12621","5.685234","172.30.1.205","172.30.1.104","TCP","54","42236 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12622","5.687045","172.30.1.205","172.30.1.104","TCP","54","42236 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12623","5.687158","172.30.1.205","172.30.1.104","TCP","74","34874 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908913 TSecr=0 WS=128" "12624","5.687366","172.30.1.104","172.30.1.205","TCP","54","135 > 42236 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12625","5.687375","172.30.1.104","172.30.1.205","TCP","54","135 > 42236 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12626","5.687381","172.30.1.205","172.30.1.104","TCP","54","42236 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12627","5.687481","172.30.1.104","172.30.1.205","TCP","66","49671 > 34874 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12628","5.687489","172.30.1.205","172.30.1.104","TCP","54","34874 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12629","5.687831","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12630","5.688148","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12631","5.688155","172.30.1.205","172.30.1.104","TCP","54","34874 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12632","5.690037","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12633","5.690399","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12634","5.690406","172.30.1.205","172.30.1.104","TCP","54","34874 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12635","5.691743","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12636","5.693226","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12637","5.693236","172.30.1.205","172.30.1.104","TCP","54","34874 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12638","5.694200","172.30.1.205","172.30.1.104","TCP","74","42240 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908920 TSecr=0 WS=128" "12639","5.694506","172.30.1.104","172.30.1.205","TCP","66","135 > 42240 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12640","5.694516","172.30.1.205","172.30.1.104","TCP","54","42240 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12641","5.694870","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12642","5.695166","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12643","5.695175","172.30.1.205","172.30.1.104","TCP","54","42240 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12644","5.697400","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12645","5.697784","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12646","5.697791","172.30.1.205","172.30.1.104","TCP","54","42240 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12647","5.699599","172.30.1.205","172.30.1.104","TCP","54","42240 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12648","5.699713","172.30.1.205","172.30.1.104","TCP","74","34878 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908926 TSecr=0 WS=128" "12649","5.699862","172.30.1.104","172.30.1.205","TCP","54","135 > 42240 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12650","5.699873","172.30.1.104","172.30.1.205","TCP","54","135 > 42240 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12651","5.699879","172.30.1.205","172.30.1.104","TCP","54","42240 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12652","5.699985","172.30.1.104","172.30.1.205","TCP","66","49671 > 34878 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12653","5.699994","172.30.1.205","172.30.1.104","TCP","54","34878 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12654","5.700335","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12655","5.700604","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12656","5.700612","172.30.1.205","172.30.1.104","TCP","54","34878 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12657","5.702509","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12658","5.702873","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12659","5.702879","172.30.1.205","172.30.1.104","TCP","54","34878 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12660","5.704225","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12661","5.707843","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12662","5.707855","172.30.1.205","172.30.1.104","TCP","54","34878 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12663","5.708867","172.30.1.205","172.30.1.104","TCP","74","42244 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908935 TSecr=0 WS=128" "12664","5.709161","172.30.1.104","172.30.1.205","TCP","66","135 > 42244 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12665","5.709172","172.30.1.205","172.30.1.104","TCP","54","42244 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12666","5.709533","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12667","5.709815","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12668","5.709824","172.30.1.205","172.30.1.104","TCP","54","42244 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12669","5.712033","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12670","5.712406","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12671","5.712412","172.30.1.205","172.30.1.104","TCP","54","42244 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12672","5.714258","172.30.1.205","172.30.1.104","TCP","54","42244 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12673","5.714381","172.30.1.205","172.30.1.104","TCP","74","34882 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908940 TSecr=0 WS=128" "12674","5.714531","172.30.1.104","172.30.1.205","TCP","54","135 > 42244 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12675","5.714577","172.30.1.104","172.30.1.205","TCP","54","135 > 42244 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12676","5.714585","172.30.1.205","172.30.1.104","TCP","54","42244 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12677","5.714759","172.30.1.104","172.30.1.205","TCP","66","49671 > 34882 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12678","5.714767","172.30.1.205","172.30.1.104","TCP","54","34882 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12679","5.715112","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12680","5.715416","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12681","5.715423","172.30.1.205","172.30.1.104","TCP","54","34882 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12682","5.717317","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12683","5.717670","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12684","5.717677","172.30.1.205","172.30.1.104","TCP","54","34882 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12685","5.719029","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12686","5.720469","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12687","5.720478","172.30.1.205","172.30.1.104","TCP","54","34882 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12688","5.721461","172.30.1.205","172.30.1.104","TCP","74","42248 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908947 TSecr=0 WS=128" "12689","5.721742","172.30.1.104","172.30.1.205","TCP","66","135 > 42248 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12690","5.721753","172.30.1.205","172.30.1.104","TCP","54","42248 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12691","5.722099","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12692","5.722436","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12693","5.722445","172.30.1.205","172.30.1.104","TCP","54","42248 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12694","5.724637","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12695","5.725000","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12696","5.725008","172.30.1.205","172.30.1.104","TCP","54","42248 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12697","5.726838","172.30.1.205","172.30.1.104","TCP","54","42248 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12698","5.726962","172.30.1.205","172.30.1.104","TCP","74","34886 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908953 TSecr=0 WS=128" "12699","5.727091","172.30.1.104","172.30.1.205","TCP","54","135 > 42248 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12700","5.727120","172.30.1.104","172.30.1.205","TCP","54","135 > 42248 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12701","5.727128","172.30.1.205","172.30.1.104","TCP","54","42248 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12702","5.727243","172.30.1.104","172.30.1.205","TCP","66","49671 > 34886 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12703","5.727251","172.30.1.205","172.30.1.104","TCP","54","34886 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12704","5.727611","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12705","5.727871","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12706","5.727879","172.30.1.205","172.30.1.104","TCP","54","34886 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12707","5.729796","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12708","5.730147","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12709","5.730154","172.30.1.205","172.30.1.104","TCP","54","34886 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12710","5.731506","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12711","5.732963","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12712","5.732972","172.30.1.205","172.30.1.104","TCP","54","34886 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12713","5.733979","172.30.1.205","172.30.1.104","TCP","74","42252 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908960 TSecr=0 WS=128" "12714","5.734258","172.30.1.104","172.30.1.205","TCP","66","135 > 42252 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12715","5.734270","172.30.1.205","172.30.1.104","TCP","54","42252 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12716","5.734618","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12717","5.734888","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12718","5.734897","172.30.1.205","172.30.1.104","TCP","54","42252 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12719","5.737118","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12720","5.737481","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12721","5.737488","172.30.1.205","172.30.1.104","TCP","54","42252 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12722","5.739297","172.30.1.205","172.30.1.104","TCP","54","42252 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12723","5.739414","172.30.1.205","172.30.1.104","TCP","74","34890 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908965 TSecr=0 WS=128" "12724","5.739534","172.30.1.104","172.30.1.205","TCP","54","135 > 42252 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12725","5.739547","172.30.1.104","172.30.1.205","TCP","54","135 > 42252 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12726","5.739554","172.30.1.205","172.30.1.104","TCP","54","42252 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12727","5.739738","172.30.1.104","172.30.1.205","TCP","66","49671 > 34890 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12728","5.739746","172.30.1.205","172.30.1.104","TCP","54","34890 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12729","5.740092","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12730","5.740374","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12731","5.740383","172.30.1.205","172.30.1.104","TCP","54","34890 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12732","5.742285","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12733","5.742653","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12734","5.742660","172.30.1.205","172.30.1.104","TCP","54","34890 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12735","5.744004","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12736","5.745446","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12737","5.745455","172.30.1.205","172.30.1.104","TCP","54","34890 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12738","5.746399","172.30.1.205","172.30.1.104","TCP","74","42256 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908972 TSecr=0 WS=128" "12739","5.746814","172.30.1.104","172.30.1.205","TCP","66","135 > 42256 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12740","5.746835","172.30.1.205","172.30.1.104","TCP","54","42256 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12741","5.747401","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12742","5.747702","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12743","5.747711","172.30.1.205","172.30.1.104","TCP","54","42256 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12744","5.749917","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12745","5.750298","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12746","5.750305","172.30.1.205","172.30.1.104","TCP","54","42256 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12747","5.752101","172.30.1.205","172.30.1.104","TCP","54","42256 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12748","5.752213","172.30.1.205","172.30.1.104","TCP","74","34894 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908978 TSecr=0 WS=128" "12749","5.752443","172.30.1.104","172.30.1.205","TCP","54","135 > 42256 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12750","5.752453","172.30.1.104","172.30.1.205","TCP","54","135 > 42256 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12751","5.752459","172.30.1.205","172.30.1.104","TCP","54","42256 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12752","5.752487","172.30.1.104","172.30.1.205","TCP","66","49671 > 34894 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12753","5.752495","172.30.1.205","172.30.1.104","TCP","54","34894 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12754","5.752857","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12755","5.753164","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12756","5.753173","172.30.1.205","172.30.1.104","TCP","54","34894 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12757","5.755043","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12758","5.755392","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12759","5.755398","172.30.1.205","172.30.1.104","TCP","54","34894 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12760","5.756731","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12761","5.758213","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12762","5.758233","172.30.1.205","172.30.1.104","TCP","54","34894 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12763","5.759214","172.30.1.205","172.30.1.104","TCP","74","42260 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908985 TSecr=0 WS=128" "12764","5.759543","172.30.1.104","172.30.1.205","TCP","66","135 > 42260 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12765","5.759564","172.30.1.205","172.30.1.104","TCP","54","42260 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12766","5.760051","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12767","5.760330","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12768","5.760339","172.30.1.205","172.30.1.104","TCP","54","42260 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12769","5.762542","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12770","5.762912","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12771","5.762919","172.30.1.205","172.30.1.104","TCP","54","42260 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12772","5.764703","172.30.1.205","172.30.1.104","TCP","54","42260 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12773","5.764833","172.30.1.205","172.30.1.104","TCP","74","34898 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908991 TSecr=0 WS=128" "12774","5.764976","172.30.1.104","172.30.1.205","TCP","54","135 > 42260 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12775","5.764991","172.30.1.104","172.30.1.205","TCP","54","135 > 42260 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12776","5.764996","172.30.1.205","172.30.1.104","TCP","54","42260 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12777","5.765107","172.30.1.104","172.30.1.205","TCP","66","49671 > 34898 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12778","5.765115","172.30.1.205","172.30.1.104","TCP","54","34898 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12779","5.765456","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12780","5.765834","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12781","5.765841","172.30.1.205","172.30.1.104","TCP","54","34898 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12782","5.767692","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12783","5.768063","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12784","5.768074","172.30.1.205","172.30.1.104","TCP","54","34898 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12785","5.769571","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12786","5.771028","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12787","5.771040","172.30.1.205","172.30.1.104","TCP","54","34898 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12788","5.772049","172.30.1.205","172.30.1.104","TCP","74","42264 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499908998 TSecr=0 WS=128" "12789","5.772350","172.30.1.104","172.30.1.205","TCP","66","135 > 42264 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12790","5.772362","172.30.1.205","172.30.1.104","TCP","54","42264 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12791","5.772718","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12792","5.773021","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12793","5.773030","172.30.1.205","172.30.1.104","TCP","54","42264 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12794","5.775234","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12795","5.775625","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12796","5.775632","172.30.1.205","172.30.1.104","TCP","54","42264 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12797","5.777482","172.30.1.205","172.30.1.104","TCP","54","42264 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12798","5.777596","172.30.1.205","172.30.1.104","TCP","74","34902 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909004 TSecr=0 WS=128" "12799","5.777756","172.30.1.104","172.30.1.205","TCP","54","135 > 42264 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12800","5.777856","172.30.1.104","172.30.1.205","TCP","66","49671 > 34902 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12801","5.777865","172.30.1.205","172.30.1.104","TCP","54","34902 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12802","5.778012","172.30.1.104","172.30.1.205","TCP","54","135 > 42264 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12803","5.778021","172.30.1.205","172.30.1.104","TCP","54","42264 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12804","5.778249","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12805","5.778675","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12806","5.778684","172.30.1.205","172.30.1.104","TCP","54","34902 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12807","5.780556","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12808","5.780964","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12809","5.780971","172.30.1.205","172.30.1.104","TCP","54","34902 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12810","5.782330","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12811","5.785268","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12812","5.785278","172.30.1.205","172.30.1.104","TCP","54","34902 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12813","5.786224","172.30.1.205","172.30.1.104","TCP","74","42268 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909012 TSecr=0 WS=128" "12814","5.786527","172.30.1.104","172.30.1.205","TCP","66","135 > 42268 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12815","5.786544","172.30.1.205","172.30.1.104","TCP","54","42268 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12816","5.786956","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12817","5.787271","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12818","5.787285","172.30.1.205","172.30.1.104","TCP","54","42268 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12819","5.789549","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12820","5.789909","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12821","5.789916","172.30.1.205","172.30.1.104","TCP","54","42268 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12822","5.791750","172.30.1.205","172.30.1.104","TCP","54","42268 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12823","5.791871","172.30.1.205","172.30.1.104","TCP","74","34906 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909018 TSecr=0 WS=128" "12824","5.792015","172.30.1.104","172.30.1.205","TCP","54","135 > 42268 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12825","5.792073","172.30.1.104","172.30.1.205","TCP","54","135 > 42268 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12826","5.792079","172.30.1.205","172.30.1.104","TCP","54","42268 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12827","5.792153","172.30.1.104","172.30.1.205","TCP","66","49671 > 34906 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12828","5.792162","172.30.1.205","172.30.1.104","TCP","54","34906 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12829","5.792527","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12830","5.792907","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12831","5.792916","172.30.1.205","172.30.1.104","TCP","54","34906 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12832","5.794795","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12833","5.795138","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12834","5.795145","172.30.1.205","172.30.1.104","TCP","54","34906 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12835","5.796499","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12836","5.797975","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12837","5.797984","172.30.1.205","172.30.1.104","TCP","54","34906 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12838","5.798933","172.30.1.205","172.30.1.104","TCP","74","42272 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909025 TSecr=0 WS=128" "12839","5.799217","172.30.1.104","172.30.1.205","TCP","66","135 > 42272 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12840","5.799228","172.30.1.205","172.30.1.104","TCP","54","42272 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12841","5.799578","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12842","5.799852","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12843","5.799861","172.30.1.205","172.30.1.104","TCP","54","42272 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12844","5.802076","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12845","5.802460","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12846","5.802467","172.30.1.205","172.30.1.104","TCP","54","42272 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12847","5.804288","172.30.1.205","172.30.1.104","TCP","54","42272 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12848","5.804399","172.30.1.205","172.30.1.104","TCP","74","34910 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909030 TSecr=0 WS=128" "12849","5.804566","172.30.1.104","172.30.1.205","TCP","54","135 > 42272 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12850","5.804575","172.30.1.104","172.30.1.205","TCP","54","135 > 42272 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12851","5.804580","172.30.1.205","172.30.1.104","TCP","54","42272 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12852","5.804656","172.30.1.104","172.30.1.205","TCP","66","49671 > 34910 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12853","5.804664","172.30.1.205","172.30.1.104","TCP","54","34910 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12854","5.805044","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12855","5.805312","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12856","5.805322","172.30.1.205","172.30.1.104","TCP","54","34910 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12857","5.807211","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12858","5.807562","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12859","5.807568","172.30.1.205","172.30.1.104","TCP","54","34910 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12860","5.808941","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12861","5.810400","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12862","5.810409","172.30.1.205","172.30.1.104","TCP","54","34910 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12863","5.811364","172.30.1.205","172.30.1.104","TCP","74","42276 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909037 TSecr=0 WS=128" "12864","5.811714","172.30.1.104","172.30.1.205","TCP","66","135 > 42276 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12865","5.811724","172.30.1.205","172.30.1.104","TCP","54","42276 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12866","5.812079","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12867","5.812370","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12868","5.812379","172.30.1.205","172.30.1.104","TCP","54","42276 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12869","5.814599","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12870","5.814972","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12871","5.814978","172.30.1.205","172.30.1.104","TCP","54","42276 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12872","5.816813","172.30.1.205","172.30.1.104","TCP","54","42276 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12873","5.816922","172.30.1.205","172.30.1.104","TCP","74","34914 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909043 TSecr=0 WS=128" "12874","5.817069","172.30.1.104","172.30.1.205","TCP","54","135 > 42276 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12875","5.817080","172.30.1.104","172.30.1.205","TCP","54","135 > 42276 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12876","5.817086","172.30.1.205","172.30.1.104","TCP","54","42276 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12877","5.817235","172.30.1.104","172.30.1.205","TCP","66","49671 > 34914 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12878","5.817243","172.30.1.205","172.30.1.104","TCP","54","34914 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12879","5.817601","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12880","5.817889","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12881","5.817898","172.30.1.205","172.30.1.104","TCP","54","34914 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12882","5.819776","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12883","5.820117","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12884","5.820124","172.30.1.205","172.30.1.104","TCP","54","34914 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12885","5.821504","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12886","5.823090","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12887","5.823100","172.30.1.205","172.30.1.104","TCP","54","34914 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12888","5.824033","172.30.1.205","172.30.1.104","TCP","74","42280 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909050 TSecr=0 WS=128" "12889","5.824324","172.30.1.104","172.30.1.205","TCP","66","135 > 42280 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12890","5.824335","172.30.1.205","172.30.1.104","TCP","54","42280 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12891","5.824681","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12892","5.824988","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12893","5.824997","172.30.1.205","172.30.1.104","TCP","54","42280 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12894","5.827182","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12895","5.827575","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12896","5.827581","172.30.1.205","172.30.1.104","TCP","54","42280 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12897","5.828423","172.30.1.205","172.30.1.104","TCP","54","34874 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12898","5.828471","172.30.1.205","172.30.1.104","TCP","54","34878 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12899","5.828509","172.30.1.205","172.30.1.104","TCP","54","34882 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12900","5.828542","172.30.1.205","172.30.1.104","TCP","54","34886 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12901","5.828571","172.30.1.205","172.30.1.104","TCP","54","34890 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12902","5.828599","172.30.1.205","172.30.1.104","TCP","54","34894 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12903","5.828627","172.30.1.205","172.30.1.104","TCP","54","34898 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12904","5.828666","172.30.1.205","172.30.1.104","TCP","54","34902 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12905","5.828689","172.30.1.205","172.30.1.104","TCP","54","34906 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12906","5.828706","172.30.1.104","172.30.1.205","TCP","54","49671 > 34874 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12907","5.828738","172.30.1.205","172.30.1.104","TCP","54","34910 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12908","5.828762","172.30.1.205","172.30.1.104","TCP","54","34914 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12909","5.828860","172.30.1.205","172.30.1.104","TCP","54","34870 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "12910","5.828974","172.30.1.104","172.30.1.205","TCP","54","49671 > 34878 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12911","5.828983","172.30.1.104","172.30.1.205","TCP","54","49671 > 34882 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12912","5.828986","172.30.1.104","172.30.1.205","TCP","54","49671 > 34874 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12913","5.828992","172.30.1.205","172.30.1.104","TCP","54","34874 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12914","5.828998","172.30.1.104","172.30.1.205","TCP","54","49671 > 34878 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12915","5.829000","172.30.1.205","172.30.1.104","TCP","54","34878 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12916","5.829002","172.30.1.104","172.30.1.205","TCP","54","49671 > 34886 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12917","5.829005","172.30.1.104","172.30.1.205","TCP","54","49671 > 34890 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12918","5.829008","172.30.1.104","172.30.1.205","TCP","54","49671 > 34882 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12919","5.829010","172.30.1.205","172.30.1.104","TCP","54","34882 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12920","5.829011","172.30.1.104","172.30.1.205","TCP","54","49671 > 34894 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12921","5.829243","172.30.1.104","172.30.1.205","TCP","54","49671 > 34894 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12922","5.829248","172.30.1.205","172.30.1.104","TCP","54","34894 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12923","5.829255","172.30.1.104","172.30.1.205","TCP","54","49671 > 34886 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12924","5.829257","172.30.1.205","172.30.1.104","TCP","54","34886 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12925","5.829258","172.30.1.104","172.30.1.205","TCP","54","49671 > 34890 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12926","5.829259","172.30.1.205","172.30.1.104","TCP","54","34890 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12927","5.829261","172.30.1.104","172.30.1.205","TCP","54","49671 > 34898 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12928","5.829269","172.30.1.104","172.30.1.205","TCP","54","49671 > 34902 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12929","5.829272","172.30.1.104","172.30.1.205","TCP","54","49671 > 34906 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12930","5.829275","172.30.1.104","172.30.1.205","TCP","54","49671 > 34906 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12931","5.829277","172.30.1.205","172.30.1.104","TCP","54","34906 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12932","5.829278","172.30.1.104","172.30.1.205","TCP","54","49671 > 34898 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12933","5.829280","172.30.1.205","172.30.1.104","TCP","54","34898 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12934","5.829284","172.30.1.104","172.30.1.205","TCP","54","49671 > 34902 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12935","5.829286","172.30.1.205","172.30.1.104","TCP","54","34902 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12936","5.829288","172.30.1.104","172.30.1.205","TCP","54","49671 > 34910 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12937","5.829517","172.30.1.104","172.30.1.205","TCP","54","49671 > 34914 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12938","5.829524","172.30.1.104","172.30.1.205","TCP","54","49671 > 34870 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12939","5.829527","172.30.1.104","172.30.1.205","TCP","54","49671 > 34910 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12940","5.829531","172.30.1.205","172.30.1.104","TCP","54","34910 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12941","5.829540","172.30.1.104","172.30.1.205","TCP","54","49671 > 34914 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12942","5.829542","172.30.1.205","172.30.1.104","TCP","54","34914 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12943","5.829543","172.30.1.104","172.30.1.205","TCP","54","49671 > 34870 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "12944","5.829548","172.30.1.205","172.30.1.104","TCP","54","34870 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "12945","5.830308","172.30.1.205","172.30.1.104","TCP","54","42280 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12946","5.830421","172.30.1.205","172.30.1.104","TCP","74","34918 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909056 TSecr=0 WS=128" "12947","5.830591","172.30.1.104","172.30.1.205","TCP","54","135 > 42280 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12948","5.830600","172.30.1.104","172.30.1.205","TCP","54","135 > 42280 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12949","5.830604","172.30.1.205","172.30.1.104","TCP","54","42280 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12950","5.830678","172.30.1.104","172.30.1.205","TCP","66","49671 > 34918 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12951","5.830687","172.30.1.205","172.30.1.104","TCP","54","34918 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12952","5.831040","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12953","5.831322","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12954","5.831331","172.30.1.205","172.30.1.104","TCP","54","34918 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12955","5.833245","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12956","5.833601","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12957","5.833607","172.30.1.205","172.30.1.104","TCP","54","34918 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12958","5.834975","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12959","5.836428","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12960","5.836438","172.30.1.205","172.30.1.104","TCP","54","34918 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12961","5.837414","172.30.1.205","172.30.1.104","TCP","74","42284 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909063 TSecr=0 WS=128" "12962","5.837713","172.30.1.104","172.30.1.205","TCP","66","135 > 42284 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12963","5.837724","172.30.1.205","172.30.1.104","TCP","54","42284 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12964","5.838077","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12965","5.838338","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12966","5.838347","172.30.1.205","172.30.1.104","TCP","54","42284 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12967","5.840535","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12968","5.840902","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12969","5.840912","172.30.1.205","172.30.1.104","TCP","54","42284 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12970","5.842732","172.30.1.205","172.30.1.104","TCP","54","42284 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12971","5.842857","172.30.1.205","172.30.1.104","TCP","74","34922 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909069 TSecr=0 WS=128" "12972","5.843008","172.30.1.104","172.30.1.205","TCP","54","135 > 42284 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12973","5.843019","172.30.1.104","172.30.1.205","TCP","54","135 > 42284 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12974","5.843024","172.30.1.205","172.30.1.104","TCP","54","42284 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "12975","5.843122","172.30.1.104","172.30.1.205","TCP","66","49671 > 34922 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12976","5.843138","172.30.1.205","172.30.1.104","TCP","54","34922 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12977","5.843484","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "12978","5.843753","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12979","5.843762","172.30.1.205","172.30.1.104","TCP","54","34922 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12980","5.845690","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "12981","5.846054","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "12982","5.846061","172.30.1.205","172.30.1.104","TCP","54","34922 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "12983","5.847418","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "12984","5.848957","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "12985","5.848966","172.30.1.205","172.30.1.104","TCP","54","34922 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "12986","5.849988","172.30.1.205","172.30.1.104","TCP","74","42288 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909076 TSecr=0 WS=128" "12987","5.850313","172.30.1.104","172.30.1.205","TCP","66","135 > 42288 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "12988","5.850325","172.30.1.205","172.30.1.104","TCP","54","42288 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "12989","5.850687","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "12990","5.850954","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "12991","5.850963","172.30.1.205","172.30.1.104","TCP","54","42288 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "12992","5.853220","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "12993","5.853649","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "12994","5.853656","172.30.1.205","172.30.1.104","TCP","54","42288 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "12995","5.855492","172.30.1.205","172.30.1.104","TCP","54","42288 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "12996","5.855609","172.30.1.205","172.30.1.104","TCP","74","34926 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909082 TSecr=0 WS=128" "12997","5.855777","172.30.1.104","172.30.1.205","TCP","54","135 > 42288 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12998","5.855789","172.30.1.104","172.30.1.205","TCP","54","135 > 42288 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "12999","5.855802","172.30.1.205","172.30.1.104","TCP","54","42288 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13000","5.855889","172.30.1.104","172.30.1.205","TCP","66","49671 > 34926 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13001","5.855898","172.30.1.205","172.30.1.104","TCP","54","34926 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13002","5.856249","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13003","5.856530","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13004","5.856539","172.30.1.205","172.30.1.104","TCP","54","34926 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13005","5.858457","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13006","5.859144","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13007","5.859150","172.30.1.205","172.30.1.104","TCP","54","34926 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13008","5.860520","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13009","5.862145","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13010","5.862158","172.30.1.205","172.30.1.104","TCP","54","34926 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13011","5.863150","172.30.1.205","172.30.1.104","TCP","74","42292 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909089 TSecr=0 WS=128" "13012","5.863491","172.30.1.104","172.30.1.205","TCP","66","135 > 42292 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13013","5.863503","172.30.1.205","172.30.1.104","TCP","54","42292 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13014","5.863856","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13015","5.864154","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13016","5.864163","172.30.1.205","172.30.1.104","TCP","54","42292 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13017","5.866405","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13018","5.866797","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13019","5.866804","172.30.1.205","172.30.1.104","TCP","54","42292 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13020","5.868632","172.30.1.205","172.30.1.104","TCP","54","42292 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13021","5.868754","172.30.1.205","172.30.1.104","TCP","74","34930 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909095 TSecr=0 WS=128" "13022","5.868904","172.30.1.104","172.30.1.205","TCP","54","135 > 42292 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13023","5.868955","172.30.1.104","172.30.1.205","TCP","54","135 > 42292 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13024","5.868962","172.30.1.205","172.30.1.104","TCP","54","42292 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13025","5.869035","172.30.1.104","172.30.1.205","TCP","66","49671 > 34930 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13026","5.869043","172.30.1.205","172.30.1.104","TCP","54","34930 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13027","5.869397","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13028","5.869676","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13029","5.869685","172.30.1.205","172.30.1.104","TCP","54","34930 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13030","5.871578","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13031","5.871941","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13032","5.871948","172.30.1.205","172.30.1.104","TCP","54","34930 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13033","5.873344","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13034","5.874887","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13035","5.874896","172.30.1.205","172.30.1.104","TCP","54","34930 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13036","5.875887","172.30.1.205","172.30.1.104","TCP","74","42296 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909102 TSecr=0 WS=128" "13037","5.876235","172.30.1.104","172.30.1.205","TCP","66","135 > 42296 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13038","5.876248","172.30.1.205","172.30.1.104","TCP","54","42296 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13039","5.876604","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13040","5.876906","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13041","5.876916","172.30.1.205","172.30.1.104","TCP","54","42296 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13042","5.879127","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13043","5.879519","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13044","5.879526","172.30.1.205","172.30.1.104","TCP","54","42296 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13045","5.881378","172.30.1.205","172.30.1.104","TCP","54","42296 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13046","5.881494","172.30.1.205","172.30.1.104","TCP","74","34934 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909107 TSecr=0 WS=128" "13047","5.881702","172.30.1.104","172.30.1.205","TCP","54","135 > 42296 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13048","5.881715","172.30.1.104","172.30.1.205","TCP","54","135 > 42296 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13049","5.881722","172.30.1.205","172.30.1.104","TCP","54","42296 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13050","5.881750","172.30.1.104","172.30.1.205","TCP","66","49671 > 34934 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13051","5.881758","172.30.1.205","172.30.1.104","TCP","54","34934 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13052","5.882102","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13053","5.882418","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13054","5.882427","172.30.1.205","172.30.1.104","TCP","54","34934 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13055","5.884341","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13056","5.884793","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13057","5.884800","172.30.1.205","172.30.1.104","TCP","54","34934 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13058","5.886189","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13059","5.887756","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13060","5.887765","172.30.1.205","172.30.1.104","TCP","54","34934 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13061","5.888805","172.30.1.205","172.30.1.104","TCP","74","42300 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909115 TSecr=0 WS=128" "13062","5.889121","172.30.1.104","172.30.1.205","TCP","66","135 > 42300 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13063","5.889133","172.30.1.205","172.30.1.104","TCP","54","42300 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13064","5.889494","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13065","5.889770","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13066","5.889779","172.30.1.205","172.30.1.104","TCP","54","42300 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13067","5.892012","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13068","5.892386","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13069","5.892393","172.30.1.205","172.30.1.104","TCP","54","42300 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13070","5.894251","172.30.1.205","172.30.1.104","TCP","54","42300 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13071","5.894380","172.30.1.205","172.30.1.104","TCP","74","34938 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909120 TSecr=0 WS=128" "13072","5.894532","172.30.1.104","172.30.1.205","TCP","54","135 > 42300 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13073","5.894544","172.30.1.104","172.30.1.205","TCP","54","135 > 42300 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13074","5.894551","172.30.1.205","172.30.1.104","TCP","54","42300 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13075","5.894642","172.30.1.104","172.30.1.205","TCP","66","49671 > 34938 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13076","5.894651","172.30.1.205","172.30.1.104","TCP","54","34938 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13077","5.895000","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13078","5.895293","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13079","5.895301","172.30.1.205","172.30.1.104","TCP","54","34938 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13080","5.897210","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13081","5.897600","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13082","5.897604","172.30.1.205","172.30.1.104","TCP","54","34938 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13083","5.898970","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13084","5.901397","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13085","5.901407","172.30.1.205","172.30.1.104","TCP","54","34938 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13086","5.902381","172.30.1.205","172.30.1.104","TCP","74","42304 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909128 TSecr=0 WS=128" "13087","5.902710","172.30.1.104","172.30.1.205","TCP","66","135 > 42304 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13088","5.902720","172.30.1.205","172.30.1.104","TCP","54","42304 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13089","5.903070","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13090","5.903358","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13091","5.903367","172.30.1.205","172.30.1.104","TCP","54","42304 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13092","5.905611","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13093","5.905995","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13094","5.906002","172.30.1.205","172.30.1.104","TCP","54","42304 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13095","5.907821","172.30.1.205","172.30.1.104","TCP","54","42304 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13096","5.907934","172.30.1.205","172.30.1.104","TCP","74","34942 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909134 TSecr=0 WS=128" "13097","5.908068","172.30.1.104","172.30.1.205","TCP","54","135 > 42304 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13098","5.908079","172.30.1.104","172.30.1.205","TCP","54","135 > 42304 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13099","5.908084","172.30.1.205","172.30.1.104","TCP","54","42304 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13100","5.908211","172.30.1.104","172.30.1.205","TCP","66","49671 > 34942 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13101","5.908219","172.30.1.205","172.30.1.104","TCP","54","34942 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13102","5.908580","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13103","5.910687","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13104","5.910696","172.30.1.205","172.30.1.104","TCP","54","34942 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13105","5.912583","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13106","5.912968","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13107","5.912975","172.30.1.205","172.30.1.104","TCP","54","34942 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13108","5.914345","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13109","5.917190","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13110","5.917201","172.30.1.205","172.30.1.104","TCP","54","34942 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13111","5.918186","172.30.1.205","172.30.1.104","TCP","74","42308 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909144 TSecr=0 WS=128" "13112","5.918524","172.30.1.104","172.30.1.205","TCP","66","135 > 42308 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13113","5.918535","172.30.1.205","172.30.1.104","TCP","54","42308 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13114","5.918899","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13115","5.919181","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13116","5.919190","172.30.1.205","172.30.1.104","TCP","54","42308 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13117","5.921421","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13118","5.921867","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13119","5.921873","172.30.1.205","172.30.1.104","TCP","54","42308 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13120","5.923688","172.30.1.205","172.30.1.104","TCP","54","42308 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13121","5.923803","172.30.1.205","172.30.1.104","TCP","74","34946 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909150 TSecr=0 WS=128" "13122","5.923963","172.30.1.104","172.30.1.205","TCP","54","135 > 42308 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13123","5.923981","172.30.1.104","172.30.1.205","TCP","54","135 > 42308 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13124","5.923994","172.30.1.205","172.30.1.104","TCP","54","42308 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13125","5.924067","172.30.1.104","172.30.1.205","TCP","66","49671 > 34946 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13126","5.924075","172.30.1.205","172.30.1.104","TCP","54","34946 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13127","5.924422","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13128","5.924731","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13129","5.924740","172.30.1.205","172.30.1.104","TCP","54","34946 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13130","5.926633","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13131","5.926999","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13132","5.927006","172.30.1.205","172.30.1.104","TCP","54","34946 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13133","5.928376","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13134","5.929907","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13135","5.929916","172.30.1.205","172.30.1.104","TCP","54","34946 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13136","5.930870","172.30.1.205","172.30.1.104","TCP","74","42312 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909157 TSecr=0 WS=128" "13137","5.931169","172.30.1.104","172.30.1.205","TCP","66","135 > 42312 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13138","5.931180","172.30.1.205","172.30.1.104","TCP","54","42312 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13139","5.931540","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13140","5.931827","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13141","5.931836","172.30.1.205","172.30.1.104","TCP","54","42312 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13142","5.934043","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13143","5.934437","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13144","5.934444","172.30.1.205","172.30.1.104","TCP","54","42312 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13145","5.936259","172.30.1.205","172.30.1.104","TCP","54","42312 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13146","5.936370","172.30.1.205","172.30.1.104","TCP","74","34950 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909162 TSecr=0 WS=128" "13147","5.936535","172.30.1.104","172.30.1.205","TCP","54","135 > 42312 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13148","5.936593","172.30.1.104","172.30.1.205","TCP","54","135 > 42312 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13149","5.936598","172.30.1.205","172.30.1.104","TCP","54","42312 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13150","5.936692","172.30.1.104","172.30.1.205","TCP","66","49671 > 34950 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13151","5.936700","172.30.1.205","172.30.1.104","TCP","54","34950 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13152","5.937079","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13153","5.937363","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13154","5.937372","172.30.1.205","172.30.1.104","TCP","54","34950 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13155","5.939257","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13156","5.941047","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13157","5.941054","172.30.1.205","172.30.1.104","TCP","54","34950 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13158","5.942417","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13159","5.943918","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13160","5.943927","172.30.1.205","172.30.1.104","TCP","54","34950 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13161","5.944871","172.30.1.205","172.30.1.104","TCP","74","42316 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909171 TSecr=0 WS=128" "13162","5.945151","172.30.1.104","172.30.1.205","TCP","66","135 > 42316 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13163","5.945162","172.30.1.205","172.30.1.104","TCP","54","42316 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13164","5.945520","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13165","5.945836","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13166","5.945845","172.30.1.205","172.30.1.104","TCP","54","42316 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13167","5.948019","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13168","5.948439","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13169","5.948446","172.30.1.205","172.30.1.104","TCP","54","42316 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13170","5.950278","172.30.1.205","172.30.1.104","TCP","54","42316 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13171","5.950390","172.30.1.205","172.30.1.104","TCP","74","34954 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909176 TSecr=0 WS=128" "13172","5.950561","172.30.1.104","172.30.1.205","TCP","54","135 > 42316 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13173","5.950604","172.30.1.104","172.30.1.205","TCP","54","135 > 42316 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13174","5.950610","172.30.1.205","172.30.1.104","TCP","54","42316 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13175","5.950686","172.30.1.104","172.30.1.205","TCP","66","49671 > 34954 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13176","5.950694","172.30.1.205","172.30.1.104","TCP","54","34954 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13177","5.951040","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13178","5.952298","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13179","5.952306","172.30.1.205","172.30.1.104","TCP","54","34954 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13180","5.954194","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13181","5.954564","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13182","5.954571","172.30.1.205","172.30.1.104","TCP","54","34954 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13183","5.955907","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13184","5.957519","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13185","5.957529","172.30.1.205","172.30.1.104","TCP","54","34954 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13186","5.958467","172.30.1.205","172.30.1.104","TCP","74","42320 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909184 TSecr=0 WS=128" "13187","5.958769","172.30.1.104","172.30.1.205","TCP","66","135 > 42320 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13188","5.958780","172.30.1.205","172.30.1.104","TCP","54","42320 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13189","5.959130","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13190","5.959414","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13191","5.959423","172.30.1.205","172.30.1.104","TCP","54","42320 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13192","5.961646","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13193","5.962037","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13194","5.962045","172.30.1.205","172.30.1.104","TCP","54","42320 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13195","5.963859","172.30.1.205","172.30.1.104","TCP","54","42320 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13196","5.963974","172.30.1.205","172.30.1.104","TCP","74","34958 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909190 TSecr=0 WS=128" "13197","5.964172","172.30.1.104","172.30.1.205","TCP","54","135 > 42320 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13198","5.964181","172.30.1.104","172.30.1.205","TCP","54","135 > 42320 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13199","5.964186","172.30.1.205","172.30.1.104","TCP","54","42320 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13200","5.964266","172.30.1.104","172.30.1.205","TCP","66","49671 > 34958 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13201","5.964274","172.30.1.205","172.30.1.104","TCP","54","34958 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13202","5.964623","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13203","5.964890","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13204","5.964899","172.30.1.205","172.30.1.104","TCP","54","34958 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13205","5.966813","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13206","5.967183","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13207","5.967190","172.30.1.205","172.30.1.104","TCP","54","34958 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13208","5.968573","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13209","5.970140","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13210","5.970149","172.30.1.205","172.30.1.104","TCP","54","34958 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13211","5.971094","172.30.1.205","172.30.1.104","TCP","74","42324 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909197 TSecr=0 WS=128" "13212","5.971424","172.30.1.104","172.30.1.205","TCP","66","135 > 42324 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13213","5.971435","172.30.1.205","172.30.1.104","TCP","54","42324 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13214","5.971781","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13215","5.972043","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13216","5.972052","172.30.1.205","172.30.1.104","TCP","54","42324 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13217","5.974264","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13218","5.974651","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13219","5.974658","172.30.1.205","172.30.1.104","TCP","54","42324 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13220","5.976549","172.30.1.205","172.30.1.104","TCP","54","42324 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13221","5.976652","172.30.1.205","172.30.1.104","TCP","74","34962 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909203 TSecr=0 WS=128" "13222","5.976829","172.30.1.104","172.30.1.205","TCP","54","135 > 42324 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13223","5.976856","172.30.1.104","172.30.1.205","TCP","54","135 > 42324 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13224","5.976862","172.30.1.205","172.30.1.104","TCP","54","42324 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13225","5.976934","172.30.1.104","172.30.1.205","TCP","66","49671 > 34962 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13226","5.976942","172.30.1.205","172.30.1.104","TCP","54","34962 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13227","5.977319","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13228","5.979790","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13229","5.979797","172.30.1.205","172.30.1.104","TCP","54","34962 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13230","5.981712","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13231","5.982086","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13232","5.982092","172.30.1.205","172.30.1.104","TCP","54","34962 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13233","5.983472","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13234","5.985104","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13235","5.985114","172.30.1.205","172.30.1.104","TCP","54","34962 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13236","5.986064","172.30.1.205","172.30.1.104","TCP","74","42328 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909212 TSecr=0 WS=128" "13237","5.986378","172.30.1.104","172.30.1.205","TCP","66","135 > 42328 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13238","5.986388","172.30.1.205","172.30.1.104","TCP","54","42328 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13239","5.986741","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13240","5.987010","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13241","5.987019","172.30.1.205","172.30.1.104","TCP","54","42328 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13242","5.989211","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13243","5.989614","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13244","5.989621","172.30.1.205","172.30.1.104","TCP","54","42328 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13245","5.990457","172.30.1.205","172.30.1.104","TCP","54","34922 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13246","5.990508","172.30.1.205","172.30.1.104","TCP","54","34926 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13247","5.990547","172.30.1.205","172.30.1.104","TCP","54","34930 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13248","5.990589","172.30.1.205","172.30.1.104","TCP","54","34934 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13249","5.990627","172.30.1.205","172.30.1.104","TCP","54","34938 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13250","5.990663","172.30.1.205","172.30.1.104","TCP","54","34942 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13251","5.990697","172.30.1.205","172.30.1.104","TCP","54","34946 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13252","5.990730","172.30.1.205","172.30.1.104","TCP","54","34950 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13253","5.990763","172.30.1.205","172.30.1.104","TCP","54","34954 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13254","5.990792","172.30.1.205","172.30.1.104","TCP","54","34958 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13255","5.990825","172.30.1.205","172.30.1.104","TCP","54","34962 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13256","5.990901","172.30.1.205","172.30.1.104","TCP","54","34918 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13257","5.991012","172.30.1.104","172.30.1.205","TCP","54","49671 > 34922 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13258","5.991035","172.30.1.104","172.30.1.205","TCP","54","49671 > 34926 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13259","5.991055","172.30.1.104","172.30.1.205","TCP","54","49671 > 34922 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13260","5.991061","172.30.1.205","172.30.1.104","TCP","54","34922 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13261","5.991075","172.30.1.104","172.30.1.205","TCP","54","49671 > 34930 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13262","5.991100","172.30.1.104","172.30.1.205","TCP","54","49671 > 34934 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13263","5.991121","172.30.1.104","172.30.1.205","TCP","54","49671 > 34938 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13264","5.991139","172.30.1.104","172.30.1.205","TCP","54","49671 > 34934 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13265","5.991143","172.30.1.205","172.30.1.104","TCP","54","34934 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13266","5.991159","172.30.1.104","172.30.1.205","TCP","54","49671 > 34942 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13267","5.991179","172.30.1.104","172.30.1.205","TCP","54","49671 > 34938 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13268","5.991183","172.30.1.205","172.30.1.104","TCP","54","34938 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13269","5.991199","172.30.1.104","172.30.1.205","TCP","54","49671 > 34946 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13270","5.991219","172.30.1.104","172.30.1.205","TCP","54","49671 > 34942 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13271","5.991223","172.30.1.205","172.30.1.104","TCP","54","34942 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13272","5.991239","172.30.1.104","172.30.1.205","TCP","54","49671 > 34946 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13273","5.991242","172.30.1.205","172.30.1.104","TCP","54","34946 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13274","5.991262","172.30.1.104","172.30.1.205","TCP","54","49671 > 34950 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13275","5.991391","172.30.1.104","172.30.1.205","TCP","54","49671 > 34954 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13276","5.991411","172.30.1.104","172.30.1.205","TCP","54","49671 > 34950 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13277","5.991416","172.30.1.205","172.30.1.104","TCP","54","34950 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13278","5.991440","172.30.1.104","172.30.1.205","TCP","54","49671 > 34954 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13279","5.991443","172.30.1.205","172.30.1.104","TCP","54","34954 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13280","5.991461","172.30.1.104","172.30.1.205","TCP","54","49671 > 34926 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13281","5.991464","172.30.1.205","172.30.1.104","TCP","54","34926 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13282","5.991483","172.30.1.104","172.30.1.205","TCP","54","49671 > 34930 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13283","5.991485","172.30.1.205","172.30.1.104","TCP","54","34930 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13284","5.991605","172.30.1.104","172.30.1.205","TCP","54","49671 > 34958 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13285","5.991629","172.30.1.104","172.30.1.205","TCP","54","49671 > 34962 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13286","5.991649","172.30.1.104","172.30.1.205","TCP","54","49671 > 34918 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13287","5.991689","172.30.1.104","172.30.1.205","TCP","54","49671 > 34958 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13288","5.991694","172.30.1.205","172.30.1.104","TCP","54","34958 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13289","5.991717","172.30.1.104","172.30.1.205","TCP","54","49671 > 34962 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13290","5.991719","172.30.1.205","172.30.1.104","TCP","54","34962 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13291","5.991743","172.30.1.104","172.30.1.205","TCP","54","49671 > 34918 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13292","5.991745","172.30.1.205","172.30.1.104","TCP","54","34918 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13293","5.992533","172.30.1.205","172.30.1.104","TCP","54","42328 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13294","5.992644","172.30.1.205","172.30.1.104","TCP","74","34966 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909219 TSecr=0 WS=128" "13295","5.992795","172.30.1.104","172.30.1.205","TCP","54","135 > 42328 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13296","5.992826","172.30.1.104","172.30.1.205","TCP","54","135 > 42328 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13297","5.992832","172.30.1.205","172.30.1.104","TCP","54","42328 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13298","5.992916","172.30.1.104","172.30.1.205","TCP","66","49671 > 34966 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13299","5.992925","172.30.1.205","172.30.1.104","TCP","54","34966 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13300","5.993290","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13301","5.993559","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13302","5.993567","172.30.1.205","172.30.1.104","TCP","54","34966 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13303","5.995445","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13304","5.995850","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13305","5.995857","172.30.1.205","172.30.1.104","TCP","54","34966 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13306","5.997250","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13307","5.998845","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13308","5.998854","172.30.1.205","172.30.1.104","TCP","54","34966 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13309","5.999790","172.30.1.205","172.30.1.104","TCP","74","42332 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909226 TSecr=0 WS=128" "13310","6.000090","172.30.1.104","172.30.1.205","TCP","66","135 > 42332 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13311","6.000101","172.30.1.205","172.30.1.104","TCP","54","42332 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13312","6.000451","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13313","6.000726","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13314","6.000735","172.30.1.205","172.30.1.104","TCP","54","42332 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13315","6.002947","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13316","6.003359","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13317","6.003365","172.30.1.205","172.30.1.104","TCP","54","42332 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13318","6.005203","172.30.1.205","172.30.1.104","TCP","54","42332 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13319","6.005318","172.30.1.205","172.30.1.104","TCP","74","34970 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909231 TSecr=0 WS=128" "13320","6.005464","172.30.1.104","172.30.1.205","TCP","54","135 > 42332 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13321","6.005478","172.30.1.104","172.30.1.205","TCP","54","135 > 42332 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13322","6.005483","172.30.1.205","172.30.1.104","TCP","54","42332 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13323","6.005577","172.30.1.104","172.30.1.205","TCP","66","49671 > 34970 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13324","6.005585","172.30.1.205","172.30.1.104","TCP","54","34970 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13325","6.005931","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13326","6.006207","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13327","6.006215","172.30.1.205","172.30.1.104","TCP","54","34970 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13328","6.008082","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13329","6.010459","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13330","6.010464","172.30.1.205","172.30.1.104","TCP","54","34970 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13331","6.011853","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13332","6.013510","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13333","6.013519","172.30.1.205","172.30.1.104","TCP","54","34970 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13334","6.014514","172.30.1.205","172.30.1.104","TCP","74","42336 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909240 TSecr=0 WS=128" "13335","6.014834","172.30.1.104","172.30.1.205","TCP","66","135 > 42336 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13336","6.014845","172.30.1.205","172.30.1.104","TCP","54","42336 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13337","6.015200","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13338","6.015547","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13339","6.015556","172.30.1.205","172.30.1.104","TCP","54","42336 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13340","6.017809","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13341","6.018224","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13342","6.018230","172.30.1.205","172.30.1.104","TCP","54","42336 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13343","6.020055","172.30.1.205","172.30.1.104","TCP","54","42336 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13344","6.020169","172.30.1.205","172.30.1.104","TCP","74","34974 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909246 TSecr=0 WS=128" "13345","6.020320","172.30.1.104","172.30.1.205","TCP","54","135 > 42336 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13346","6.020334","172.30.1.104","172.30.1.205","TCP","54","135 > 42336 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13347","6.020339","172.30.1.205","172.30.1.104","TCP","54","42336 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13348","6.020441","172.30.1.104","172.30.1.205","TCP","66","49671 > 34974 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13349","6.020457","172.30.1.205","172.30.1.104","TCP","54","34974 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13350","6.020831","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13351","6.021118","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13352","6.021126","172.30.1.205","172.30.1.104","TCP","54","34974 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13353","6.023027","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13354","6.023412","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13355","6.023419","172.30.1.205","172.30.1.104","TCP","54","34974 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13356","6.024793","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13357","6.026417","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13358","6.026426","172.30.1.205","172.30.1.104","TCP","54","34974 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13359","6.027371","172.30.1.205","172.30.1.104","TCP","74","42340 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909253 TSecr=0 WS=128" "13360","6.027679","172.30.1.104","172.30.1.205","TCP","66","135 > 42340 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13361","6.027690","172.30.1.205","172.30.1.104","TCP","54","42340 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13362","6.028045","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13363","6.028343","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13364","6.028352","172.30.1.205","172.30.1.104","TCP","54","42340 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13365","6.030589","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13366","6.031001","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13367","6.031007","172.30.1.205","172.30.1.104","TCP","54","42340 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13368","6.032850","172.30.1.205","172.30.1.104","TCP","54","42340 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13369","6.032960","172.30.1.205","172.30.1.104","TCP","74","34978 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909259 TSecr=0 WS=128" "13370","6.033155","172.30.1.104","172.30.1.205","TCP","54","135 > 42340 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13371","6.033164","172.30.1.104","172.30.1.205","TCP","54","135 > 42340 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13372","6.033169","172.30.1.205","172.30.1.104","TCP","54","42340 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13373","6.033244","172.30.1.104","172.30.1.205","TCP","66","49671 > 34978 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13374","6.033253","172.30.1.205","172.30.1.104","TCP","54","34978 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13375","6.033600","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13376","6.033876","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13377","6.033883","172.30.1.205","172.30.1.104","TCP","54","34978 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13378","6.035748","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13379","6.036115","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13380","6.036122","172.30.1.205","172.30.1.104","TCP","54","34978 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13381","6.037506","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13382","6.039113","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13383","6.039143","172.30.1.205","172.30.1.104","TCP","54","34978 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13384","6.040082","172.30.1.205","172.30.1.104","TCP","74","42344 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909266 TSecr=0 WS=128" "13385","6.040396","172.30.1.104","172.30.1.205","TCP","66","135 > 42344 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13386","6.040407","172.30.1.205","172.30.1.104","TCP","54","42344 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13387","6.040767","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13388","6.041076","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13389","6.041085","172.30.1.205","172.30.1.104","TCP","54","42344 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13390","6.043269","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13391","6.043636","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13392","6.043642","172.30.1.205","172.30.1.104","TCP","54","42344 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13393","6.045514","172.30.1.205","172.30.1.104","TCP","54","42344 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13394","6.045628","172.30.1.205","172.30.1.104","TCP","74","34982 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909272 TSecr=0 WS=128" "13395","6.045769","172.30.1.104","172.30.1.205","TCP","54","135 > 42344 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13396","6.045783","172.30.1.104","172.30.1.205","TCP","54","135 > 42344 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13397","6.045789","172.30.1.205","172.30.1.104","TCP","54","42344 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13398","6.045892","172.30.1.104","172.30.1.205","TCP","66","49671 > 34982 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13399","6.045901","172.30.1.205","172.30.1.104","TCP","54","34982 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13400","6.046246","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13401","6.046549","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13402","6.046557","172.30.1.205","172.30.1.104","TCP","54","34982 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13403","6.048437","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13404","6.048793","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13405","6.048800","172.30.1.205","172.30.1.104","TCP","54","34982 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13406","6.050167","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13407","6.051739","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13408","6.051748","172.30.1.205","172.30.1.104","TCP","54","34982 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13409","6.052706","172.30.1.205","172.30.1.104","TCP","74","42348 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909279 TSecr=0 WS=128" "13410","6.053024","172.30.1.104","172.30.1.205","TCP","66","135 > 42348 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13411","6.053035","172.30.1.205","172.30.1.104","TCP","54","42348 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13412","6.053396","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13413","6.053669","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13414","6.053679","172.30.1.205","172.30.1.104","TCP","54","42348 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13415","6.055864","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13416","6.056261","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13417","6.056269","172.30.1.205","172.30.1.104","TCP","54","42348 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13418","6.058143","172.30.1.205","172.30.1.104","TCP","54","42348 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13419","6.058256","172.30.1.205","172.30.1.104","TCP","74","34986 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909284 TSecr=0 WS=128" "13420","6.058459","172.30.1.104","172.30.1.205","TCP","54","135 > 42348 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13421","6.058535","172.30.1.104","172.30.1.205","TCP","66","49671 > 34986 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13422","6.058545","172.30.1.205","172.30.1.104","TCP","54","34986 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13423","6.058593","172.30.1.104","172.30.1.205","TCP","54","135 > 42348 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13424","6.058599","172.30.1.205","172.30.1.104","TCP","54","42348 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13425","6.058928","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13426","6.059205","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13427","6.059220","172.30.1.205","172.30.1.104","TCP","54","34986 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13428","6.061219","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13429","6.061708","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13430","6.061715","172.30.1.205","172.30.1.104","TCP","54","34986 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13431","6.063077","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13432","6.064696","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13433","6.064715","172.30.1.205","172.30.1.104","TCP","54","34986 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13434","6.065784","172.30.1.205","172.30.1.104","TCP","74","42352 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909292 TSecr=0 WS=128" "13435","6.066100","172.30.1.104","172.30.1.205","TCP","66","135 > 42352 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13436","6.066111","172.30.1.205","172.30.1.104","TCP","54","42352 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13437","6.066459","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13438","6.066741","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13439","6.066750","172.30.1.205","172.30.1.104","TCP","54","42352 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13440","6.068946","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13441","6.069324","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13442","6.069331","172.30.1.205","172.30.1.104","TCP","54","42352 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13443","6.071154","172.30.1.205","172.30.1.104","TCP","54","42352 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13444","6.071272","172.30.1.205","172.30.1.104","TCP","74","34990 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909297 TSecr=0 WS=128" "13445","6.071431","172.30.1.104","172.30.1.205","TCP","54","135 > 42352 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13446","6.071479","172.30.1.104","172.30.1.205","TCP","54","135 > 42352 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13447","6.071485","172.30.1.205","172.30.1.104","TCP","54","42352 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13448","6.071559","172.30.1.104","172.30.1.205","TCP","66","49671 > 34990 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13449","6.071567","172.30.1.205","172.30.1.104","TCP","54","34990 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13450","6.071915","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13451","6.072198","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13452","6.072207","172.30.1.205","172.30.1.104","TCP","54","34990 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13453","6.074127","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13454","6.074497","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13455","6.074511","172.30.1.205","172.30.1.104","TCP","54","34990 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13456","6.075874","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13457","6.077427","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13458","6.077439","172.30.1.205","172.30.1.104","TCP","54","34990 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13459","6.078482","172.30.1.205","172.30.1.104","TCP","74","42356 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909304 TSecr=0 WS=128" "13460","6.078788","172.30.1.104","172.30.1.205","TCP","66","135 > 42356 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13461","6.078800","172.30.1.205","172.30.1.104","TCP","54","42356 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13462","6.079154","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13463","6.079431","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13464","6.079440","172.30.1.205","172.30.1.104","TCP","54","42356 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13465","6.081701","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13466","6.082095","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13467","6.082102","172.30.1.205","172.30.1.104","TCP","54","42356 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13468","6.083942","172.30.1.205","172.30.1.104","TCP","54","42356 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13469","6.084083","172.30.1.205","172.30.1.104","TCP","74","34994 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909310 TSecr=0 WS=128" "13470","6.084226","172.30.1.104","172.30.1.205","TCP","54","135 > 42356 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13471","6.084245","172.30.1.104","172.30.1.205","TCP","54","135 > 42356 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13472","6.084253","172.30.1.205","172.30.1.104","TCP","54","42356 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13473","6.084341","172.30.1.104","172.30.1.205","TCP","66","49671 > 34994 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13474","6.084361","172.30.1.205","172.30.1.104","TCP","54","34994 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13475","6.085085","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13476","6.085378","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13477","6.085388","172.30.1.205","172.30.1.104","TCP","54","34994 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13478","6.087311","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13479","6.087684","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13480","6.087690","172.30.1.205","172.30.1.104","TCP","54","34994 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13481","6.089116","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13482","6.091066","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13483","6.091076","172.30.1.205","172.30.1.104","TCP","54","34994 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13484","6.092050","172.30.1.205","172.30.1.104","TCP","74","42360 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909318 TSecr=0 WS=128" "13485","6.092391","172.30.1.104","172.30.1.205","TCP","66","135 > 42360 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13486","6.092403","172.30.1.205","172.30.1.104","TCP","54","42360 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13487","6.092754","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13488","6.093023","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13489","6.093034","172.30.1.205","172.30.1.104","TCP","54","42360 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13490","6.095235","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13491","6.095606","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13492","6.095613","172.30.1.205","172.30.1.104","TCP","54","42360 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13493","6.097469","172.30.1.205","172.30.1.104","TCP","54","42360 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13494","6.097582","172.30.1.205","172.30.1.104","TCP","74","34998 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909324 TSecr=0 WS=128" "13495","6.097729","172.30.1.104","172.30.1.205","TCP","54","135 > 42360 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13496","6.097741","172.30.1.104","172.30.1.205","TCP","54","135 > 42360 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13497","6.097746","172.30.1.205","172.30.1.104","TCP","54","42360 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13498","6.097852","172.30.1.104","172.30.1.205","TCP","66","49671 > 34998 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13499","6.097860","172.30.1.205","172.30.1.104","TCP","54","34998 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13500","6.098210","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13501","6.098481","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13502","6.098490","172.30.1.205","172.30.1.104","TCP","54","34998 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13503","6.100349","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13504","6.100696","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13505","6.100702","172.30.1.205","172.30.1.104","TCP","54","34998 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13506","6.102071","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13507","6.103544","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13508","6.103553","172.30.1.205","172.30.1.104","TCP","54","34998 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13509","6.104484","172.30.1.205","172.30.1.104","TCP","74","42364 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909330 TSecr=0 WS=128" "13510","6.104784","172.30.1.104","172.30.1.205","TCP","66","135 > 42364 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13511","6.104795","172.30.1.205","172.30.1.104","TCP","54","42364 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13512","6.105150","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13513","6.105453","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13514","6.105462","172.30.1.205","172.30.1.104","TCP","54","42364 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13515","6.107630","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13516","6.107987","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13517","6.107994","172.30.1.205","172.30.1.104","TCP","54","42364 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13518","6.109824","172.30.1.205","172.30.1.104","TCP","54","42364 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13519","6.109935","172.30.1.205","172.30.1.104","TCP","74","35002 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909336 TSecr=0 WS=128" "13520","6.110084","172.30.1.104","172.30.1.205","TCP","54","135 > 42364 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13521","6.110113","172.30.1.104","172.30.1.205","TCP","54","135 > 42364 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13522","6.110118","172.30.1.205","172.30.1.104","TCP","54","42364 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13523","6.110216","172.30.1.104","172.30.1.205","TCP","66","49671 > 35002 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13524","6.110224","172.30.1.205","172.30.1.104","TCP","54","35002 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13525","6.110576","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13526","6.110864","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13527","6.110873","172.30.1.205","172.30.1.104","TCP","54","35002 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13528","6.112747","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13529","6.113158","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13530","6.113164","172.30.1.205","172.30.1.104","TCP","54","35002 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13531","6.114505","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13532","6.115995","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13533","6.116004","172.30.1.205","172.30.1.104","TCP","54","35002 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13534","6.116942","172.30.1.205","172.30.1.104","TCP","74","42368 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909343 TSecr=0 WS=128" "13535","6.117267","172.30.1.104","172.30.1.205","TCP","66","135 > 42368 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13536","6.117277","172.30.1.205","172.30.1.104","TCP","54","42368 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13537","6.117635","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13538","6.117923","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13539","6.117932","172.30.1.205","172.30.1.104","TCP","54","42368 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13540","6.120117","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13541","6.120483","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13542","6.120489","172.30.1.205","172.30.1.104","TCP","54","42368 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13543","6.122315","172.30.1.205","172.30.1.104","TCP","54","42368 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13544","6.122426","172.30.1.205","172.30.1.104","TCP","74","35006 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909348 TSecr=0 WS=128" "13545","6.122567","172.30.1.104","172.30.1.205","TCP","54","135 > 42368 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13546","6.122612","172.30.1.104","172.30.1.205","TCP","54","135 > 42368 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13547","6.122622","172.30.1.205","172.30.1.104","TCP","54","42368 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13548","6.122697","172.30.1.104","172.30.1.205","TCP","66","49671 > 35006 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13549","6.122710","172.30.1.205","172.30.1.104","TCP","54","35006 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13550","6.123117","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13551","6.123383","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13552","6.123403","172.30.1.205","172.30.1.104","TCP","54","35006 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13553","6.125604","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13554","6.125999","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13555","6.126006","172.30.1.205","172.30.1.104","TCP","54","35006 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13556","6.127371","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13557","6.128854","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13558","6.128865","172.30.1.205","172.30.1.104","TCP","54","35006 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13559","6.129842","172.30.1.205","172.30.1.104","TCP","74","42372 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909356 TSecr=0 WS=128" "13560","6.130142","172.30.1.104","172.30.1.205","TCP","66","135 > 42372 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13561","6.130153","172.30.1.205","172.30.1.104","TCP","54","42372 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13562","6.130503","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13563","6.130798","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13564","6.130807","172.30.1.205","172.30.1.104","TCP","54","42372 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13565","6.133028","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13566","6.133444","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13567","6.133451","172.30.1.205","172.30.1.104","TCP","54","42372 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13568","6.135271","172.30.1.205","172.30.1.104","TCP","54","42372 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13569","6.135388","172.30.1.205","172.30.1.104","TCP","74","35010 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909361 TSecr=0 WS=128" "13570","6.135572","172.30.1.104","172.30.1.205","TCP","54","135 > 42372 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13571","6.135613","172.30.1.104","172.30.1.205","TCP","54","135 > 42372 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13572","6.135618","172.30.1.205","172.30.1.104","TCP","54","42372 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13573","6.135693","172.30.1.104","172.30.1.205","TCP","66","49671 > 35010 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13574","6.135701","172.30.1.205","172.30.1.104","TCP","54","35010 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13575","6.136052","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13576","6.136336","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13577","6.136343","172.30.1.205","172.30.1.104","TCP","54","35010 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13578","6.138235","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13579","6.138615","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13580","6.138622","172.30.1.205","172.30.1.104","TCP","54","35010 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13581","6.139969","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13582","6.141628","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13583","6.141638","172.30.1.205","172.30.1.104","TCP","54","35010 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13584","6.142587","172.30.1.205","172.30.1.104","TCP","74","42376 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909369 TSecr=0 WS=128" "13585","6.142899","172.30.1.104","172.30.1.205","TCP","66","135 > 42376 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13586","6.142909","172.30.1.205","172.30.1.104","TCP","54","42376 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13587","6.143257","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13588","6.143535","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13589","6.143543","172.30.1.205","172.30.1.104","TCP","54","42376 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13590","6.145758","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13591","6.146412","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13592","6.146419","172.30.1.205","172.30.1.104","TCP","54","42376 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13593","6.147270","172.30.1.205","172.30.1.104","TCP","54","34970 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13594","6.147319","172.30.1.205","172.30.1.104","TCP","54","34974 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13595","6.147356","172.30.1.205","172.30.1.104","TCP","54","34978 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13596","6.147390","172.30.1.205","172.30.1.104","TCP","54","34982 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13597","6.147414","172.30.1.205","172.30.1.104","TCP","54","34986 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13598","6.147442","172.30.1.205","172.30.1.104","TCP","54","34990 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13599","6.147470","172.30.1.205","172.30.1.104","TCP","54","34994 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13600","6.147497","172.30.1.205","172.30.1.104","TCP","54","34998 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13601","6.147524","172.30.1.205","172.30.1.104","TCP","54","35002 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13602","6.147550","172.30.1.205","172.30.1.104","TCP","54","35006 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13603","6.147557","172.30.1.104","172.30.1.205","TCP","54","49671 > 34970 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13604","6.147596","172.30.1.205","172.30.1.104","TCP","54","35010 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13605","6.147622","172.30.1.104","172.30.1.205","TCP","54","49671 > 34974 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13606","6.147642","172.30.1.104","172.30.1.205","TCP","54","49671 > 34970 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13607","6.147648","172.30.1.205","172.30.1.104","TCP","54","34970 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13608","6.147707","172.30.1.205","172.30.1.104","TCP","54","34966 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13609","6.147792","172.30.1.104","172.30.1.205","TCP","54","49671 > 34978 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13610","6.147810","172.30.1.104","172.30.1.205","TCP","54","49671 > 34974 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13611","6.147816","172.30.1.205","172.30.1.104","TCP","54","34974 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13612","6.147830","172.30.1.104","172.30.1.205","TCP","54","49671 > 34978 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13613","6.147833","172.30.1.205","172.30.1.104","TCP","54","34978 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13614","6.147866","172.30.1.104","172.30.1.205","TCP","54","49671 > 34986 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13615","6.147899","172.30.1.104","172.30.1.205","TCP","54","49671 > 34986 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13616","6.147903","172.30.1.205","172.30.1.104","TCP","54","34986 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13617","6.147919","172.30.1.104","172.30.1.205","TCP","54","49671 > 34990 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13618","6.147938","172.30.1.104","172.30.1.205","TCP","54","49671 > 34994 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13619","6.147958","172.30.1.104","172.30.1.205","TCP","54","49671 > 34982 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13620","6.147978","172.30.1.104","172.30.1.205","TCP","54","49671 > 34998 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13621","6.148079","172.30.1.104","172.30.1.205","TCP","54","49671 > 34998 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13622","6.148084","172.30.1.205","172.30.1.104","TCP","54","34998 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13623","6.148098","172.30.1.104","172.30.1.205","TCP","54","49671 > 35002 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13624","6.148120","172.30.1.104","172.30.1.205","TCP","54","49671 > 34982 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13625","6.148124","172.30.1.205","172.30.1.104","TCP","54","34982 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13626","6.148140","172.30.1.104","172.30.1.205","TCP","54","49671 > 35002 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13627","6.148143","172.30.1.205","172.30.1.104","TCP","54","35002 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13628","6.148160","172.30.1.104","172.30.1.205","TCP","54","49671 > 34990 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13629","6.148164","172.30.1.205","172.30.1.104","TCP","54","34990 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13630","6.148180","172.30.1.104","172.30.1.205","TCP","54","49671 > 34994 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13631","6.148183","172.30.1.205","172.30.1.104","TCP","54","34994 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13632","6.148201","172.30.1.104","172.30.1.205","TCP","54","49671 > 34966 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13633","6.148224","172.30.1.104","172.30.1.205","TCP","54","49671 > 34966 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13634","6.148229","172.30.1.205","172.30.1.104","TCP","54","34966 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13635","6.148242","172.30.1.104","172.30.1.205","TCP","54","49671 > 35006 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13636","6.148263","172.30.1.104","172.30.1.205","TCP","54","49671 > 35010 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13637","6.148324","172.30.1.104","172.30.1.205","TCP","54","49671 > 35006 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13638","6.148329","172.30.1.205","172.30.1.104","TCP","54","35006 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13639","6.148331","172.30.1.104","172.30.1.205","TCP","54","49671 > 35010 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13640","6.148332","172.30.1.205","172.30.1.104","TCP","54","35010 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13641","6.149290","172.30.1.205","172.30.1.104","TCP","54","42376 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13642","6.149405","172.30.1.205","172.30.1.104","TCP","74","35014 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909375 TSecr=0 WS=128" "13643","6.149565","172.30.1.104","172.30.1.205","TCP","54","135 > 42376 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13644","6.149576","172.30.1.104","172.30.1.205","TCP","54","135 > 42376 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13645","6.149581","172.30.1.205","172.30.1.104","TCP","54","42376 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13646","6.149664","172.30.1.104","172.30.1.205","TCP","66","49671 > 35014 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13647","6.149672","172.30.1.205","172.30.1.104","TCP","54","35014 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13648","6.150027","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13649","6.150330","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13650","6.150338","172.30.1.205","172.30.1.104","TCP","54","35014 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13651","6.152215","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13652","6.152621","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13653","6.152627","172.30.1.205","172.30.1.104","TCP","54","35014 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13654","6.154015","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13655","6.155557","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13656","6.155567","172.30.1.205","172.30.1.104","TCP","54","35014 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13657","6.156497","172.30.1.205","172.30.1.104","TCP","74","42380 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909382 TSecr=0 WS=128" "13658","6.156783","172.30.1.104","172.30.1.205","TCP","66","135 > 42380 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13659","6.156794","172.30.1.205","172.30.1.104","TCP","54","42380 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13660","6.157155","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13661","6.157456","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13662","6.157465","172.30.1.205","172.30.1.104","TCP","54","42380 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13663","6.159635","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13664","6.160022","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13665","6.160029","172.30.1.205","172.30.1.104","TCP","54","42380 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13666","6.161856","172.30.1.205","172.30.1.104","TCP","54","42380 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13667","6.161967","172.30.1.205","172.30.1.104","TCP","74","35018 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909388 TSecr=0 WS=128" "13668","6.162140","172.30.1.104","172.30.1.205","TCP","54","135 > 42380 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13669","6.162171","172.30.1.104","172.30.1.205","TCP","54","135 > 42380 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13670","6.162176","172.30.1.205","172.30.1.104","TCP","54","42380 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13671","6.162256","172.30.1.104","172.30.1.205","TCP","66","49671 > 35018 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13672","6.162265","172.30.1.205","172.30.1.104","TCP","54","35018 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13673","6.162615","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13674","6.162934","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13675","6.162943","172.30.1.205","172.30.1.104","TCP","54","35018 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13676","6.164836","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13677","6.165231","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13678","6.165237","172.30.1.205","172.30.1.104","TCP","54","35018 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13679","6.166582","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13680","6.168218","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13681","6.168227","172.30.1.205","172.30.1.104","TCP","54","35018 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13682","6.169184","172.30.1.205","172.30.1.104","TCP","74","42384 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909395 TSecr=0 WS=128" "13683","6.169483","172.30.1.104","172.30.1.205","TCP","66","135 > 42384 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13684","6.169494","172.30.1.205","172.30.1.104","TCP","54","42384 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13685","6.169842","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13686","6.170139","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13687","6.170147","172.30.1.205","172.30.1.104","TCP","54","42384 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13688","6.172336","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13689","6.172732","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13690","6.172738","172.30.1.205","172.30.1.104","TCP","54","42384 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13691","6.174564","172.30.1.205","172.30.1.104","TCP","54","42384 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13692","6.174681","172.30.1.205","172.30.1.104","TCP","74","35022 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909401 TSecr=0 WS=128" "13693","6.174823","172.30.1.104","172.30.1.205","TCP","54","135 > 42384 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13694","6.174902","172.30.1.104","172.30.1.205","TCP","54","135 > 42384 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13695","6.174912","172.30.1.205","172.30.1.104","TCP","54","42384 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13696","6.174992","172.30.1.104","172.30.1.205","TCP","66","49671 > 35022 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13697","6.175000","172.30.1.205","172.30.1.104","TCP","54","35022 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13698","6.175348","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13699","6.175631","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13700","6.175640","172.30.1.205","172.30.1.104","TCP","54","35022 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13701","6.177565","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13702","6.177906","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13703","6.177912","172.30.1.205","172.30.1.104","TCP","54","35022 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13704","6.179263","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13705","6.180784","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13706","6.180793","172.30.1.205","172.30.1.104","TCP","54","35022 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13707","6.181732","172.30.1.205","172.30.1.104","TCP","74","42388 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909408 TSecr=0 WS=128" "13708","6.182032","172.30.1.104","172.30.1.205","TCP","66","135 > 42388 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13709","6.182043","172.30.1.205","172.30.1.104","TCP","54","42388 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13710","6.182393","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13711","6.182680","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13712","6.182689","172.30.1.205","172.30.1.104","TCP","54","42388 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13713","6.184904","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13714","6.185290","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13715","6.185297","172.30.1.205","172.30.1.104","TCP","54","42388 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13716","6.187115","172.30.1.205","172.30.1.104","TCP","54","42388 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13717","6.187225","172.30.1.205","172.30.1.104","TCP","74","35026 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909413 TSecr=0 WS=128" "13718","6.187379","172.30.1.104","172.30.1.205","TCP","54","135 > 42388 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13719","6.187398","172.30.1.104","172.30.1.205","TCP","54","135 > 42388 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13720","6.187403","172.30.1.205","172.30.1.104","TCP","54","42388 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13721","6.187509","172.30.1.104","172.30.1.205","TCP","66","49671 > 35026 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13722","6.187517","172.30.1.205","172.30.1.104","TCP","54","35026 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13723","6.187865","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13724","6.188157","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13725","6.188166","172.30.1.205","172.30.1.104","TCP","54","35026 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13726","6.190101","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13727","6.190489","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13728","6.190495","172.30.1.205","172.30.1.104","TCP","54","35026 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13729","6.191895","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13730","6.193428","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13731","6.193447","172.30.1.205","172.30.1.104","TCP","54","35026 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13732","6.194615","172.30.1.205","172.30.1.104","TCP","74","42392 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909421 TSecr=0 WS=128" "13733","6.195022","172.30.1.104","172.30.1.205","TCP","66","135 > 42392 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13734","6.195033","172.30.1.205","172.30.1.104","TCP","54","42392 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13735","6.195385","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13736","6.195685","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13737","6.195695","172.30.1.205","172.30.1.104","TCP","54","42392 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13738","6.197905","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13739","6.198333","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13740","6.198340","172.30.1.205","172.30.1.104","TCP","54","42392 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13741","6.200180","172.30.1.205","172.30.1.104","TCP","54","42392 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13742","6.200290","172.30.1.205","172.30.1.104","TCP","74","35030 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909426 TSecr=0 WS=128" "13743","6.200446","172.30.1.104","172.30.1.205","TCP","54","135 > 42392 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13744","6.200518","172.30.1.104","172.30.1.205","TCP","54","135 > 42392 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13745","6.200523","172.30.1.205","172.30.1.104","TCP","54","42392 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13746","6.200605","172.30.1.104","172.30.1.205","TCP","66","49671 > 35030 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13747","6.200614","172.30.1.205","172.30.1.104","TCP","54","35030 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13748","6.200991","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13749","6.202471","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13750","6.202478","172.30.1.205","172.30.1.104","TCP","54","35030 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13751","6.204338","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13752","6.204754","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13753","6.204761","172.30.1.205","172.30.1.104","TCP","54","35030 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13754","6.206130","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13755","6.207697","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13756","6.207715","172.30.1.205","172.30.1.104","TCP","54","35030 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13757","6.208884","172.30.1.205","172.30.1.104","TCP","74","42396 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909435 TSecr=0 WS=128" "13758","6.209186","172.30.1.104","172.30.1.205","TCP","66","135 > 42396 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13759","6.209196","172.30.1.205","172.30.1.104","TCP","54","42396 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13760","6.209551","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13761","6.209891","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13762","6.209900","172.30.1.205","172.30.1.104","TCP","54","42396 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13763","6.212125","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13764","6.212555","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13765","6.212567","172.30.1.205","172.30.1.104","TCP","54","42396 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13766","6.214549","172.30.1.205","172.30.1.104","TCP","54","42396 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13767","6.214664","172.30.1.205","172.30.1.104","TCP","74","35034 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909441 TSecr=0 WS=128" "13768","6.214818","172.30.1.104","172.30.1.205","TCP","54","135 > 42396 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13769","6.214849","172.30.1.104","172.30.1.205","TCP","54","135 > 42396 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13770","6.214854","172.30.1.205","172.30.1.104","TCP","54","42396 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13771","6.215002","172.30.1.104","172.30.1.205","TCP","66","49671 > 35034 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13772","6.215010","172.30.1.205","172.30.1.104","TCP","54","35034 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13773","6.215354","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13774","6.215706","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13775","6.215715","172.30.1.205","172.30.1.104","TCP","54","35034 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13776","6.217640","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13777","6.218002","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13778","6.218008","172.30.1.205","172.30.1.104","TCP","54","35034 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13779","6.219370","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13780","6.221198","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13781","6.221207","172.30.1.205","172.30.1.104","TCP","54","35034 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13782","6.222148","172.30.1.205","172.30.1.104","TCP","74","42400 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909448 TSecr=0 WS=128" "13783","6.222446","172.30.1.104","172.30.1.205","TCP","66","135 > 42400 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13784","6.222456","172.30.1.205","172.30.1.104","TCP","54","42400 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13785","6.222807","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13786","6.223152","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13787","6.223162","172.30.1.205","172.30.1.104","TCP","54","42400 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13788","6.225384","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13789","6.225754","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13790","6.225761","172.30.1.205","172.30.1.104","TCP","54","42400 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13791","6.227578","172.30.1.205","172.30.1.104","TCP","54","42400 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13792","6.227689","172.30.1.205","172.30.1.104","TCP","74","35038 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909454 TSecr=0 WS=128" "13793","6.227903","172.30.1.104","172.30.1.205","TCP","54","135 > 42400 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13794","6.227922","172.30.1.104","172.30.1.205","TCP","54","135 > 42400 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13795","6.227932","172.30.1.205","172.30.1.104","TCP","54","42400 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13796","6.228053","172.30.1.104","172.30.1.205","TCP","66","49671 > 35038 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13797","6.228069","172.30.1.205","172.30.1.104","TCP","54","35038 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13798","6.228553","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13799","6.228888","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13800","6.228897","172.30.1.205","172.30.1.104","TCP","54","35038 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13801","6.230779","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13802","6.231205","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13803","6.231211","172.30.1.205","172.30.1.104","TCP","54","35038 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13804","6.232613","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13805","6.234206","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13806","6.234216","172.30.1.205","172.30.1.104","TCP","54","35038 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13807","6.235160","172.30.1.205","172.30.1.104","TCP","74","42404 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909461 TSecr=0 WS=128" "13808","6.235467","172.30.1.104","172.30.1.205","TCP","66","135 > 42404 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13809","6.235479","172.30.1.205","172.30.1.104","TCP","54","42404 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13810","6.235828","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13811","6.236175","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13812","6.236184","172.30.1.205","172.30.1.104","TCP","54","42404 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13813","6.238449","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13814","6.238879","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13815","6.238886","172.30.1.205","172.30.1.104","TCP","54","42404 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13816","6.240813","172.30.1.205","172.30.1.104","TCP","54","42404 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13817","6.240920","172.30.1.205","172.30.1.104","TCP","74","35042 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909467 TSecr=0 WS=128" "13818","6.241098","172.30.1.104","172.30.1.205","TCP","54","135 > 42404 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13819","6.241128","172.30.1.104","172.30.1.205","TCP","54","135 > 42404 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13820","6.241133","172.30.1.205","172.30.1.104","TCP","54","42404 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13821","6.241231","172.30.1.104","172.30.1.205","TCP","66","49671 > 35042 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13822","6.241239","172.30.1.205","172.30.1.104","TCP","54","35042 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13823","6.241594","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13824","6.242011","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13825","6.242020","172.30.1.205","172.30.1.104","TCP","54","35042 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13826","6.243904","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13827","6.244297","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13828","6.244304","172.30.1.205","172.30.1.104","TCP","54","35042 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13829","6.245768","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13830","6.248444","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13831","6.248454","172.30.1.205","172.30.1.104","TCP","54","35042 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13832","6.249459","172.30.1.205","172.30.1.104","TCP","74","42408 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909475 TSecr=0 WS=128" "13833","6.249780","172.30.1.104","172.30.1.205","TCP","66","135 > 42408 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13834","6.249790","172.30.1.205","172.30.1.104","TCP","54","42408 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13835","6.250139","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13836","6.250469","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13837","6.250477","172.30.1.205","172.30.1.104","TCP","54","42408 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13838","6.252686","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13839","6.253102","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13840","6.253109","172.30.1.205","172.30.1.104","TCP","54","42408 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13841","6.254929","172.30.1.205","172.30.1.104","TCP","54","42408 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13842","6.255041","172.30.1.205","172.30.1.104","TCP","74","35046 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909481 TSecr=0 WS=128" "13843","6.255266","172.30.1.104","172.30.1.205","TCP","54","135 > 42408 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13844","6.255285","172.30.1.104","172.30.1.205","TCP","54","135 > 42408 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13845","6.255289","172.30.1.205","172.30.1.104","TCP","54","42408 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13846","6.255390","172.30.1.104","172.30.1.205","TCP","66","49671 > 35046 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13847","6.255398","172.30.1.205","172.30.1.104","TCP","54","35046 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13848","6.255751","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13849","6.256103","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13850","6.256111","172.30.1.205","172.30.1.104","TCP","54","35046 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13851","6.258055","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13852","6.258546","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13853","6.258559","172.30.1.205","172.30.1.104","TCP","54","35046 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13854","6.260120","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13855","6.261765","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13856","6.261774","172.30.1.205","172.30.1.104","TCP","54","35046 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13857","6.262717","172.30.1.205","172.30.1.104","TCP","74","42412 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909489 TSecr=0 WS=128" "13858","6.263043","172.30.1.104","172.30.1.205","TCP","66","135 > 42412 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13859","6.263064","172.30.1.205","172.30.1.104","TCP","54","42412 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13860","6.263568","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13861","6.263900","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13862","6.263909","172.30.1.205","172.30.1.104","TCP","54","42412 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13863","6.266124","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13864","6.266607","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13865","6.266620","172.30.1.205","172.30.1.104","TCP","54","42412 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13866","6.268632","172.30.1.205","172.30.1.104","TCP","54","42412 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13867","6.268743","172.30.1.205","172.30.1.104","TCP","74","35050 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909495 TSecr=0 WS=128" "13868","6.268933","172.30.1.104","172.30.1.205","TCP","54","135 > 42412 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13869","6.268963","172.30.1.104","172.30.1.205","TCP","54","135 > 42412 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13870","6.268968","172.30.1.205","172.30.1.104","TCP","54","42412 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13871","6.269070","172.30.1.104","172.30.1.205","TCP","66","49671 > 35050 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13872","6.269078","172.30.1.205","172.30.1.104","TCP","54","35050 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13873","6.269430","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13874","6.269757","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13875","6.269766","172.30.1.205","172.30.1.104","TCP","54","35050 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13876","6.271687","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13877","6.272085","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13878","6.272091","172.30.1.205","172.30.1.104","TCP","54","35050 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13879","6.273475","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13880","6.275051","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13881","6.275060","172.30.1.205","172.30.1.104","TCP","54","35050 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13882","6.276016","172.30.1.205","172.30.1.104","TCP","74","42416 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909502 TSecr=0 WS=128" "13883","6.276326","172.30.1.104","172.30.1.205","TCP","66","135 > 42416 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13884","6.276337","172.30.1.205","172.30.1.104","TCP","54","42416 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13885","6.276691","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13886","6.276998","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13887","6.277007","172.30.1.205","172.30.1.104","TCP","54","42416 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13888","6.279235","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13889","6.279634","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13890","6.279641","172.30.1.205","172.30.1.104","TCP","54","42416 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13891","6.281469","172.30.1.205","172.30.1.104","TCP","54","42416 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13892","6.281580","172.30.1.205","172.30.1.104","TCP","74","35054 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909508 TSecr=0 WS=128" "13893","6.281725","172.30.1.104","172.30.1.205","TCP","54","135 > 42416 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13894","6.281739","172.30.1.104","172.30.1.205","TCP","54","135 > 42416 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13895","6.281744","172.30.1.205","172.30.1.104","TCP","54","42416 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13896","6.281843","172.30.1.104","172.30.1.205","TCP","66","49671 > 35054 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13897","6.281851","172.30.1.205","172.30.1.104","TCP","54","35054 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13898","6.282199","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13899","6.282463","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13900","6.282472","172.30.1.205","172.30.1.104","TCP","54","35054 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13901","6.284364","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13902","6.284733","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13903","6.284740","172.30.1.205","172.30.1.104","TCP","54","35054 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13904","6.286134","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13905","6.287647","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13906","6.287657","172.30.1.205","172.30.1.104","TCP","54","35054 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13907","6.288584","172.30.1.205","172.30.1.104","TCP","74","42420 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909515 TSecr=0 WS=128" "13908","6.288878","172.30.1.104","172.30.1.205","TCP","66","135 > 42420 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13909","6.288889","172.30.1.205","172.30.1.104","TCP","54","42420 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13910","6.289250","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13911","6.289509","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13912","6.289518","172.30.1.205","172.30.1.104","TCP","54","42420 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13913","6.291696","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13914","6.292052","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13915","6.292058","172.30.1.205","172.30.1.104","TCP","54","42420 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13916","6.293891","172.30.1.205","172.30.1.104","TCP","54","42420 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13917","6.294002","172.30.1.205","172.30.1.104","TCP","74","35058 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909520 TSecr=0 WS=128" "13918","6.294162","172.30.1.104","172.30.1.205","TCP","54","135 > 42420 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13919","6.294172","172.30.1.104","172.30.1.205","TCP","54","135 > 42420 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13920","6.294177","172.30.1.205","172.30.1.104","TCP","54","42420 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13921","6.294277","172.30.1.104","172.30.1.205","TCP","66","49671 > 35058 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13922","6.294286","172.30.1.205","172.30.1.104","TCP","54","35058 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13923","6.294636","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13924","6.294963","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13925","6.294972","172.30.1.205","172.30.1.104","TCP","54","35058 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13926","6.296864","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "13927","6.297271","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "13928","6.297283","172.30.1.205","172.30.1.104","TCP","54","35058 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "13929","6.298866","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "13930","6.300491","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "13931","6.300500","172.30.1.205","172.30.1.104","TCP","54","35058 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "13932","6.301458","172.30.1.205","172.30.1.104","TCP","74","42424 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909527 TSecr=0 WS=128" "13933","6.301749","172.30.1.104","172.30.1.205","TCP","66","135 > 42424 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13934","6.301759","172.30.1.205","172.30.1.104","TCP","54","42424 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13935","6.302106","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "13936","6.302408","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13937","6.302416","172.30.1.205","172.30.1.104","TCP","54","42424 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13938","6.304582","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "13939","6.304957","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "13940","6.304964","172.30.1.205","172.30.1.104","TCP","54","42424 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "13941","6.305811","172.30.1.205","172.30.1.104","TCP","54","35018 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13942","6.305861","172.30.1.205","172.30.1.104","TCP","54","35022 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13943","6.305899","172.30.1.205","172.30.1.104","TCP","54","35026 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13944","6.305933","172.30.1.205","172.30.1.104","TCP","54","35030 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13945","6.305961","172.30.1.205","172.30.1.104","TCP","54","35034 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13946","6.305984","172.30.1.205","172.30.1.104","TCP","54","35038 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13947","6.306012","172.30.1.205","172.30.1.104","TCP","54","35042 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13948","6.306034","172.30.1.205","172.30.1.104","TCP","54","35046 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13949","6.306058","172.30.1.104","172.30.1.205","TCP","54","49671 > 35018 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13950","6.306075","172.30.1.205","172.30.1.104","TCP","54","35050 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13951","6.306107","172.30.1.205","172.30.1.104","TCP","54","35054 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13952","6.306134","172.30.1.205","172.30.1.104","TCP","54","35058 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13953","6.306164","172.30.1.104","172.30.1.205","TCP","54","49671 > 35022 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13954","6.306183","172.30.1.104","172.30.1.205","TCP","54","49671 > 35026 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13955","6.306203","172.30.1.104","172.30.1.205","TCP","54","49671 > 35030 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13956","6.306223","172.30.1.104","172.30.1.205","TCP","54","49671 > 35034 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13957","6.306242","172.30.1.205","172.30.1.104","TCP","54","35014 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "13958","6.306335","172.30.1.104","172.30.1.205","TCP","54","49671 > 35034 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13959","6.306342","172.30.1.205","172.30.1.104","TCP","54","35034 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13960","6.306353","172.30.1.104","172.30.1.205","TCP","54","49671 > 35038 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13961","6.306372","172.30.1.104","172.30.1.205","TCP","54","49671 > 35042 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13962","6.306392","172.30.1.104","172.30.1.205","TCP","54","49671 > 35030 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13963","6.306396","172.30.1.205","172.30.1.104","TCP","54","35030 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13964","6.306412","172.30.1.104","172.30.1.205","TCP","54","49671 > 35046 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13965","6.306432","172.30.1.104","172.30.1.205","TCP","54","49671 > 35018 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13966","6.306436","172.30.1.205","172.30.1.104","TCP","54","35018 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13967","6.306453","172.30.1.104","172.30.1.205","TCP","54","49671 > 35046 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13968","6.306456","172.30.1.205","172.30.1.104","TCP","54","35046 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13969","6.306562","172.30.1.104","172.30.1.205","TCP","54","49671 > 35042 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13970","6.306567","172.30.1.205","172.30.1.104","TCP","54","35042 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13971","6.306580","172.30.1.104","172.30.1.205","TCP","54","49671 > 35038 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13972","6.306582","172.30.1.205","172.30.1.104","TCP","54","35038 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13973","6.306600","172.30.1.104","172.30.1.205","TCP","54","49671 > 35022 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13974","6.306603","172.30.1.205","172.30.1.104","TCP","54","35022 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13975","6.306621","172.30.1.104","172.30.1.205","TCP","54","49671 > 35026 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13976","6.306624","172.30.1.205","172.30.1.104","TCP","54","35026 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13977","6.306644","172.30.1.104","172.30.1.205","TCP","54","49671 > 35050 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13978","6.306665","172.30.1.104","172.30.1.205","TCP","54","49671 > 35054 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13979","6.306799","172.30.1.104","172.30.1.205","TCP","54","49671 > 35050 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13980","6.306804","172.30.1.205","172.30.1.104","TCP","54","35050 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13981","6.306820","172.30.1.104","172.30.1.205","TCP","54","49671 > 35058 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13982","6.306843","172.30.1.104","172.30.1.205","TCP","54","49671 > 35054 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13983","6.306846","172.30.1.205","172.30.1.104","TCP","54","35054 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13984","6.306863","172.30.1.104","172.30.1.205","TCP","54","49671 > 35058 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13985","6.306865","172.30.1.205","172.30.1.104","TCP","54","35058 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13986","6.306884","172.30.1.104","172.30.1.205","TCP","54","49671 > 35014 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13987","6.307174","172.30.1.104","172.30.1.205","TCP","54","49671 > 35014 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "13988","6.307178","172.30.1.205","172.30.1.104","TCP","54","35014 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "13989","6.307759","172.30.1.205","172.30.1.104","TCP","54","42424 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "13990","6.307870","172.30.1.205","172.30.1.104","TCP","74","35062 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909534 TSecr=0 WS=128" "13991","6.308010","172.30.1.104","172.30.1.205","TCP","54","135 > 42424 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13992","6.308040","172.30.1.104","172.30.1.205","TCP","54","135 > 42424 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "13993","6.308045","172.30.1.205","172.30.1.104","TCP","54","42424 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "13994","6.308124","172.30.1.104","172.30.1.205","TCP","66","49671 > 35062 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "13995","6.308132","172.30.1.205","172.30.1.104","TCP","54","35062 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "13996","6.308497","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "13997","6.308791","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "13998","6.308801","172.30.1.205","172.30.1.104","TCP","54","35062 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "13999","6.310686","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14000","6.311115","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14001","6.311121","172.30.1.205","172.30.1.104","TCP","54","35062 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14002","6.312479","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14003","6.314155","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14004","6.314166","172.30.1.205","172.30.1.104","TCP","54","35062 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14005","6.315115","172.30.1.205","172.30.1.104","TCP","74","42428 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909541 TSecr=0 WS=128" "14006","6.315417","172.30.1.104","172.30.1.205","TCP","66","135 > 42428 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14007","6.315428","172.30.1.205","172.30.1.104","TCP","54","42428 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14008","6.315775","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14009","6.316050","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14010","6.316058","172.30.1.205","172.30.1.104","TCP","54","42428 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14011","6.318264","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14012","6.318696","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14013","6.318702","172.30.1.205","172.30.1.104","TCP","54","42428 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14014","6.320507","172.30.1.205","172.30.1.104","TCP","54","42428 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14015","6.320618","172.30.1.205","172.30.1.104","TCP","74","35066 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909547 TSecr=0 WS=128" "14016","6.320841","172.30.1.104","172.30.1.205","TCP","54","135 > 42428 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14017","6.320883","172.30.1.104","172.30.1.205","TCP","54","135 > 42428 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14018","6.320889","172.30.1.205","172.30.1.104","TCP","54","42428 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14019","6.320985","172.30.1.104","172.30.1.205","TCP","66","49671 > 35066 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14020","6.321001","172.30.1.205","172.30.1.104","TCP","54","35066 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14021","6.321402","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14022","6.321681","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14023","6.321690","172.30.1.205","172.30.1.104","TCP","54","35066 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14024","6.323587","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14025","6.323929","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14026","6.323936","172.30.1.205","172.30.1.104","TCP","54","35066 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14027","6.325319","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14028","6.326874","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14029","6.326885","172.30.1.205","172.30.1.104","TCP","54","35066 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14030","6.327819","172.30.1.205","172.30.1.104","TCP","74","42432 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909554 TSecr=0 WS=128" "14031","6.328118","172.30.1.104","172.30.1.205","TCP","66","135 > 42432 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14032","6.328129","172.30.1.205","172.30.1.104","TCP","54","42432 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14033","6.328498","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14034","6.328765","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14035","6.328784","172.30.1.205","172.30.1.104","TCP","54","42432 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14036","6.330980","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14037","6.331334","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14038","6.331341","172.30.1.205","172.30.1.104","TCP","54","42432 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14039","6.333166","172.30.1.205","172.30.1.104","TCP","54","42432 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14040","6.333281","172.30.1.205","172.30.1.104","TCP","74","35070 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909559 TSecr=0 WS=128" "14041","6.333381","172.30.1.104","172.30.1.205","TCP","54","135 > 42432 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14042","6.333417","172.30.1.104","172.30.1.205","TCP","54","135 > 42432 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14043","6.333423","172.30.1.205","172.30.1.104","TCP","54","42432 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14044","6.333536","172.30.1.104","172.30.1.205","TCP","66","49671 > 35070 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14045","6.333544","172.30.1.205","172.30.1.104","TCP","54","35070 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14046","6.333887","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14047","6.334136","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14048","6.334145","172.30.1.205","172.30.1.104","TCP","54","35070 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14049","6.336023","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14050","6.336401","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14051","6.336407","172.30.1.205","172.30.1.104","TCP","54","35070 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14052","6.337775","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14053","6.339222","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14054","6.339231","172.30.1.205","172.30.1.104","TCP","54","35070 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14055","6.340158","172.30.1.205","172.30.1.104","TCP","74","42436 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909566 TSecr=0 WS=128" "14056","6.340490","172.30.1.104","172.30.1.205","TCP","66","135 > 42436 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14057","6.340511","172.30.1.205","172.30.1.104","TCP","54","42436 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14058","6.341122","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14059","6.341448","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14060","6.341457","172.30.1.205","172.30.1.104","TCP","54","42436 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14061","6.343645","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14062","6.344007","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14063","6.344013","172.30.1.205","172.30.1.104","TCP","54","42436 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14064","6.345864","172.30.1.205","172.30.1.104","TCP","54","42436 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14065","6.345981","172.30.1.205","172.30.1.104","TCP","74","35074 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909572 TSecr=0 WS=128" "14066","6.346177","172.30.1.104","172.30.1.205","TCP","54","135 > 42436 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14067","6.346186","172.30.1.104","172.30.1.205","TCP","54","135 > 42436 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14068","6.346191","172.30.1.205","172.30.1.104","TCP","54","42436 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14069","6.346288","172.30.1.104","172.30.1.205","TCP","66","49671 > 35074 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14070","6.346296","172.30.1.205","172.30.1.104","TCP","54","35074 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14071","6.346644","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14072","6.346927","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14073","6.346935","172.30.1.205","172.30.1.104","TCP","54","35074 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14074","6.348839","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14075","6.349210","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14076","6.349216","172.30.1.205","172.30.1.104","TCP","54","35074 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14077","6.350559","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14078","6.352069","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14079","6.352078","172.30.1.205","172.30.1.104","TCP","54","35074 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14080","6.353019","172.30.1.205","172.30.1.104","TCP","74","42440 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909579 TSecr=0 WS=128" "14081","6.353351","172.30.1.104","172.30.1.205","TCP","66","135 > 42440 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14082","6.353362","172.30.1.205","172.30.1.104","TCP","54","42440 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14083","6.353707","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14084","6.353997","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14085","6.354006","172.30.1.205","172.30.1.104","TCP","54","42440 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14086","6.356179","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14087","6.356587","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14088","6.356593","172.30.1.205","172.30.1.104","TCP","54","42440 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14089","6.358409","172.30.1.205","172.30.1.104","TCP","54","42440 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14090","6.358518","172.30.1.205","172.30.1.104","TCP","74","35078 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909584 TSecr=0 WS=128" "14091","6.358696","172.30.1.104","172.30.1.205","TCP","54","135 > 42440 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14092","6.358729","172.30.1.104","172.30.1.205","TCP","54","135 > 42440 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14093","6.358735","172.30.1.205","172.30.1.104","TCP","54","42440 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14094","6.358807","172.30.1.104","172.30.1.205","TCP","66","49671 > 35078 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14095","6.358815","172.30.1.205","172.30.1.104","TCP","54","35078 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14096","6.359174","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14097","6.359480","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14098","6.359488","172.30.1.205","172.30.1.104","TCP","54","35078 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14099","6.361368","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14100","6.361770","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14101","6.361776","172.30.1.205","172.30.1.104","TCP","54","35078 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14102","6.363113","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14103","6.364638","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14104","6.364647","172.30.1.205","172.30.1.104","TCP","54","35078 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14105","6.365607","172.30.1.205","172.30.1.104","TCP","74","42444 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909592 TSecr=0 WS=128" "14106","6.365893","172.30.1.104","172.30.1.205","TCP","66","135 > 42444 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14107","6.365903","172.30.1.205","172.30.1.104","TCP","54","42444 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14108","6.366249","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14109","6.366525","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14110","6.366533","172.30.1.205","172.30.1.104","TCP","54","42444 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14111","6.368700","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14112","6.369111","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14113","6.369118","172.30.1.205","172.30.1.104","TCP","54","42444 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14114","6.370920","172.30.1.205","172.30.1.104","TCP","54","42444 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14115","6.371028","172.30.1.205","172.30.1.104","TCP","74","35082 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909597 TSecr=0 WS=128" "14116","6.371217","172.30.1.104","172.30.1.205","TCP","54","135 > 42444 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14117","6.371249","172.30.1.104","172.30.1.205","TCP","54","135 > 42444 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14118","6.371255","172.30.1.205","172.30.1.104","TCP","54","42444 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14119","6.371327","172.30.1.104","172.30.1.205","TCP","66","49671 > 35082 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14120","6.371336","172.30.1.205","172.30.1.104","TCP","54","35082 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14121","6.371679","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14122","6.372008","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14123","6.372017","172.30.1.205","172.30.1.104","TCP","54","35082 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14124","6.373932","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14125","6.374289","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14126","6.374295","172.30.1.205","172.30.1.104","TCP","54","35082 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14127","6.375655","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14128","6.377342","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14129","6.377351","172.30.1.205","172.30.1.104","TCP","54","35082 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14130","6.378280","172.30.1.205","172.30.1.104","TCP","74","42448 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909604 TSecr=0 WS=128" "14131","6.378589","172.30.1.104","172.30.1.205","TCP","66","135 > 42448 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14132","6.378600","172.30.1.205","172.30.1.104","TCP","54","42448 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14133","6.378941","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14134","6.379258","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14135","6.379267","172.30.1.205","172.30.1.104","TCP","54","42448 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14136","6.381473","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14137","6.381879","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14138","6.381885","172.30.1.205","172.30.1.104","TCP","54","42448 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14139","6.383680","172.30.1.205","172.30.1.104","TCP","54","42448 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14140","6.383791","172.30.1.205","172.30.1.104","TCP","74","35086 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909610 TSecr=0 WS=128" "14141","6.383945","172.30.1.104","172.30.1.205","TCP","54","135 > 42448 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14142","6.383965","172.30.1.104","172.30.1.205","TCP","54","135 > 42448 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14143","6.383971","172.30.1.205","172.30.1.104","TCP","54","42448 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14144","6.384443","172.30.1.104","172.30.1.205","TCP","66","49671 > 35086 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14145","6.384451","172.30.1.205","172.30.1.104","TCP","54","35086 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14146","6.384824","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14147","6.385145","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14148","6.385154","172.30.1.205","172.30.1.104","TCP","54","35086 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14149","6.387001","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14150","6.387946","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14151","6.387952","172.30.1.205","172.30.1.104","TCP","54","35086 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14152","6.389323","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14153","6.390937","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14154","6.390946","172.30.1.205","172.30.1.104","TCP","54","35086 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14155","6.391888","172.30.1.205","172.30.1.104","TCP","74","42452 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909618 TSecr=0 WS=128" "14156","6.392178","172.30.1.104","172.30.1.205","TCP","66","135 > 42452 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14157","6.392188","172.30.1.205","172.30.1.104","TCP","54","42452 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14158","6.392534","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14159","6.392848","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14160","6.392857","172.30.1.205","172.30.1.104","TCP","54","42452 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14161","6.395042","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14162","6.395468","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14163","6.395478","172.30.1.205","172.30.1.104","TCP","54","42452 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14164","6.397418","172.30.1.205","172.30.1.104","TCP","54","42452 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14165","6.397546","172.30.1.205","172.30.1.104","TCP","74","35090 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909623 TSecr=0 WS=128" "14166","6.397682","172.30.1.104","172.30.1.205","TCP","54","135 > 42452 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14167","6.397694","172.30.1.104","172.30.1.205","TCP","54","135 > 42452 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14168","6.397701","172.30.1.205","172.30.1.104","TCP","54","42452 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14169","6.397834","172.30.1.104","172.30.1.205","TCP","66","49671 > 35090 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14170","6.397843","172.30.1.205","172.30.1.104","TCP","54","35090 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14171","6.398193","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14172","6.398461","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14173","6.398468","172.30.1.205","172.30.1.104","TCP","54","35090 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14174","6.400326","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14175","6.400684","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14176","6.400691","172.30.1.205","172.30.1.104","TCP","54","35090 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14177","6.402084","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14178","6.403638","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14179","6.403647","172.30.1.205","172.30.1.104","TCP","54","35090 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14180","6.404585","172.30.1.205","172.30.1.104","TCP","74","42456 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909631 TSecr=0 WS=128" "14181","6.404893","172.30.1.104","172.30.1.205","TCP","66","135 > 42456 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14182","6.404904","172.30.1.205","172.30.1.104","TCP","54","42456 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14183","6.405261","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14184","6.405542","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14185","6.405551","172.30.1.205","172.30.1.104","TCP","54","42456 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14186","6.407712","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14187","6.408121","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14188","6.408128","172.30.1.205","172.30.1.104","TCP","54","42456 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14189","6.409952","172.30.1.205","172.30.1.104","TCP","54","42456 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14190","6.410062","172.30.1.205","172.30.1.104","TCP","74","35094 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909636 TSecr=0 WS=128" "14191","6.410291","172.30.1.104","172.30.1.205","TCP","54","135 > 42456 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14192","6.410346","172.30.1.104","172.30.1.205","TCP","66","49671 > 35094 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14193","6.410356","172.30.1.205","172.30.1.104","TCP","54","35094 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14194","6.410390","172.30.1.104","172.30.1.205","TCP","54","135 > 42456 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14195","6.410396","172.30.1.205","172.30.1.104","TCP","54","42456 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14196","6.410722","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14197","6.411020","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14198","6.411029","172.30.1.205","172.30.1.104","TCP","54","35094 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14199","6.412914","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14200","6.413285","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14201","6.413292","172.30.1.205","172.30.1.104","TCP","54","35094 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14202","6.414624","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14203","6.416180","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14204","6.416189","172.30.1.205","172.30.1.104","TCP","54","35094 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14205","6.417139","172.30.1.205","172.30.1.104","TCP","74","42460 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909643 TSecr=0 WS=128" "14206","6.417442","172.30.1.104","172.30.1.205","TCP","66","135 > 42460 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14207","6.417452","172.30.1.205","172.30.1.104","TCP","54","42460 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14208","6.417798","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14209","6.418106","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14210","6.418116","172.30.1.205","172.30.1.104","TCP","54","42460 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14211","6.420292","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14212","6.420656","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14213","6.420662","172.30.1.205","172.30.1.104","TCP","54","42460 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14214","6.422473","172.30.1.205","172.30.1.104","TCP","54","42460 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14215","6.422585","172.30.1.205","172.30.1.104","TCP","74","35098 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909649 TSecr=0 WS=128" "14216","6.422872","172.30.1.104","172.30.1.205","TCP","54","135 > 42460 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14217","6.422881","172.30.1.104","172.30.1.205","TCP","54","135 > 42460 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14218","6.422886","172.30.1.205","172.30.1.104","TCP","54","42460 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14219","6.422894","172.30.1.104","172.30.1.205","TCP","66","49671 > 35098 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14220","6.422901","172.30.1.205","172.30.1.104","TCP","54","35098 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14221","6.423249","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14222","6.423537","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14223","6.423546","172.30.1.205","172.30.1.104","TCP","54","35098 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14224","6.425436","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14225","6.425805","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14226","6.425811","172.30.1.205","172.30.1.104","TCP","54","35098 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14227","6.427143","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14228","6.428723","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14229","6.428733","172.30.1.205","172.30.1.104","TCP","54","35098 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14230","6.429678","172.30.1.205","172.30.1.104","TCP","74","42464 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909656 TSecr=0 WS=128" "14231","6.430009","172.30.1.104","172.30.1.205","TCP","66","135 > 42464 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14232","6.430020","172.30.1.205","172.30.1.104","TCP","54","42464 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14233","6.430372","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14234","6.430653","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14235","6.430663","172.30.1.205","172.30.1.104","TCP","54","42464 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14236","6.432849","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14237","6.433211","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14238","6.433217","172.30.1.205","172.30.1.104","TCP","54","42464 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14239","6.435012","172.30.1.205","172.30.1.104","TCP","54","42464 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14240","6.435120","172.30.1.205","172.30.1.104","TCP","74","35102 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909661 TSecr=0 WS=128" "14241","6.435276","172.30.1.104","172.30.1.205","TCP","54","135 > 42464 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14242","6.435324","172.30.1.104","172.30.1.205","TCP","54","135 > 42464 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14243","6.435330","172.30.1.205","172.30.1.104","TCP","54","42464 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14244","6.435405","172.30.1.104","172.30.1.205","TCP","66","49671 > 35102 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14245","6.435413","172.30.1.205","172.30.1.104","TCP","54","35102 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14246","6.435774","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14247","6.436063","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14248","6.436072","172.30.1.205","172.30.1.104","TCP","54","35102 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14249","6.437959","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14250","6.438325","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14251","6.438331","172.30.1.205","172.30.1.104","TCP","54","35102 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14252","6.439666","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14253","6.441215","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14254","6.441225","172.30.1.205","172.30.1.104","TCP","54","35102 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14255","6.442181","172.30.1.205","172.30.1.104","TCP","74","42468 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909668 TSecr=0 WS=128" "14256","6.442470","172.30.1.104","172.30.1.205","TCP","66","135 > 42468 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14257","6.442481","172.30.1.205","172.30.1.104","TCP","54","42468 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14258","6.442825","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14259","6.443112","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14260","6.443121","172.30.1.205","172.30.1.104","TCP","54","42468 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14261","6.445324","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14262","6.445713","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14263","6.445719","172.30.1.205","172.30.1.104","TCP","54","42468 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14264","6.447508","172.30.1.205","172.30.1.104","TCP","54","42468 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14265","6.447618","172.30.1.205","172.30.1.104","TCP","74","35106 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909674 TSecr=0 WS=128" "14266","6.447766","172.30.1.104","172.30.1.205","TCP","54","135 > 42468 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14267","6.447777","172.30.1.104","172.30.1.205","TCP","54","135 > 42468 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14268","6.447783","172.30.1.205","172.30.1.104","TCP","54","42468 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14269","6.447861","172.30.1.104","172.30.1.205","TCP","66","49671 > 35106 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14270","6.447869","172.30.1.205","172.30.1.104","TCP","54","35106 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14271","6.448208","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14272","6.448545","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14273","6.448553","172.30.1.205","172.30.1.104","TCP","54","35106 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14274","6.450441","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14275","6.450782","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14276","6.450789","172.30.1.205","172.30.1.104","TCP","54","35106 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14277","6.452139","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14278","6.453674","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14279","6.453684","172.30.1.205","172.30.1.104","TCP","54","35106 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14280","6.454638","172.30.1.205","172.30.1.104","TCP","74","42472 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909681 TSecr=0 WS=128" "14281","6.454920","172.30.1.104","172.30.1.205","TCP","66","135 > 42472 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14282","6.454930","172.30.1.205","172.30.1.104","TCP","54","42472 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14283","6.455283","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14284","6.455550","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14285","6.455559","172.30.1.205","172.30.1.104","TCP","54","42472 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14286","6.457765","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14287","6.458158","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14288","6.458165","172.30.1.205","172.30.1.104","TCP","54","42472 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14289","6.459035","172.30.1.205","172.30.1.104","TCP","54","35066 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14290","6.459090","172.30.1.205","172.30.1.104","TCP","54","35070 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14291","6.459126","172.30.1.205","172.30.1.104","TCP","54","35074 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14292","6.459155","172.30.1.205","172.30.1.104","TCP","54","35078 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14293","6.459182","172.30.1.205","172.30.1.104","TCP","54","35082 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14294","6.459215","172.30.1.205","172.30.1.104","TCP","54","35086 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14295","6.459241","172.30.1.205","172.30.1.104","TCP","54","35090 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14296","6.459270","172.30.1.205","172.30.1.104","TCP","54","35094 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14297","6.459296","172.30.1.205","172.30.1.104","TCP","54","35098 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14298","6.459318","172.30.1.205","172.30.1.104","TCP","54","35102 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14299","6.459337","172.30.1.104","172.30.1.205","TCP","54","49671 > 35066 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14300","6.459354","172.30.1.104","172.30.1.205","TCP","54","49671 > 35070 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14301","6.459370","172.30.1.205","172.30.1.104","TCP","54","35106 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14302","6.459445","172.30.1.205","172.30.1.104","TCP","54","35062 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14303","6.459473","172.30.1.104","172.30.1.205","TCP","54","49671 > 35074 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14304","6.459511","172.30.1.104","172.30.1.205","TCP","54","49671 > 35078 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14305","6.459532","172.30.1.104","172.30.1.205","TCP","54","49671 > 35066 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14306","6.459539","172.30.1.205","172.30.1.104","TCP","54","35066 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "14307","6.459564","172.30.1.104","172.30.1.205","TCP","54","49671 > 35078 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14308","6.459567","172.30.1.205","172.30.1.104","TCP","54","35078 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "14309","6.459584","172.30.1.104","172.30.1.205","TCP","54","49671 > 35070 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14310","6.459587","172.30.1.205","172.30.1.104","TCP","54","35070 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "14311","6.459603","172.30.1.104","172.30.1.205","TCP","54","49671 > 35082 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14312","6.459622","172.30.1.104","172.30.1.205","TCP","54","49671 > 35086 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14313","6.459643","172.30.1.104","172.30.1.205","TCP","54","49671 > 35074 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14314","6.459649","172.30.1.205","172.30.1.104","TCP","54","35074 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "14315","6.459758","172.30.1.104","172.30.1.205","TCP","54","49671 > 35090 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14316","6.459776","172.30.1.104","172.30.1.205","TCP","54","49671 > 35094 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14317","6.459796","172.30.1.104","172.30.1.205","TCP","54","49671 > 35094 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14318","6.459801","172.30.1.205","172.30.1.104","TCP","54","35094 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "14319","6.459818","172.30.1.104","172.30.1.205","TCP","54","49671 > 35090 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14320","6.459821","172.30.1.205","172.30.1.104","TCP","54","35090 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "14321","6.459838","172.30.1.104","172.30.1.205","TCP","54","49671 > 35082 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14322","6.459841","172.30.1.205","172.30.1.104","TCP","54","35082 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "14323","6.459880","172.30.1.104","172.30.1.205","TCP","54","49671 > 35086 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14324","6.459887","172.30.1.205","172.30.1.104","TCP","54","35086 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "14325","6.460027","172.30.1.104","172.30.1.205","TCP","54","49671 > 35098 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14326","6.460051","172.30.1.104","172.30.1.205","TCP","54","49671 > 35102 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14327","6.460080","172.30.1.104","172.30.1.205","TCP","54","49671 > 35106 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14328","6.460107","172.30.1.104","172.30.1.205","TCP","54","49671 > 35098 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14329","6.460111","172.30.1.205","172.30.1.104","TCP","54","35098 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "14330","6.460128","172.30.1.104","172.30.1.205","TCP","54","49671 > 35102 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14331","6.460131","172.30.1.205","172.30.1.104","TCP","54","35102 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "14332","6.460149","172.30.1.104","172.30.1.205","TCP","54","49671 > 35106 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14333","6.460151","172.30.1.205","172.30.1.104","TCP","54","35106 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "14334","6.460169","172.30.1.104","172.30.1.205","TCP","54","49671 > 35062 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14335","6.460192","172.30.1.104","172.30.1.205","TCP","54","49671 > 35062 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14336","6.460195","172.30.1.205","172.30.1.104","TCP","54","35062 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "14337","6.461042","172.30.1.205","172.30.1.104","TCP","54","42472 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14338","6.461176","172.30.1.205","172.30.1.104","TCP","74","35110 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909687 TSecr=0 WS=128" "14339","6.461303","172.30.1.104","172.30.1.205","TCP","54","135 > 42472 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14340","6.461324","172.30.1.104","172.30.1.205","TCP","54","135 > 42472 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14341","6.461329","172.30.1.205","172.30.1.104","TCP","54","42472 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14342","6.461476","172.30.1.104","172.30.1.205","TCP","66","49671 > 35110 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14343","6.461484","172.30.1.205","172.30.1.104","TCP","54","35110 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14344","6.461837","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14345","6.462122","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14346","6.462131","172.30.1.205","172.30.1.104","TCP","54","35110 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14347","6.464017","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14348","6.464365","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14349","6.464372","172.30.1.205","172.30.1.104","TCP","54","35110 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14350","6.465757","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14351","6.467323","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14352","6.467333","172.30.1.205","172.30.1.104","TCP","54","35110 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14353","6.468292","172.30.1.205","172.30.1.104","TCP","74","42476 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909694 TSecr=0 WS=128" "14354","6.468610","172.30.1.104","172.30.1.205","TCP","66","135 > 42476 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14355","6.468620","172.30.1.205","172.30.1.104","TCP","54","42476 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14356","6.469006","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14357","6.469289","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14358","6.469300","172.30.1.205","172.30.1.104","TCP","54","42476 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14359","6.471484","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14360","6.471849","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14361","6.471856","172.30.1.205","172.30.1.104","TCP","54","42476 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14362","6.473709","172.30.1.205","172.30.1.104","TCP","54","42476 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14363","6.473824","172.30.1.205","172.30.1.104","TCP","74","35114 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909700 TSecr=0 WS=128" "14364","6.474067","172.30.1.104","172.30.1.205","TCP","54","135 > 42476 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14365","6.474134","172.30.1.104","172.30.1.205","TCP","54","135 > 42476 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14366","6.474140","172.30.1.205","172.30.1.104","TCP","54","42476 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14367","6.474232","172.30.1.104","172.30.1.205","TCP","66","49671 > 35114 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14368","6.474240","172.30.1.205","172.30.1.104","TCP","54","35114 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14369","6.474586","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14370","6.474872","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14371","6.474881","172.30.1.205","172.30.1.104","TCP","54","35114 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14372","6.476722","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14373","6.477095","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14374","6.477102","172.30.1.205","172.30.1.104","TCP","54","35114 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14375","6.478443","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14376","6.481817","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14377","6.481835","172.30.1.205","172.30.1.104","TCP","54","35114 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14378","6.482899","172.30.1.205","172.30.1.104","TCP","74","42480 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909709 TSecr=0 WS=128" "14379","6.483222","172.30.1.104","172.30.1.205","TCP","66","135 > 42480 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14380","6.483232","172.30.1.205","172.30.1.104","TCP","54","42480 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14381","6.483576","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14382","6.483868","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14383","6.483885","172.30.1.205","172.30.1.104","TCP","54","42480 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14384","6.486321","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14385","6.486691","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14386","6.486698","172.30.1.205","172.30.1.104","TCP","54","42480 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14387","6.488498","172.30.1.205","172.30.1.104","TCP","54","42480 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14388","6.488608","172.30.1.205","172.30.1.104","TCP","74","35118 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909715 TSecr=0 WS=128" "14389","6.488792","172.30.1.104","172.30.1.205","TCP","54","135 > 42480 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14390","6.488821","172.30.1.104","172.30.1.205","TCP","54","135 > 42480 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14391","6.488828","172.30.1.205","172.30.1.104","TCP","54","42480 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14392","6.488897","172.30.1.104","172.30.1.205","TCP","66","49671 > 35118 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14393","6.488904","172.30.1.205","172.30.1.104","TCP","54","35118 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14394","6.489260","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14395","6.489537","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14396","6.489547","172.30.1.205","172.30.1.104","TCP","54","35118 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14397","6.491432","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14398","6.491790","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14399","6.491796","172.30.1.205","172.30.1.104","TCP","54","35118 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14400","6.493175","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14401","6.496259","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14402","6.496277","172.30.1.205","172.30.1.104","TCP","54","35118 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14403","6.497284","172.30.1.205","172.30.1.104","TCP","74","42484 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909723 TSecr=0 WS=128" "14404","6.497581","172.30.1.104","172.30.1.205","TCP","66","135 > 42484 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14405","6.497591","172.30.1.205","172.30.1.104","TCP","54","42484 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14406","6.497941","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14407","6.498221","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14408","6.498233","172.30.1.205","172.30.1.104","TCP","54","42484 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14409","6.500415","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14410","6.500805","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14411","6.500812","172.30.1.205","172.30.1.104","TCP","54","42484 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14412","6.502628","172.30.1.205","172.30.1.104","TCP","54","42484 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14413","6.502738","172.30.1.205","172.30.1.104","TCP","74","35122 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909729 TSecr=0 WS=128" "14414","6.502961","172.30.1.104","172.30.1.205","TCP","54","135 > 42484 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14415","6.503085","172.30.1.104","172.30.1.205","TCP","66","49671 > 35122 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14416","6.503103","172.30.1.205","172.30.1.104","TCP","54","35122 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14417","6.503131","172.30.1.104","172.30.1.205","TCP","54","135 > 42484 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14418","6.503139","172.30.1.205","172.30.1.104","TCP","54","42484 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14419","6.503697","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14420","6.503960","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14421","6.503969","172.30.1.205","172.30.1.104","TCP","54","35122 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14422","6.505901","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14423","6.506276","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14424","6.506282","172.30.1.205","172.30.1.104","TCP","54","35122 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14425","6.507709","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14426","6.509295","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14427","6.509304","172.30.1.205","172.30.1.104","TCP","54","35122 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14428","6.510236","172.30.1.205","172.30.1.104","TCP","74","42488 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909736 TSecr=0 WS=128" "14429","6.510555","172.30.1.104","172.30.1.205","TCP","66","135 > 42488 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14430","6.510566","172.30.1.205","172.30.1.104","TCP","54","42488 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14431","6.510908","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14432","6.511192","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14433","6.511201","172.30.1.205","172.30.1.104","TCP","54","42488 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14434","6.513388","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14435","6.513755","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14436","6.513761","172.30.1.205","172.30.1.104","TCP","54","42488 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14437","6.515554","172.30.1.205","172.30.1.104","TCP","54","42488 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14438","6.515666","172.30.1.205","172.30.1.104","TCP","74","35126 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909742 TSecr=0 WS=128" "14439","6.515798","172.30.1.104","172.30.1.205","TCP","54","135 > 42488 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14440","6.515812","172.30.1.104","172.30.1.205","TCP","54","135 > 42488 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14441","6.515817","172.30.1.205","172.30.1.104","TCP","54","42488 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14442","6.515948","172.30.1.104","172.30.1.205","TCP","66","49671 > 35126 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14443","6.515956","172.30.1.205","172.30.1.104","TCP","54","35126 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14444","6.516297","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14445","6.516622","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14446","6.516639","172.30.1.205","172.30.1.104","TCP","54","35126 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14447","6.518741","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14448","6.519095","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14449","6.519101","172.30.1.205","172.30.1.104","TCP","54","35126 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14450","6.520437","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14451","6.522057","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14452","6.522067","172.30.1.205","172.30.1.104","TCP","54","35126 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14453","6.522997","172.30.1.205","172.30.1.104","TCP","74","42492 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909749 TSecr=0 WS=128" "14454","6.523326","172.30.1.104","172.30.1.205","TCP","66","135 > 42492 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14455","6.523336","172.30.1.205","172.30.1.104","TCP","54","42492 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14456","6.523681","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14457","6.523954","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14458","6.523969","172.30.1.205","172.30.1.104","TCP","54","42492 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14459","6.526279","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14460","6.526647","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14461","6.526655","172.30.1.205","172.30.1.104","TCP","54","42492 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14462","6.528492","172.30.1.205","172.30.1.104","TCP","54","42492 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14463","6.528608","172.30.1.205","172.30.1.104","TCP","74","35130 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909755 TSecr=0 WS=128" "14464","6.528743","172.30.1.104","172.30.1.205","TCP","54","135 > 42492 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14465","6.528755","172.30.1.104","172.30.1.205","TCP","54","135 > 42492 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14466","6.528761","172.30.1.205","172.30.1.104","TCP","54","42492 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14467","6.528861","172.30.1.104","172.30.1.205","TCP","66","49671 > 35130 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14468","6.528870","172.30.1.205","172.30.1.104","TCP","54","35130 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14469","6.529240","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14470","6.529516","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14471","6.529526","172.30.1.205","172.30.1.104","TCP","54","35130 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14472","6.531420","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14473","6.531789","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14474","6.531796","172.30.1.205","172.30.1.104","TCP","54","35130 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14475","6.533221","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14476","6.534788","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14477","6.534800","172.30.1.205","172.30.1.104","TCP","54","35130 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14478","6.535761","172.30.1.205","172.30.1.104","TCP","74","42496 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909762 TSecr=0 WS=128" "14479","6.536042","172.30.1.104","172.30.1.205","TCP","66","135 > 42496 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14480","6.536052","172.30.1.205","172.30.1.104","TCP","54","42496 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14481","6.536401","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14482","6.536684","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14483","6.536693","172.30.1.205","172.30.1.104","TCP","54","42496 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14484","6.538915","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14485","6.539318","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14486","6.539325","172.30.1.205","172.30.1.104","TCP","54","42496 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14487","6.541171","172.30.1.205","172.30.1.104","TCP","54","42496 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14488","6.541282","172.30.1.205","172.30.1.104","TCP","74","35134 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909767 TSecr=0 WS=128" "14489","6.541425","172.30.1.104","172.30.1.205","TCP","54","135 > 42496 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14490","6.541436","172.30.1.104","172.30.1.205","TCP","54","135 > 42496 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14491","6.541441","172.30.1.205","172.30.1.104","TCP","54","42496 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14492","6.541562","172.30.1.104","172.30.1.205","TCP","66","49671 > 35134 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14493","6.541570","172.30.1.205","172.30.1.104","TCP","54","35134 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14494","6.541917","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14495","6.543008","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14496","6.543017","172.30.1.205","172.30.1.104","TCP","54","35134 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14497","6.544938","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14498","6.545306","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14499","6.545312","172.30.1.205","172.30.1.104","TCP","54","35134 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14500","6.546681","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14501","6.548331","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14502","6.548340","172.30.1.205","172.30.1.104","TCP","54","35134 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14503","6.549371","172.30.1.205","172.30.1.104","TCP","74","42500 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909775 TSecr=0 WS=128" "14504","6.549676","172.30.1.104","172.30.1.205","TCP","66","135 > 42500 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14505","6.549686","172.30.1.205","172.30.1.104","TCP","54","42500 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14506","6.550037","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14507","6.550321","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14508","6.550330","172.30.1.205","172.30.1.104","TCP","54","42500 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14509","6.552532","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14510","6.552911","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14511","6.552918","172.30.1.205","172.30.1.104","TCP","54","42500 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14512","6.554738","172.30.1.205","172.30.1.104","TCP","54","42500 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14513","6.554851","172.30.1.205","172.30.1.104","TCP","74","35138 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909781 TSecr=0 WS=128" "14514","6.554998","172.30.1.104","172.30.1.205","TCP","54","135 > 42500 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14515","6.555013","172.30.1.104","172.30.1.205","TCP","54","135 > 42500 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14516","6.555018","172.30.1.205","172.30.1.104","TCP","54","42500 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14517","6.555110","172.30.1.104","172.30.1.205","TCP","66","49671 > 35138 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14518","6.555118","172.30.1.205","172.30.1.104","TCP","54","35138 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14519","6.555476","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14520","6.555822","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14521","6.555829","172.30.1.205","172.30.1.104","TCP","54","35138 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14522","6.557805","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14523","6.558201","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14524","6.558207","172.30.1.205","172.30.1.104","TCP","54","35138 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14525","6.559570","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14526","6.561239","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14527","6.561248","172.30.1.205","172.30.1.104","TCP","54","35138 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14528","6.562210","172.30.1.205","172.30.1.104","TCP","74","42504 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909788 TSecr=0 WS=128" "14529","6.562505","172.30.1.104","172.30.1.205","TCP","66","135 > 42504 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14530","6.562520","172.30.1.205","172.30.1.104","TCP","54","42504 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14531","6.562870","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14532","6.563182","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14533","6.563192","172.30.1.205","172.30.1.104","TCP","54","42504 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14534","6.565417","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14535","6.565803","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14536","6.565809","172.30.1.205","172.30.1.104","TCP","54","42504 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14537","6.567653","172.30.1.205","172.30.1.104","TCP","54","42504 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14538","6.567764","172.30.1.205","172.30.1.104","TCP","74","35142 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909794 TSecr=0 WS=128" "14539","6.567903","172.30.1.104","172.30.1.205","TCP","54","135 > 42504 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14540","6.567950","172.30.1.104","172.30.1.205","TCP","54","135 > 42504 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14541","6.567956","172.30.1.205","172.30.1.104","TCP","54","42504 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14542","6.568028","172.30.1.104","172.30.1.205","TCP","66","49671 > 35142 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14543","6.568037","172.30.1.205","172.30.1.104","TCP","54","35142 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14544","6.568383","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14545","6.568692","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14546","6.568701","172.30.1.205","172.30.1.104","TCP","54","35142 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14547","6.570665","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14548","6.571056","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14549","6.571063","172.30.1.205","172.30.1.104","TCP","54","35142 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14550","6.572429","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14551","6.574170","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14552","6.574188","172.30.1.205","172.30.1.104","TCP","54","35142 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14553","6.575244","172.30.1.205","172.30.1.104","TCP","74","42508 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909801 TSecr=0 WS=128" "14554","6.575557","172.30.1.104","172.30.1.205","TCP","66","135 > 42508 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14555","6.575568","172.30.1.205","172.30.1.104","TCP","54","42508 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14556","6.575922","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14557","6.576220","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14558","6.576230","172.30.1.205","172.30.1.104","TCP","54","42508 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14559","6.578437","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14560","6.578822","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14561","6.578829","172.30.1.205","172.30.1.104","TCP","54","42508 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14562","6.580667","172.30.1.205","172.30.1.104","TCP","54","42508 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14563","6.580798","172.30.1.205","172.30.1.104","TCP","74","35146 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909807 TSecr=0 WS=128" "14564","6.580922","172.30.1.104","172.30.1.205","TCP","54","135 > 42508 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14565","6.580936","172.30.1.104","172.30.1.205","TCP","54","135 > 42508 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14566","6.580942","172.30.1.205","172.30.1.104","TCP","54","42508 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14567","6.581074","172.30.1.104","172.30.1.205","TCP","66","49671 > 35146 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14568","6.581082","172.30.1.205","172.30.1.104","TCP","54","35146 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14569","6.581473","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14570","6.581770","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14571","6.581778","172.30.1.205","172.30.1.104","TCP","54","35146 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14572","6.583683","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14573","6.584115","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14574","6.584121","172.30.1.205","172.30.1.104","TCP","54","35146 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14575","6.585503","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14576","6.587234","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14577","6.587253","172.30.1.205","172.30.1.104","TCP","54","35146 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14578","6.588429","172.30.1.205","172.30.1.104","TCP","74","42512 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909814 TSecr=0 WS=128" "14579","6.588744","172.30.1.104","172.30.1.205","TCP","66","135 > 42512 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14580","6.588754","172.30.1.205","172.30.1.104","TCP","54","42512 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14581","6.589127","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14582","6.589442","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14583","6.589451","172.30.1.205","172.30.1.104","TCP","54","42512 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14584","6.591649","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14585","6.592052","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14586","6.592064","172.30.1.205","172.30.1.104","TCP","54","42512 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14587","6.594093","172.30.1.205","172.30.1.104","TCP","54","42512 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14588","6.594207","172.30.1.205","172.30.1.104","TCP","74","35150 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909820 TSecr=0 WS=128" "14589","6.594364","172.30.1.104","172.30.1.205","TCP","54","135 > 42512 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14590","6.594378","172.30.1.104","172.30.1.205","TCP","54","135 > 42512 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14591","6.594384","172.30.1.205","172.30.1.104","TCP","54","42512 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14592","6.594507","172.30.1.104","172.30.1.205","TCP","66","49671 > 35150 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14593","6.594515","172.30.1.205","172.30.1.104","TCP","54","35150 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14594","6.594877","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14595","6.595155","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14596","6.595164","172.30.1.205","172.30.1.104","TCP","54","35150 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14597","6.597159","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14598","6.597519","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14599","6.597526","172.30.1.205","172.30.1.104","TCP","54","35150 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14600","6.598889","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14601","6.600556","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14602","6.600565","172.30.1.205","172.30.1.104","TCP","54","35150 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14603","6.601528","172.30.1.205","172.30.1.104","TCP","74","42516 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909827 TSecr=0 WS=128" "14604","6.601846","172.30.1.104","172.30.1.205","TCP","66","135 > 42516 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14605","6.601857","172.30.1.205","172.30.1.104","TCP","54","42516 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14606","6.602204","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14607","6.602502","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14608","6.602511","172.30.1.205","172.30.1.104","TCP","54","42516 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14609","6.604683","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14610","6.605138","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14611","6.605145","172.30.1.205","172.30.1.104","TCP","54","42516 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14612","6.606957","172.30.1.205","172.30.1.104","TCP","54","42516 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14613","6.607067","172.30.1.205","172.30.1.104","TCP","74","35154 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909833 TSecr=0 WS=128" "14614","6.607239","172.30.1.104","172.30.1.205","TCP","54","135 > 42516 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14615","6.607253","172.30.1.104","172.30.1.205","TCP","54","135 > 42516 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14616","6.607258","172.30.1.205","172.30.1.104","TCP","54","42516 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14617","6.607363","172.30.1.104","172.30.1.205","TCP","66","49671 > 35154 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14618","6.607372","172.30.1.205","172.30.1.104","TCP","54","35154 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14619","6.607719","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14620","6.608009","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14621","6.608018","172.30.1.205","172.30.1.104","TCP","54","35154 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14622","6.609922","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14623","6.610280","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14624","6.610287","172.30.1.205","172.30.1.104","TCP","54","35154 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14625","6.611627","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14626","6.613198","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14627","6.613207","172.30.1.205","172.30.1.104","TCP","54","35154 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14628","6.614144","172.30.1.205","172.30.1.104","TCP","74","42520 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909840 TSecr=0 WS=128" "14629","6.614455","172.30.1.104","172.30.1.205","TCP","66","135 > 42520 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14630","6.614465","172.30.1.205","172.30.1.104","TCP","54","42520 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14631","6.614820","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14632","6.615119","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14633","6.615128","172.30.1.205","172.30.1.104","TCP","54","42520 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14634","6.617330","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14635","6.617706","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14636","6.617713","172.30.1.205","172.30.1.104","TCP","54","42520 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14637","6.618556","172.30.1.205","172.30.1.104","TCP","54","35114 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14638","6.618604","172.30.1.205","172.30.1.104","TCP","54","35118 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14639","6.618642","172.30.1.205","172.30.1.104","TCP","54","35122 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14640","6.618676","172.30.1.205","172.30.1.104","TCP","54","35126 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14641","6.618709","172.30.1.205","172.30.1.104","TCP","54","35130 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14642","6.618742","172.30.1.205","172.30.1.104","TCP","54","35134 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14643","6.618769","172.30.1.205","172.30.1.104","TCP","54","35138 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14644","6.618801","172.30.1.205","172.30.1.104","TCP","54","35142 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14645","6.618824","172.30.1.205","172.30.1.104","TCP","54","35146 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14646","6.618840","172.30.1.104","172.30.1.205","TCP","54","49671 > 35114 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14647","6.618858","172.30.1.104","172.30.1.205","TCP","54","49671 > 35118 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14648","6.618880","172.30.1.205","172.30.1.104","TCP","54","35150 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14649","6.618909","172.30.1.205","172.30.1.104","TCP","54","35154 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14650","6.618978","172.30.1.205","172.30.1.104","TCP","54","35110 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14651","6.619125","172.30.1.104","172.30.1.205","TCP","54","49671 > 35114 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14652","6.619132","172.30.1.205","172.30.1.104","TCP","54","35114 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "14653","6.619138","172.30.1.104","172.30.1.205","TCP","54","49671 > 35122 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14654","6.619148","172.30.1.104","172.30.1.205","TCP","54","49671 > 35118 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14655","6.619150","172.30.1.205","172.30.1.104","TCP","54","35118 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "14656","6.619162","172.30.1.104","172.30.1.205","TCP","54","49671 > 35122 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14657","6.619164","172.30.1.205","172.30.1.104","TCP","54","35122 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "14658","6.619182","172.30.1.104","172.30.1.205","TCP","54","49671 > 35126 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14659","6.619201","172.30.1.104","172.30.1.205","TCP","54","49671 > 35130 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14660","6.619223","172.30.1.104","172.30.1.205","TCP","54","49671 > 35126 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14661","6.619226","172.30.1.205","172.30.1.104","TCP","54","35126 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "14662","6.619242","172.30.1.104","172.30.1.205","TCP","54","49671 > 35134 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14663","6.619267","172.30.1.104","172.30.1.205","TCP","54","49671 > 35138 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14664","6.619288","172.30.1.104","172.30.1.205","TCP","54","49671 > 35138 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14665","6.619292","172.30.1.205","172.30.1.104","TCP","54","35138 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "14666","6.619309","172.30.1.104","172.30.1.205","TCP","54","49671 > 35142 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14667","6.619329","172.30.1.104","172.30.1.205","TCP","54","49671 > 35142 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14668","6.619333","172.30.1.205","172.30.1.104","TCP","54","35142 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "14669","6.619349","172.30.1.104","172.30.1.205","TCP","54","49671 > 35146 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14670","6.619369","172.30.1.104","172.30.1.205","TCP","54","49671 > 35146 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14671","6.619373","172.30.1.205","172.30.1.104","TCP","54","35146 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "14672","6.619523","172.30.1.104","172.30.1.205","TCP","54","49671 > 35150 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14673","6.619543","172.30.1.104","172.30.1.205","TCP","54","49671 > 35150 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14674","6.619547","172.30.1.205","172.30.1.104","TCP","54","35150 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "14675","6.619563","172.30.1.104","172.30.1.205","TCP","54","49671 > 35130 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14676","6.619566","172.30.1.205","172.30.1.104","TCP","54","35130 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "14677","6.619584","172.30.1.104","172.30.1.205","TCP","54","49671 > 35134 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14678","6.619586","172.30.1.205","172.30.1.104","TCP","54","35134 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "14679","6.619694","172.30.1.104","172.30.1.205","TCP","54","49671 > 35110 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14680","6.619715","172.30.1.104","172.30.1.205","TCP","54","49671 > 35154 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14681","6.619767","172.30.1.104","172.30.1.205","TCP","54","49671 > 35110 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14682","6.619772","172.30.1.205","172.30.1.104","TCP","54","35110 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "14683","6.619788","172.30.1.104","172.30.1.205","TCP","54","49671 > 35154 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14684","6.619790","172.30.1.205","172.30.1.104","TCP","54","35154 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "14685","6.620539","172.30.1.205","172.30.1.104","TCP","54","42520 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14686","6.620650","172.30.1.205","172.30.1.104","TCP","74","35158 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909847 TSecr=0 WS=128" "14687","6.620786","172.30.1.104","172.30.1.205","TCP","54","135 > 42520 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14688","6.620804","172.30.1.104","172.30.1.205","TCP","54","135 > 42520 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14689","6.620810","172.30.1.205","172.30.1.104","TCP","54","42520 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14690","6.621010","172.30.1.104","172.30.1.205","TCP","66","49671 > 35158 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14691","6.621018","172.30.1.205","172.30.1.104","TCP","54","35158 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14692","6.621378","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14693","6.621656","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14694","6.621665","172.30.1.205","172.30.1.104","TCP","54","35158 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14695","6.623535","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14696","6.623883","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14697","6.623890","172.30.1.205","172.30.1.104","TCP","54","35158 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14698","6.625275","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14699","6.626847","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14700","6.626857","172.30.1.205","172.30.1.104","TCP","54","35158 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14701","6.627787","172.30.1.205","172.30.1.104","TCP","74","42524 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909854 TSecr=0 WS=128" "14702","6.628101","172.30.1.104","172.30.1.205","TCP","66","135 > 42524 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14703","6.628112","172.30.1.205","172.30.1.104","TCP","54","42524 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14704","6.628460","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14705","6.628784","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14706","6.628793","172.30.1.205","172.30.1.104","TCP","54","42524 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14707","6.630987","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14708","6.631378","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14709","6.631385","172.30.1.205","172.30.1.104","TCP","54","42524 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14710","6.633220","172.30.1.205","172.30.1.104","TCP","54","42524 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14711","6.633329","172.30.1.205","172.30.1.104","TCP","74","35162 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909859 TSecr=0 WS=128" "14712","6.633478","172.30.1.104","172.30.1.205","TCP","54","135 > 42524 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14713","6.633499","172.30.1.104","172.30.1.205","TCP","54","135 > 42524 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14714","6.633505","172.30.1.205","172.30.1.104","TCP","54","42524 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14715","6.633607","172.30.1.104","172.30.1.205","TCP","66","49671 > 35162 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14716","6.633615","172.30.1.205","172.30.1.104","TCP","54","35162 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14717","6.633960","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14718","6.634243","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14719","6.634249","172.30.1.205","172.30.1.104","TCP","54","35162 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14720","6.636106","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14721","6.636473","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14722","6.636480","172.30.1.205","172.30.1.104","TCP","54","35162 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14723","6.637843","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14724","6.639425","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14725","6.639434","172.30.1.205","172.30.1.104","TCP","54","35162 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14726","6.640363","172.30.1.205","172.30.1.104","TCP","74","42528 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909866 TSecr=0 WS=128" "14727","6.640659","172.30.1.104","172.30.1.205","TCP","66","135 > 42528 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14728","6.640669","172.30.1.205","172.30.1.104","TCP","54","42528 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14729","6.641046","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14730","6.641350","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14731","6.641368","172.30.1.205","172.30.1.104","TCP","54","42528 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14732","6.643809","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14733","6.644176","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14734","6.644182","172.30.1.205","172.30.1.104","TCP","54","42528 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14735","6.646011","172.30.1.205","172.30.1.104","TCP","54","42528 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14736","6.646123","172.30.1.205","172.30.1.104","TCP","74","35166 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909872 TSecr=0 WS=128" "14737","6.646295","172.30.1.104","172.30.1.205","TCP","54","135 > 42528 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14738","6.646308","172.30.1.104","172.30.1.205","TCP","54","135 > 42528 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14739","6.646316","172.30.1.205","172.30.1.104","TCP","54","42528 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14740","6.646446","172.30.1.104","172.30.1.205","TCP","66","49671 > 35166 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14741","6.646457","172.30.1.205","172.30.1.104","TCP","54","35166 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14742","6.646845","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14743","6.647103","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14744","6.647112","172.30.1.205","172.30.1.104","TCP","54","35166 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14745","6.649057","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14746","6.649411","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14747","6.649418","172.30.1.205","172.30.1.104","TCP","54","35166 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14748","6.650773","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14749","6.652490","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14750","6.652501","172.30.1.205","172.30.1.104","TCP","54","35166 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14751","6.653491","172.30.1.205","172.30.1.104","TCP","74","42532 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909879 TSecr=0 WS=128" "14752","6.653795","172.30.1.104","172.30.1.205","TCP","66","135 > 42532 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14753","6.653806","172.30.1.205","172.30.1.104","TCP","54","42532 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14754","6.654155","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14755","6.654423","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14756","6.654431","172.30.1.205","172.30.1.104","TCP","54","42532 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14757","6.656611","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14758","6.656979","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14759","6.656986","172.30.1.205","172.30.1.104","TCP","54","42532 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14760","6.658831","172.30.1.205","172.30.1.104","TCP","54","42532 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14761","6.658942","172.30.1.205","172.30.1.104","TCP","74","35170 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909885 TSecr=0 WS=128" "14762","6.659084","172.30.1.104","172.30.1.205","TCP","54","135 > 42532 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14763","6.659099","172.30.1.104","172.30.1.205","TCP","54","135 > 42532 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14764","6.659104","172.30.1.205","172.30.1.104","TCP","54","42532 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14765","6.659199","172.30.1.104","172.30.1.205","TCP","66","49671 > 35170 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14766","6.659208","172.30.1.205","172.30.1.104","TCP","54","35170 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14767","6.659550","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14768","6.659825","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14769","6.659834","172.30.1.205","172.30.1.104","TCP","54","35170 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14770","6.661749","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14771","6.662087","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14772","6.662094","172.30.1.205","172.30.1.104","TCP","54","35170 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14773","6.663434","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14774","6.665185","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14775","6.665195","172.30.1.205","172.30.1.104","TCP","54","35170 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14776","6.666135","172.30.1.205","172.30.1.104","TCP","74","42536 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909892 TSecr=0 WS=128" "14777","6.666426","172.30.1.104","172.30.1.205","TCP","66","135 > 42536 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14778","6.666437","172.30.1.205","172.30.1.104","TCP","54","42536 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14779","6.666784","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14780","6.667089","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14781","6.667098","172.30.1.205","172.30.1.104","TCP","54","42536 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14782","6.669301","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14783","6.669669","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14784","6.669676","172.30.1.205","172.30.1.104","TCP","54","42536 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14785","6.671474","172.30.1.205","172.30.1.104","TCP","54","42536 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14786","6.671583","172.30.1.205","172.30.1.104","TCP","74","35174 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909898 TSecr=0 WS=128" "14787","6.671751","172.30.1.104","172.30.1.205","TCP","54","135 > 42536 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14788","6.671791","172.30.1.104","172.30.1.205","TCP","54","135 > 42536 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14789","6.671797","172.30.1.205","172.30.1.104","TCP","54","42536 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14790","6.671817","172.30.1.104","172.30.1.205","TCP","66","49671 > 35174 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14791","6.671826","172.30.1.205","172.30.1.104","TCP","54","35174 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14792","6.672168","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14793","6.672435","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14794","6.672444","172.30.1.205","172.30.1.104","TCP","54","35174 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14795","6.674346","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14796","6.674743","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14797","6.674750","172.30.1.205","172.30.1.104","TCP","54","35174 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14798","6.676112","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14799","6.677748","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14800","6.677758","172.30.1.205","172.30.1.104","TCP","54","35174 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14801","6.678727","172.30.1.205","172.30.1.104","TCP","74","42540 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909905 TSecr=0 WS=128" "14802","6.679006","172.30.1.104","172.30.1.205","TCP","66","135 > 42540 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14803","6.679017","172.30.1.205","172.30.1.104","TCP","54","42540 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14804","6.679362","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14805","6.679631","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14806","6.679640","172.30.1.205","172.30.1.104","TCP","54","42540 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14807","6.681861","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14808","6.682254","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14809","6.682261","172.30.1.205","172.30.1.104","TCP","54","42540 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14810","6.684132","172.30.1.205","172.30.1.104","TCP","54","42540 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14811","6.684241","172.30.1.205","172.30.1.104","TCP","74","35178 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909910 TSecr=0 WS=128" "14812","6.684412","172.30.1.104","172.30.1.205","TCP","54","135 > 42540 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14813","6.684442","172.30.1.104","172.30.1.205","TCP","54","135 > 42540 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14814","6.684448","172.30.1.205","172.30.1.104","TCP","54","42540 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14815","6.684519","172.30.1.104","172.30.1.205","TCP","66","49671 > 35178 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14816","6.684527","172.30.1.205","172.30.1.104","TCP","54","35178 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14817","6.684896","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14818","6.685184","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14819","6.685193","172.30.1.205","172.30.1.104","TCP","54","35178 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14820","6.687063","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14821","6.687649","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14822","6.687655","172.30.1.205","172.30.1.104","TCP","54","35178 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14823","6.689022","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14824","6.690624","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14825","6.690633","172.30.1.205","172.30.1.104","TCP","54","35178 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14826","6.691575","172.30.1.205","172.30.1.104","TCP","74","42544 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909917 TSecr=0 WS=128" "14827","6.691917","172.30.1.104","172.30.1.205","TCP","66","135 > 42544 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14828","6.691937","172.30.1.205","172.30.1.104","TCP","54","42544 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14829","6.692517","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14830","6.692787","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14831","6.692796","172.30.1.205","172.30.1.104","TCP","54","42544 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14832","6.694977","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14833","6.695360","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14834","6.695367","172.30.1.205","172.30.1.104","TCP","54","42544 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14835","6.697192","172.30.1.205","172.30.1.104","TCP","54","42544 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14836","6.697299","172.30.1.205","172.30.1.104","TCP","74","35182 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909923 TSecr=0 WS=128" "14837","6.697456","172.30.1.104","172.30.1.205","TCP","54","135 > 42544 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14838","6.697507","172.30.1.104","172.30.1.205","TCP","54","135 > 42544 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14839","6.697512","172.30.1.205","172.30.1.104","TCP","54","42544 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14840","6.697595","172.30.1.104","172.30.1.205","TCP","66","49671 > 35182 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14841","6.697603","172.30.1.205","172.30.1.104","TCP","54","35182 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14842","6.697965","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14843","6.698223","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14844","6.698232","172.30.1.205","172.30.1.104","TCP","54","35182 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14845","6.700104","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14846","6.700445","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14847","6.700451","172.30.1.205","172.30.1.104","TCP","54","35182 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14848","6.701843","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14849","6.703446","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14850","6.703456","172.30.1.205","172.30.1.104","TCP","54","35182 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14851","6.704379","172.30.1.205","172.30.1.104","TCP","74","42548 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909930 TSecr=0 WS=128" "14852","6.704802","172.30.1.104","172.30.1.205","TCP","66","135 > 42548 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14853","6.704813","172.30.1.205","172.30.1.104","TCP","54","42548 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14854","6.705170","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14855","6.705436","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14856","6.705445","172.30.1.205","172.30.1.104","TCP","54","42548 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14857","6.707614","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14858","6.707986","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14859","6.707992","172.30.1.205","172.30.1.104","TCP","54","42548 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14860","6.709808","172.30.1.205","172.30.1.104","TCP","54","42548 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14861","6.709916","172.30.1.205","172.30.1.104","TCP","74","35186 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909936 TSecr=0 WS=128" "14862","6.710057","172.30.1.104","172.30.1.205","TCP","54","135 > 42548 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14863","6.710080","172.30.1.104","172.30.1.205","TCP","54","135 > 42548 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14864","6.710085","172.30.1.205","172.30.1.104","TCP","54","42548 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14865","6.710166","172.30.1.104","172.30.1.205","TCP","66","49671 > 35186 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14866","6.710174","172.30.1.205","172.30.1.104","TCP","54","35186 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14867","6.710517","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14868","6.712326","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14869","6.712335","172.30.1.205","172.30.1.104","TCP","54","35186 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14870","6.714222","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14871","6.714578","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14872","6.714584","172.30.1.205","172.30.1.104","TCP","54","35186 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14873","6.715928","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14874","6.717531","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14875","6.717540","172.30.1.205","172.30.1.104","TCP","54","35186 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14876","6.718475","172.30.1.205","172.30.1.104","TCP","74","42552 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909944 TSecr=0 WS=128" "14877","6.718763","172.30.1.104","172.30.1.205","TCP","66","135 > 42552 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14878","6.718774","172.30.1.205","172.30.1.104","TCP","54","42552 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14879","6.719123","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14880","6.719386","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14881","6.719395","172.30.1.205","172.30.1.104","TCP","54","42552 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14882","6.721589","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14883","6.721952","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14884","6.721959","172.30.1.205","172.30.1.104","TCP","54","42552 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14885","6.723804","172.30.1.205","172.30.1.104","TCP","54","42552 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14886","6.723924","172.30.1.205","172.30.1.104","TCP","74","35190 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909950 TSecr=0 WS=128" "14887","6.724106","172.30.1.104","172.30.1.205","TCP","54","135 > 42552 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14888","6.724122","172.30.1.104","172.30.1.205","TCP","54","135 > 42552 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14889","6.724128","172.30.1.205","172.30.1.104","TCP","54","42552 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14890","6.724274","172.30.1.104","172.30.1.205","TCP","66","49671 > 35190 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14891","6.724282","172.30.1.205","172.30.1.104","TCP","54","35190 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14892","6.724636","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14893","6.724928","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14894","6.724937","172.30.1.205","172.30.1.104","TCP","54","35190 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14895","6.726837","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14896","6.727193","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14897","6.727199","172.30.1.205","172.30.1.104","TCP","54","35190 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14898","6.728532","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14899","6.730128","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14900","6.730137","172.30.1.205","172.30.1.104","TCP","54","35190 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14901","6.731067","172.30.1.205","172.30.1.104","TCP","74","42556 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909957 TSecr=0 WS=128" "14902","6.731376","172.30.1.104","172.30.1.205","TCP","66","135 > 42556 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14903","6.731387","172.30.1.205","172.30.1.104","TCP","54","42556 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14904","6.731734","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14905","6.732024","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14906","6.732033","172.30.1.205","172.30.1.104","TCP","54","42556 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14907","6.734218","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14908","6.734591","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14909","6.734597","172.30.1.205","172.30.1.104","TCP","54","42556 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14910","6.736384","172.30.1.205","172.30.1.104","TCP","54","42556 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14911","6.736493","172.30.1.205","172.30.1.104","TCP","74","35194 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909962 TSecr=0 WS=128" "14912","6.736660","172.30.1.104","172.30.1.205","TCP","54","135 > 42556 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14913","6.736692","172.30.1.104","172.30.1.205","TCP","54","135 > 42556 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14914","6.736698","172.30.1.205","172.30.1.104","TCP","54","42556 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14915","6.736770","172.30.1.104","172.30.1.205","TCP","66","49671 > 35194 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14916","6.736788","172.30.1.205","172.30.1.104","TCP","54","35194 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14917","6.737142","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14918","6.737434","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14919","6.737443","172.30.1.205","172.30.1.104","TCP","54","35194 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14920","6.739305","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14921","6.739681","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14922","6.739688","172.30.1.205","172.30.1.104","TCP","54","35194 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14923","6.741041","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14924","6.742998","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14925","6.743007","172.30.1.205","172.30.1.104","TCP","54","35194 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14926","6.743936","172.30.1.205","172.30.1.104","TCP","74","42560 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909970 TSecr=0 WS=128" "14927","6.744226","172.30.1.104","172.30.1.205","TCP","66","135 > 42560 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14928","6.744236","172.30.1.205","172.30.1.104","TCP","54","42560 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14929","6.744580","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14930","6.744858","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14931","6.744868","172.30.1.205","172.30.1.104","TCP","54","42560 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14932","6.747048","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14933","6.747456","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14934","6.747462","172.30.1.205","172.30.1.104","TCP","54","42560 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14935","6.749278","172.30.1.205","172.30.1.104","TCP","54","42560 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14936","6.749387","172.30.1.205","172.30.1.104","TCP","74","35198 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909975 TSecr=0 WS=128" "14937","6.749540","172.30.1.104","172.30.1.205","TCP","54","135 > 42560 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14938","6.749548","172.30.1.104","172.30.1.205","TCP","54","135 > 42560 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14939","6.749553","172.30.1.205","172.30.1.104","TCP","54","42560 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14940","6.749670","172.30.1.104","172.30.1.205","TCP","66","49671 > 35198 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14941","6.749678","172.30.1.205","172.30.1.104","TCP","54","35198 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14942","6.750023","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14943","6.750289","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14944","6.750300","172.30.1.205","172.30.1.104","TCP","54","35198 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14945","6.752475","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14946","6.752844","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14947","6.752851","172.30.1.205","172.30.1.104","TCP","54","35198 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14948","6.754246","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14949","6.755823","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14950","6.755842","172.30.1.205","172.30.1.104","TCP","54","35198 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14951","6.756871","172.30.1.205","172.30.1.104","TCP","74","42564 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909983 TSecr=0 WS=128" "14952","6.757161","172.30.1.104","172.30.1.205","TCP","66","135 > 42564 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14953","6.757171","172.30.1.205","172.30.1.104","TCP","54","42564 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14954","6.757515","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14955","6.757813","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14956","6.757821","172.30.1.205","172.30.1.104","TCP","54","42564 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14957","6.760008","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14958","6.760399","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14959","6.760406","172.30.1.205","172.30.1.104","TCP","54","42564 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14960","6.762218","172.30.1.205","172.30.1.104","TCP","54","42564 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "14961","6.762327","172.30.1.205","172.30.1.104","TCP","74","35202 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909988 TSecr=0 WS=128" "14962","6.762490","172.30.1.104","172.30.1.205","TCP","54","135 > 42564 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14963","6.762599","172.30.1.104","172.30.1.205","TCP","66","49671 > 35202 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14964","6.762607","172.30.1.205","172.30.1.104","TCP","54","35202 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14965","6.762947","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "14966","6.764752","172.30.1.104","172.30.1.205","TCP","54","135 > 42564 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "14967","6.764757","172.30.1.205","172.30.1.104","TCP","54","42564 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "14968","6.764792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14969","6.764800","172.30.1.205","172.30.1.104","TCP","54","35202 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14970","6.766661","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "14971","6.767063","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "14972","6.767076","172.30.1.205","172.30.1.104","TCP","54","35202 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "14973","6.768567","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "14974","6.770191","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "14975","6.770201","172.30.1.205","172.30.1.104","TCP","54","35202 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "14976","6.771145","172.30.1.205","172.30.1.104","TCP","74","42568 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499909997 TSecr=0 WS=128" "14977","6.771447","172.30.1.104","172.30.1.205","TCP","66","135 > 42568 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "14978","6.771456","172.30.1.205","172.30.1.104","TCP","54","42568 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "14979","6.771827","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "14980","6.772116","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "14981","6.772125","172.30.1.205","172.30.1.104","TCP","54","42568 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "14982","6.774314","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "14983","6.774755","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "14984","6.774761","172.30.1.205","172.30.1.104","TCP","54","42568 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "14985","6.775601","172.30.1.205","172.30.1.104","TCP","54","35162 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14986","6.775650","172.30.1.205","172.30.1.104","TCP","54","35166 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14987","6.775681","172.30.1.205","172.30.1.104","TCP","54","35170 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14988","6.775711","172.30.1.205","172.30.1.104","TCP","54","35174 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14989","6.775746","172.30.1.205","172.30.1.104","TCP","54","35178 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14990","6.775773","172.30.1.205","172.30.1.104","TCP","54","35182 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14991","6.775800","172.30.1.205","172.30.1.104","TCP","54","35186 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14992","6.775828","172.30.1.205","172.30.1.104","TCP","54","35190 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14993","6.775855","172.30.1.205","172.30.1.104","TCP","54","35194 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14994","6.775882","172.30.1.205","172.30.1.104","TCP","54","35198 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14995","6.775913","172.30.1.205","172.30.1.104","TCP","54","35202 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14996","6.775981","172.30.1.205","172.30.1.104","TCP","54","35158 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "14997","6.776032","172.30.1.104","172.30.1.205","TCP","54","49671 > 35162 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14998","6.776049","172.30.1.104","172.30.1.205","TCP","54","49671 > 35162 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "14999","6.776054","172.30.1.205","172.30.1.104","TCP","54","35162 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15000","6.776076","172.30.1.104","172.30.1.205","TCP","54","49671 > 35166 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15001","6.776083","172.30.1.104","172.30.1.205","TCP","54","49671 > 35170 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15002","6.776110","172.30.1.104","172.30.1.205","TCP","54","49671 > 35166 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15003","6.776115","172.30.1.205","172.30.1.104","TCP","54","35166 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15004","6.776127","172.30.1.104","172.30.1.205","TCP","54","49671 > 35174 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15005","6.776187","172.30.1.104","172.30.1.205","TCP","54","49671 > 35178 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15006","6.776258","172.30.1.104","172.30.1.205","TCP","54","49671 > 35186 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15007","6.776275","172.30.1.104","172.30.1.205","TCP","54","49671 > 35182 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15008","6.776298","172.30.1.104","172.30.1.205","TCP","54","49671 > 35186 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15009","6.776308","172.30.1.205","172.30.1.104","TCP","54","35186 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15010","6.776330","172.30.1.104","172.30.1.205","TCP","54","49671 > 35182 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15011","6.776334","172.30.1.205","172.30.1.104","TCP","54","35182 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15012","6.776357","172.30.1.104","172.30.1.205","TCP","54","49671 > 35178 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15013","6.776360","172.30.1.205","172.30.1.104","TCP","54","35178 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15014","6.776377","172.30.1.104","172.30.1.205","TCP","54","49671 > 35174 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15015","6.776380","172.30.1.205","172.30.1.104","TCP","54","35174 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15016","6.776398","172.30.1.104","172.30.1.205","TCP","54","49671 > 35170 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15017","6.776401","172.30.1.205","172.30.1.104","TCP","54","35170 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15018","6.776421","172.30.1.104","172.30.1.205","TCP","54","49671 > 35190 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15019","6.776442","172.30.1.104","172.30.1.205","TCP","54","49671 > 35194 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15020","6.776461","172.30.1.104","172.30.1.205","TCP","54","49671 > 35198 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15021","6.776479","172.30.1.104","172.30.1.205","TCP","54","49671 > 35202 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15022","6.776499","172.30.1.104","172.30.1.205","TCP","54","49671 > 35202 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15023","6.776503","172.30.1.205","172.30.1.104","TCP","54","35202 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15024","6.776519","172.30.1.104","172.30.1.205","TCP","54","49671 > 35198 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15025","6.776523","172.30.1.205","172.30.1.104","TCP","54","35198 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15026","6.776540","172.30.1.104","172.30.1.205","TCP","54","49671 > 35190 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15027","6.776543","172.30.1.205","172.30.1.104","TCP","54","35190 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15028","6.776561","172.30.1.104","172.30.1.205","TCP","54","49671 > 35194 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15029","6.776563","172.30.1.205","172.30.1.104","TCP","54","35194 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15030","6.776583","172.30.1.104","172.30.1.205","TCP","54","49671 > 35158 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15031","6.776794","172.30.1.104","172.30.1.205","TCP","54","49671 > 35158 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15032","6.776800","172.30.1.205","172.30.1.104","TCP","54","35158 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15033","6.777595","172.30.1.205","172.30.1.104","TCP","54","42568 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15034","6.777705","172.30.1.205","172.30.1.104","TCP","74","35206 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910004 TSecr=0 WS=128" "15035","6.777850","172.30.1.104","172.30.1.205","TCP","54","135 > 42568 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15036","6.777913","172.30.1.104","172.30.1.205","TCP","54","135 > 42568 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15037","6.777918","172.30.1.205","172.30.1.104","TCP","54","42568 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15038","6.777948","172.30.1.104","172.30.1.205","TCP","66","49671 > 35206 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15039","6.777956","172.30.1.205","172.30.1.104","TCP","54","35206 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15040","6.778301","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15041","6.778575","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15042","6.778584","172.30.1.205","172.30.1.104","TCP","54","35206 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15043","6.780465","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15044","6.780830","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15045","6.780837","172.30.1.205","172.30.1.104","TCP","54","35206 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15046","6.782192","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15047","6.783830","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15048","6.783841","172.30.1.205","172.30.1.104","TCP","54","35206 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15049","6.784847","172.30.1.205","172.30.1.104","TCP","74","42572 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910011 TSecr=0 WS=128" "15050","6.785169","172.30.1.104","172.30.1.205","TCP","66","135 > 42572 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15051","6.785180","172.30.1.205","172.30.1.104","TCP","54","42572 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15052","6.785535","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15053","6.785808","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15054","6.785816","172.30.1.205","172.30.1.104","TCP","54","42572 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15055","6.788039","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15056","6.788424","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15057","6.788431","172.30.1.205","172.30.1.104","TCP","54","42572 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15058","6.790228","172.30.1.205","172.30.1.104","TCP","54","42572 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15059","6.790336","172.30.1.205","172.30.1.104","TCP","74","35210 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910016 TSecr=0 WS=128" "15060","6.790505","172.30.1.104","172.30.1.205","TCP","54","135 > 42572 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15061","6.790546","172.30.1.104","172.30.1.205","TCP","54","135 > 42572 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15062","6.790551","172.30.1.205","172.30.1.104","TCP","54","42572 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15063","6.790643","172.30.1.104","172.30.1.205","TCP","66","49671 > 35210 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15064","6.790651","172.30.1.205","172.30.1.104","TCP","54","35210 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15065","6.790990","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15066","6.791343","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15067","6.791352","172.30.1.205","172.30.1.104","TCP","54","35210 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15068","6.793240","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15069","6.793607","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15070","6.793613","172.30.1.205","172.30.1.104","TCP","54","35210 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15071","6.794943","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15072","6.796520","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15073","6.796530","172.30.1.205","172.30.1.104","TCP","54","35210 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15074","6.797471","172.30.1.205","172.30.1.104","TCP","74","42576 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910023 TSecr=0 WS=128" "15075","6.797758","172.30.1.104","172.30.1.205","TCP","66","135 > 42576 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15076","6.797768","172.30.1.205","172.30.1.104","TCP","54","42576 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15077","6.798117","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15078","6.798394","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15079","6.798403","172.30.1.205","172.30.1.104","TCP","54","42576 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15080","6.800584","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15081","6.801033","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15082","6.801046","172.30.1.205","172.30.1.104","TCP","54","42576 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15083","6.802933","172.30.1.205","172.30.1.104","TCP","54","42576 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15084","6.803060","172.30.1.205","172.30.1.104","TCP","74","35214 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910029 TSecr=0 WS=128" "15085","6.803206","172.30.1.104","172.30.1.205","TCP","54","135 > 42576 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15086","6.803263","172.30.1.104","172.30.1.205","TCP","54","135 > 42576 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15087","6.803269","172.30.1.205","172.30.1.104","TCP","54","42576 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15088","6.803359","172.30.1.104","172.30.1.205","TCP","66","49671 > 35214 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15089","6.803368","172.30.1.205","172.30.1.104","TCP","54","35214 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15090","6.803735","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15091","6.804014","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15092","6.804024","172.30.1.205","172.30.1.104","TCP","54","35214 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15093","6.805948","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15094","6.806324","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15095","6.806331","172.30.1.205","172.30.1.104","TCP","54","35214 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15096","6.807686","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15097","6.809391","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15098","6.809403","172.30.1.205","172.30.1.104","TCP","54","35214 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15099","6.810354","172.30.1.205","172.30.1.104","TCP","74","42580 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910036 TSecr=0 WS=128" "15100","6.810660","172.30.1.104","172.30.1.205","TCP","66","135 > 42580 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15101","6.810673","172.30.1.205","172.30.1.104","TCP","54","42580 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15102","6.811038","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15103","6.811317","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15104","6.811326","172.30.1.205","172.30.1.104","TCP","54","42580 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15105","6.813563","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15106","6.813917","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15107","6.813924","172.30.1.205","172.30.1.104","TCP","54","42580 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15108","6.815754","172.30.1.205","172.30.1.104","TCP","54","42580 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15109","6.815867","172.30.1.205","172.30.1.104","TCP","74","35218 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910042 TSecr=0 WS=128" "15110","6.815996","172.30.1.104","172.30.1.205","TCP","54","135 > 42580 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15111","6.816030","172.30.1.104","172.30.1.205","TCP","54","135 > 42580 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15112","6.816035","172.30.1.205","172.30.1.104","TCP","54","42580 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15113","6.816124","172.30.1.104","172.30.1.205","TCP","66","49671 > 35218 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15114","6.816132","172.30.1.205","172.30.1.104","TCP","54","35218 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15115","6.816479","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15116","6.816747","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15117","6.816757","172.30.1.205","172.30.1.104","TCP","54","35218 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15118","6.818674","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15119","6.819015","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15120","6.819022","172.30.1.205","172.30.1.104","TCP","54","35218 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15121","6.820396","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15122","6.821987","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15123","6.821996","172.30.1.205","172.30.1.104","TCP","54","35218 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15124","6.822945","172.30.1.205","172.30.1.104","TCP","74","42584 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910049 TSecr=0 WS=128" "15125","6.823230","172.30.1.104","172.30.1.205","TCP","66","135 > 42584 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15126","6.823240","172.30.1.205","172.30.1.104","TCP","54","42584 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15127","6.823588","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15128","6.823907","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15129","6.823917","172.30.1.205","172.30.1.104","TCP","54","42584 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15130","6.826111","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15131","6.826535","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15132","6.826541","172.30.1.205","172.30.1.104","TCP","54","42584 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15133","6.828350","172.30.1.205","172.30.1.104","TCP","54","42584 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15134","6.828461","172.30.1.205","172.30.1.104","TCP","74","35222 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910054 TSecr=0 WS=128" "15135","6.828620","172.30.1.104","172.30.1.205","TCP","54","135 > 42584 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15136","6.828652","172.30.1.104","172.30.1.205","TCP","54","135 > 42584 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15137","6.828658","172.30.1.205","172.30.1.104","TCP","54","42584 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15138","6.828732","172.30.1.104","172.30.1.205","TCP","66","49671 > 35222 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15139","6.828740","172.30.1.205","172.30.1.104","TCP","54","35222 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15140","6.829112","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15141","6.829411","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15142","6.829418","172.30.1.205","172.30.1.104","TCP","54","35222 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15143","6.831275","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15144","6.831657","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15145","6.831663","172.30.1.205","172.30.1.104","TCP","54","35222 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15146","6.833056","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15147","6.834701","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15148","6.834711","172.30.1.205","172.30.1.104","TCP","54","35222 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15149","6.835638","172.30.1.205","172.30.1.104","TCP","74","42588 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910062 TSecr=0 WS=128" "15150","6.835920","172.30.1.104","172.30.1.205","TCP","66","135 > 42588 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15151","6.835930","172.30.1.205","172.30.1.104","TCP","54","42588 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15152","6.836291","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15153","6.836567","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15154","6.836581","172.30.1.205","172.30.1.104","TCP","54","42588 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15155","6.838884","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15156","6.839269","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15157","6.839277","172.30.1.205","172.30.1.104","TCP","54","42588 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15158","6.841156","172.30.1.205","172.30.1.104","TCP","54","42588 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15159","6.841283","172.30.1.205","172.30.1.104","TCP","74","35226 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910067 TSecr=0 WS=128" "15160","6.841434","172.30.1.104","172.30.1.205","TCP","54","135 > 42588 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15161","6.841443","172.30.1.104","172.30.1.205","TCP","54","135 > 42588 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15162","6.841448","172.30.1.205","172.30.1.104","TCP","54","42588 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15163","6.841546","172.30.1.104","172.30.1.205","TCP","66","49671 > 35226 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15164","6.841558","172.30.1.205","172.30.1.104","TCP","54","35226 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15165","6.841908","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15166","6.842171","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15167","6.842180","172.30.1.205","172.30.1.104","TCP","54","35226 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15168","6.844076","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15169","6.844424","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15170","6.844430","172.30.1.205","172.30.1.104","TCP","54","35226 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15171","6.845817","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15172","6.847414","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15173","6.847425","172.30.1.205","172.30.1.104","TCP","54","35226 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15174","6.848403","172.30.1.205","172.30.1.104","TCP","74","42592 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910074 TSecr=0 WS=128" "15175","6.848698","172.30.1.104","172.30.1.205","TCP","66","135 > 42592 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15176","6.848709","172.30.1.205","172.30.1.104","TCP","54","42592 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15177","6.849088","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15178","6.849362","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15179","6.849371","172.30.1.205","172.30.1.104","TCP","54","42592 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15180","6.851576","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15181","6.851954","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15182","6.851960","172.30.1.205","172.30.1.104","TCP","54","42592 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15183","6.853809","172.30.1.205","172.30.1.104","TCP","54","42592 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15184","6.853922","172.30.1.205","172.30.1.104","TCP","74","35230 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910080 TSecr=0 WS=128" "15185","6.854073","172.30.1.104","172.30.1.205","TCP","54","135 > 42592 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15186","6.854083","172.30.1.104","172.30.1.205","TCP","54","135 > 42592 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15187","6.854088","172.30.1.205","172.30.1.104","TCP","54","42592 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15188","6.854235","172.30.1.104","172.30.1.205","TCP","66","49671 > 35230 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15189","6.854244","172.30.1.205","172.30.1.104","TCP","54","35230 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15190","6.854594","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15191","6.854883","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15192","6.854892","172.30.1.205","172.30.1.104","TCP","54","35230 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15193","6.856802","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15194","6.857160","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15195","6.857167","172.30.1.205","172.30.1.104","TCP","54","35230 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15196","6.858531","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15197","6.860151","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15198","6.860161","172.30.1.205","172.30.1.104","TCP","54","35230 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15199","6.861156","172.30.1.205","172.30.1.104","TCP","74","42596 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910087 TSecr=0 WS=128" "15200","6.861444","172.30.1.104","172.30.1.205","TCP","66","135 > 42596 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15201","6.861455","172.30.1.205","172.30.1.104","TCP","54","42596 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15202","6.861806","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15203","6.862082","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15204","6.862091","172.30.1.205","172.30.1.104","TCP","54","42596 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15205","6.864315","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15206","6.864693","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15207","6.864700","172.30.1.205","172.30.1.104","TCP","54","42596 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15208","6.866550","172.30.1.205","172.30.1.104","TCP","54","42596 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15209","6.866676","172.30.1.205","172.30.1.104","TCP","74","35234 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910093 TSecr=0 WS=128" "15210","6.866804","172.30.1.104","172.30.1.205","TCP","54","135 > 42596 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15211","6.866815","172.30.1.104","172.30.1.205","TCP","54","135 > 42596 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15212","6.866821","172.30.1.205","172.30.1.104","TCP","54","42596 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15213","6.866962","172.30.1.104","172.30.1.205","TCP","66","49671 > 35234 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15214","6.866970","172.30.1.205","172.30.1.104","TCP","54","35234 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15215","6.867315","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15216","6.867586","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15217","6.867595","172.30.1.205","172.30.1.104","TCP","54","35234 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15218","6.869521","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15219","6.871126","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15220","6.871139","172.30.1.205","172.30.1.104","TCP","54","35234 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15221","6.872596","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15222","6.874223","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15223","6.874235","172.30.1.205","172.30.1.104","TCP","54","35234 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15224","6.875250","172.30.1.205","172.30.1.104","TCP","74","42600 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910101 TSecr=0 WS=128" "15225","6.875536","172.30.1.104","172.30.1.205","TCP","66","135 > 42600 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15226","6.875548","172.30.1.205","172.30.1.104","TCP","54","42600 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15227","6.875910","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15228","6.876324","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15229","6.876333","172.30.1.205","172.30.1.104","TCP","54","42600 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15230","6.878578","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15231","6.878958","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15232","6.878965","172.30.1.205","172.30.1.104","TCP","54","42600 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15233","6.880809","172.30.1.205","172.30.1.104","TCP","54","42600 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15234","6.880927","172.30.1.205","172.30.1.104","TCP","74","35238 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910107 TSecr=0 WS=128" "15235","6.881095","172.30.1.104","172.30.1.205","TCP","54","135 > 42600 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15236","6.881106","172.30.1.104","172.30.1.205","TCP","54","135 > 42600 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15237","6.881112","172.30.1.205","172.30.1.104","TCP","54","42600 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15238","6.881196","172.30.1.104","172.30.1.205","TCP","66","49671 > 35238 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15239","6.881204","172.30.1.205","172.30.1.104","TCP","54","35238 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15240","6.881550","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15241","6.881854","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15242","6.881861","172.30.1.205","172.30.1.104","TCP","54","35238 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15243","6.883721","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15244","6.884067","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15245","6.884074","172.30.1.205","172.30.1.104","TCP","54","35238 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15246","6.885465","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15247","6.887132","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15248","6.887142","172.30.1.205","172.30.1.104","TCP","54","35238 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15249","6.888096","172.30.1.205","172.30.1.104","TCP","74","42604 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910114 TSecr=0 WS=128" "15250","6.888374","172.30.1.104","172.30.1.205","TCP","66","135 > 42604 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15251","6.888384","172.30.1.205","172.30.1.104","TCP","54","42604 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15252","6.888734","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15253","6.888999","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15254","6.889009","172.30.1.205","172.30.1.104","TCP","54","42604 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15255","6.891204","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15256","6.891571","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15257","6.891578","172.30.1.205","172.30.1.104","TCP","54","42604 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15258","6.893421","172.30.1.205","172.30.1.104","TCP","54","42604 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15259","6.893536","172.30.1.205","172.30.1.104","TCP","74","35242 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910119 TSecr=0 WS=128" "15260","6.893678","172.30.1.104","172.30.1.205","TCP","54","135 > 42604 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15261","6.893714","172.30.1.104","172.30.1.205","TCP","54","135 > 42604 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15262","6.893720","172.30.1.205","172.30.1.104","TCP","54","42604 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15263","6.893824","172.30.1.104","172.30.1.205","TCP","66","49671 > 35242 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15264","6.893832","172.30.1.205","172.30.1.104","TCP","54","35242 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15265","6.894179","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15266","6.894455","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15267","6.894464","172.30.1.205","172.30.1.104","TCP","54","35242 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15268","6.896347","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15269","6.896731","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15270","6.896741","172.30.1.205","172.30.1.104","TCP","54","35242 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15271","6.898199","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15272","6.900258","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15273","6.900270","172.30.1.205","172.30.1.104","TCP","54","35242 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15274","6.901287","172.30.1.205","172.30.1.104","TCP","74","42608 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910127 TSecr=0 WS=128" "15275","6.901591","172.30.1.104","172.30.1.205","TCP","66","135 > 42608 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15276","6.901602","172.30.1.205","172.30.1.104","TCP","54","42608 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15277","6.901952","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15278","6.902328","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15279","6.902337","172.30.1.205","172.30.1.104","TCP","54","42608 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15280","6.904532","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15281","6.904907","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15282","6.904914","172.30.1.205","172.30.1.104","TCP","54","42608 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15283","6.906730","172.30.1.205","172.30.1.104","TCP","54","42608 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15284","6.906842","172.30.1.205","172.30.1.104","TCP","74","35246 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910133 TSecr=0 WS=128" "15285","6.906991","172.30.1.104","172.30.1.205","TCP","54","135 > 42608 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15286","6.907000","172.30.1.104","172.30.1.205","TCP","54","135 > 42608 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15287","6.907006","172.30.1.205","172.30.1.104","TCP","54","42608 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15288","6.907078","172.30.1.104","172.30.1.205","TCP","66","49671 > 35246 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15289","6.907087","172.30.1.205","172.30.1.104","TCP","54","35246 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15290","6.907432","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15291","6.907707","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15292","6.907716","172.30.1.205","172.30.1.104","TCP","54","35246 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15293","6.909626","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15294","6.910007","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15295","6.910013","172.30.1.205","172.30.1.104","TCP","54","35246 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15296","6.911349","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15297","6.913432","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15298","6.913441","172.30.1.205","172.30.1.104","TCP","54","35246 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15299","6.914385","172.30.1.205","172.30.1.104","TCP","74","42612 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910140 TSecr=0 WS=128" "15300","6.914698","172.30.1.104","172.30.1.205","TCP","66","135 > 42612 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15301","6.914709","172.30.1.205","172.30.1.104","TCP","54","42612 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15302","6.915058","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15303","6.915350","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15304","6.915359","172.30.1.205","172.30.1.104","TCP","54","42612 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15305","6.917568","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15306","6.918034","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15307","6.918041","172.30.1.205","172.30.1.104","TCP","54","42612 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15308","6.919867","172.30.1.205","172.30.1.104","TCP","54","42612 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15309","6.919976","172.30.1.205","172.30.1.104","TCP","74","35250 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910146 TSecr=0 WS=128" "15310","6.920119","172.30.1.104","172.30.1.205","TCP","54","135 > 42612 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15311","6.920170","172.30.1.104","172.30.1.205","TCP","54","135 > 42612 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15312","6.920175","172.30.1.205","172.30.1.104","TCP","54","42612 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15313","6.920240","172.30.1.104","172.30.1.205","TCP","66","49671 > 35250 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15314","6.920248","172.30.1.205","172.30.1.104","TCP","54","35250 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15315","6.920619","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15316","6.920906","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15317","6.920915","172.30.1.205","172.30.1.104","TCP","54","35250 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15318","6.922784","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15319","6.923132","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15320","6.923138","172.30.1.205","172.30.1.104","TCP","54","35250 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15321","6.924523","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15322","6.926133","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15323","6.926142","172.30.1.205","172.30.1.104","TCP","54","35250 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15324","6.927085","172.30.1.205","172.30.1.104","TCP","74","42616 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910153 TSecr=0 WS=128" "15325","6.927369","172.30.1.104","172.30.1.205","TCP","66","135 > 42616 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15326","6.927379","172.30.1.205","172.30.1.104","TCP","54","42616 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15327","6.927739","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15328","6.928039","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15329","6.928052","172.30.1.205","172.30.1.104","TCP","54","42616 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15330","6.930330","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15331","6.930730","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15332","6.930737","172.30.1.205","172.30.1.104","TCP","54","42616 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15333","6.931590","172.30.1.205","172.30.1.104","TCP","54","35210 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "15334","6.931639","172.30.1.205","172.30.1.104","TCP","54","35214 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "15335","6.931670","172.30.1.205","172.30.1.104","TCP","54","35218 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "15336","6.931703","172.30.1.205","172.30.1.104","TCP","54","35222 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "15337","6.931736","172.30.1.205","172.30.1.104","TCP","54","35226 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "15338","6.931763","172.30.1.205","172.30.1.104","TCP","54","35230 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "15339","6.931790","172.30.1.205","172.30.1.104","TCP","54","35234 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "15340","6.931817","172.30.1.205","172.30.1.104","TCP","54","35238 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "15341","6.931839","172.30.1.205","172.30.1.104","TCP","54","35242 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "15342","6.931859","172.30.1.104","172.30.1.205","TCP","54","49671 > 35210 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15343","6.931888","172.30.1.205","172.30.1.104","TCP","54","35246 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "15344","6.931912","172.30.1.205","172.30.1.104","TCP","54","35250 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "15345","6.931933","172.30.1.104","172.30.1.205","TCP","54","49671 > 35214 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15346","6.931957","172.30.1.104","172.30.1.205","TCP","54","49671 > 35218 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15347","6.931984","172.30.1.104","172.30.1.205","TCP","54","49671 > 35210 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15348","6.931991","172.30.1.205","172.30.1.104","TCP","54","35210 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15349","6.932031","172.30.1.205","172.30.1.104","TCP","54","35206 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "15350","6.932108","172.30.1.104","172.30.1.205","TCP","54","49671 > 35222 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15351","6.932130","172.30.1.104","172.30.1.205","TCP","54","49671 > 35226 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15352","6.932157","172.30.1.104","172.30.1.205","TCP","54","49671 > 35214 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15353","6.932163","172.30.1.205","172.30.1.104","TCP","54","35214 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15354","6.932184","172.30.1.104","172.30.1.205","TCP","54","49671 > 35226 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15355","6.932187","172.30.1.205","172.30.1.104","TCP","54","35226 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15356","6.932211","172.30.1.104","172.30.1.205","TCP","54","49671 > 35218 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15357","6.932214","172.30.1.205","172.30.1.104","TCP","54","35218 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15358","6.932237","172.30.1.104","172.30.1.205","TCP","54","49671 > 35222 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15359","6.932240","172.30.1.205","172.30.1.104","TCP","54","35222 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15360","6.932273","172.30.1.104","172.30.1.205","TCP","54","49671 > 35230 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15361","6.932300","172.30.1.104","172.30.1.205","TCP","54","49671 > 35234 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15362","6.932327","172.30.1.104","172.30.1.205","TCP","54","49671 > 35238 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15363","6.932353","172.30.1.104","172.30.1.205","TCP","54","49671 > 35230 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15364","6.932358","172.30.1.205","172.30.1.104","TCP","54","35230 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15365","6.932379","172.30.1.104","172.30.1.205","TCP","54","49671 > 35242 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15366","6.932406","172.30.1.104","172.30.1.205","TCP","54","49671 > 35242 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15367","6.932410","172.30.1.205","172.30.1.104","TCP","54","35242 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15368","6.932432","172.30.1.104","172.30.1.205","TCP","54","49671 > 35234 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15369","6.932435","172.30.1.205","172.30.1.104","TCP","54","35234 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15370","6.932470","172.30.1.104","172.30.1.205","TCP","54","49671 > 35238 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15371","6.932474","172.30.1.205","172.30.1.104","TCP","54","35238 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15372","6.932494","172.30.1.104","172.30.1.205","TCP","54","49671 > 35246 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15373","6.932515","172.30.1.104","172.30.1.205","TCP","54","49671 > 35250 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15374","6.932535","172.30.1.104","172.30.1.205","TCP","54","49671 > 35246 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15375","6.932540","172.30.1.205","172.30.1.104","TCP","54","35246 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15376","6.932555","172.30.1.104","172.30.1.205","TCP","54","49671 > 35250 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15377","6.932559","172.30.1.205","172.30.1.104","TCP","54","35250 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15378","6.932961","172.30.1.104","172.30.1.205","TCP","54","49671 > 35206 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15379","6.932980","172.30.1.104","172.30.1.205","TCP","54","49671 > 35206 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15380","6.932985","172.30.1.205","172.30.1.104","TCP","54","35206 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15381","6.933623","172.30.1.205","172.30.1.104","TCP","54","42616 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15382","6.933754","172.30.1.205","172.30.1.104","TCP","74","35254 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910160 TSecr=0 WS=128" "15383","6.933958","172.30.1.104","172.30.1.205","TCP","54","135 > 42616 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15384","6.933966","172.30.1.104","172.30.1.205","TCP","54","135 > 42616 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15385","6.933970","172.30.1.205","172.30.1.104","TCP","54","42616 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15386","6.934050","172.30.1.104","172.30.1.205","TCP","66","49671 > 35254 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15387","6.934058","172.30.1.205","172.30.1.104","TCP","54","35254 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15388","6.934416","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15389","6.934811","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15390","6.934820","172.30.1.205","172.30.1.104","TCP","54","35254 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15391","6.936683","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15392","6.937037","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15393","6.937043","172.30.1.205","172.30.1.104","TCP","54","35254 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15394","6.938410","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15395","6.940013","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15396","6.940022","172.30.1.205","172.30.1.104","TCP","54","35254 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15397","6.940993","172.30.1.205","172.30.1.104","TCP","74","42620 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910167 TSecr=0 WS=128" "15398","6.941286","172.30.1.104","172.30.1.205","TCP","66","135 > 42620 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15399","6.941297","172.30.1.205","172.30.1.104","TCP","54","42620 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15400","6.941651","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15401","6.941938","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15402","6.941947","172.30.1.205","172.30.1.104","TCP","54","42620 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15403","6.944125","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15404","6.944503","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15405","6.944510","172.30.1.205","172.30.1.104","TCP","54","42620 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15406","6.946341","172.30.1.205","172.30.1.104","TCP","54","42620 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15407","6.946456","172.30.1.205","172.30.1.104","TCP","74","35258 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910172 TSecr=0 WS=128" "15408","6.946613","172.30.1.104","172.30.1.205","TCP","54","135 > 42620 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15409","6.946624","172.30.1.104","172.30.1.205","TCP","54","135 > 42620 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15410","6.946630","172.30.1.205","172.30.1.104","TCP","54","42620 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15411","6.946742","172.30.1.104","172.30.1.205","TCP","66","49671 > 35258 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15412","6.946753","172.30.1.205","172.30.1.104","TCP","54","35258 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15413","6.947107","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15414","6.947391","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15415","6.947398","172.30.1.205","172.30.1.104","TCP","54","35258 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15416","6.949301","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15417","6.949660","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15418","6.949666","172.30.1.205","172.30.1.104","TCP","54","35258 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15419","6.951013","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15420","6.952603","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15421","6.952614","172.30.1.205","172.30.1.104","TCP","54","35258 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15422","6.953581","172.30.1.205","172.30.1.104","TCP","74","42624 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910180 TSecr=0 WS=128" "15423","6.953868","172.30.1.104","172.30.1.205","TCP","66","135 > 42624 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15424","6.953882","172.30.1.205","172.30.1.104","TCP","54","42624 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15425","6.954231","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15426","6.954497","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15427","6.954506","172.30.1.205","172.30.1.104","TCP","54","42624 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15428","6.956713","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15429","6.957080","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15430","6.957091","172.30.1.205","172.30.1.104","TCP","54","42624 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15431","6.958921","172.30.1.205","172.30.1.104","TCP","54","42624 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15432","6.959035","172.30.1.205","172.30.1.104","TCP","74","35262 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910185 TSecr=0 WS=128" "15433","6.959181","172.30.1.104","172.30.1.205","TCP","54","135 > 42624 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15434","6.959195","172.30.1.104","172.30.1.205","TCP","54","135 > 42624 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15435","6.959201","172.30.1.205","172.30.1.104","TCP","54","42624 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15436","6.959280","172.30.1.104","172.30.1.205","TCP","66","49671 > 35262 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15437","6.959289","172.30.1.205","172.30.1.104","TCP","54","35262 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15438","6.959636","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15439","6.959896","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15440","6.959904","172.30.1.205","172.30.1.104","TCP","54","35262 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15441","6.961828","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15442","6.964208","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15443","6.964215","172.30.1.205","172.30.1.104","TCP","54","35262 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15444","6.965616","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15445","6.967242","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15446","6.967251","172.30.1.205","172.30.1.104","TCP","54","35262 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15447","6.968192","172.30.1.205","172.30.1.104","TCP","74","42628 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910194 TSecr=0 WS=128" "15448","6.968513","172.30.1.104","172.30.1.205","TCP","66","135 > 42628 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15449","6.968524","172.30.1.205","172.30.1.104","TCP","54","42628 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15450","6.968902","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15451","6.969170","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15452","6.969179","172.30.1.205","172.30.1.104","TCP","54","42628 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15453","6.971376","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15454","6.971782","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15455","6.971791","172.30.1.205","172.30.1.104","TCP","54","42628 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15456","6.973712","172.30.1.205","172.30.1.104","TCP","54","42628 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15457","6.973841","172.30.1.205","172.30.1.104","TCP","74","35266 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910200 TSecr=0 WS=128" "15458","6.973971","172.30.1.104","172.30.1.205","TCP","54","135 > 42628 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15459","6.973983","172.30.1.104","172.30.1.205","TCP","54","135 > 42628 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15460","6.973989","172.30.1.205","172.30.1.104","TCP","54","42628 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15461","6.974112","172.30.1.104","172.30.1.205","TCP","66","49671 > 35266 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15462","6.974121","172.30.1.205","172.30.1.104","TCP","54","35266 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15463","6.974482","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15464","6.974790","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15465","6.974801","172.30.1.205","172.30.1.104","TCP","54","35266 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15466","6.976709","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15467","6.977065","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15468","6.977072","172.30.1.205","172.30.1.104","TCP","54","35266 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15469","6.978436","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15470","6.980061","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15471","6.980071","172.30.1.205","172.30.1.104","TCP","54","35266 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15472","6.981045","172.30.1.205","172.30.1.104","TCP","74","42632 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910207 TSecr=0 WS=128" "15473","6.981320","172.30.1.104","172.30.1.205","TCP","66","135 > 42632 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15474","6.981331","172.30.1.205","172.30.1.104","TCP","54","42632 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15475","6.981682","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15476","6.981973","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15477","6.981982","172.30.1.205","172.30.1.104","TCP","54","42632 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15478","6.984169","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15479","6.984539","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15480","6.984547","172.30.1.205","172.30.1.104","TCP","54","42632 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15481","6.986393","172.30.1.205","172.30.1.104","TCP","54","42632 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15482","6.986506","172.30.1.205","172.30.1.104","TCP","74","35270 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910212 TSecr=0 WS=128" "15483","6.986660","172.30.1.104","172.30.1.205","TCP","54","135 > 42632 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15484","6.986760","172.30.1.104","172.30.1.205","TCP","66","49671 > 35270 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15485","6.986770","172.30.1.205","172.30.1.104","TCP","54","35270 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15486","6.987075","172.30.1.104","172.30.1.205","TCP","54","135 > 42632 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15487","6.987082","172.30.1.205","172.30.1.104","TCP","54","42632 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15488","6.987145","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15489","6.987401","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15490","6.987410","172.30.1.205","172.30.1.104","TCP","54","35270 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15491","6.989339","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15492","6.989678","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15493","6.989685","172.30.1.205","172.30.1.104","TCP","54","35270 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15494","6.991038","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15495","6.992866","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15496","6.992883","172.30.1.205","172.30.1.104","TCP","54","35270 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15497","6.993840","172.30.1.205","172.30.1.104","TCP","74","42636 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910220 TSecr=0 WS=128" "15498","6.994146","172.30.1.104","172.30.1.205","TCP","66","135 > 42636 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15499","6.994156","172.30.1.205","172.30.1.104","TCP","54","42636 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15500","6.994513","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15501","6.994838","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15502","6.994847","172.30.1.205","172.30.1.104","TCP","54","42636 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15503","6.997054","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15504","6.997466","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15505","6.997473","172.30.1.205","172.30.1.104","TCP","54","42636 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15506","6.999327","172.30.1.205","172.30.1.104","TCP","54","42636 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15507","6.999450","172.30.1.205","172.30.1.104","TCP","74","35274 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910225 TSecr=0 WS=128" "15508","6.999619","172.30.1.104","172.30.1.205","TCP","54","135 > 42636 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15509","6.999658","172.30.1.104","172.30.1.205","TCP","54","135 > 42636 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15510","6.999663","172.30.1.205","172.30.1.104","TCP","54","42636 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15511","6.999743","172.30.1.104","172.30.1.205","TCP","66","49671 > 35274 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15512","6.999751","172.30.1.205","172.30.1.104","TCP","54","35274 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15513","7.000096","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15514","7.000399","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15515","7.000408","172.30.1.205","172.30.1.104","TCP","54","35274 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15516","7.002330","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15517","7.002686","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15518","7.002692","172.30.1.205","172.30.1.104","TCP","54","35274 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15519","7.004063","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15520","7.005699","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15521","7.005709","172.30.1.205","172.30.1.104","TCP","54","35274 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15522","7.006655","172.30.1.205","172.30.1.104","TCP","74","42640 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910233 TSecr=0 WS=128" "15523","7.006944","172.30.1.104","172.30.1.205","TCP","66","135 > 42640 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15524","7.006955","172.30.1.205","172.30.1.104","TCP","54","42640 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15525","7.007299","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15526","7.007655","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15527","7.007664","172.30.1.205","172.30.1.104","TCP","54","42640 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15528","7.009877","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15529","7.010253","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15530","7.010261","172.30.1.205","172.30.1.104","TCP","54","42640 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15531","7.012101","172.30.1.205","172.30.1.104","TCP","54","42640 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15532","7.012256","172.30.1.205","172.30.1.104","TCP","74","35278 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910238 TSecr=0 WS=128" "15533","7.012383","172.30.1.104","172.30.1.205","TCP","54","135 > 42640 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15534","7.012437","172.30.1.104","172.30.1.205","TCP","54","135 > 42640 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15535","7.012445","172.30.1.205","172.30.1.104","TCP","54","42640 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15536","7.012569","172.30.1.104","172.30.1.205","TCP","66","49671 > 35278 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15537","7.012578","172.30.1.205","172.30.1.104","TCP","54","35278 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15538","7.012965","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15539","7.013251","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15540","7.013261","172.30.1.205","172.30.1.104","TCP","54","35278 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15541","7.015155","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15542","7.015512","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15543","7.015517","172.30.1.205","172.30.1.104","TCP","54","35278 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15544","7.016912","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15545","7.018563","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15546","7.018578","172.30.1.205","172.30.1.104","TCP","54","35278 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15547","7.019660","172.30.1.205","172.30.1.104","TCP","74","42644 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910246 TSecr=0 WS=128" "15548","7.020001","172.30.1.104","172.30.1.205","TCP","66","135 > 42644 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15549","7.020022","172.30.1.205","172.30.1.104","TCP","54","42644 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15550","7.020405","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15551","7.020710","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15552","7.020722","172.30.1.205","172.30.1.104","TCP","54","42644 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15553","7.022992","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15554","7.023365","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15555","7.023372","172.30.1.205","172.30.1.104","TCP","54","42644 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15556","7.025218","172.30.1.205","172.30.1.104","TCP","54","42644 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15557","7.025338","172.30.1.205","172.30.1.104","TCP","74","35282 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910251 TSecr=0 WS=128" "15558","7.025489","172.30.1.104","172.30.1.205","TCP","54","135 > 42644 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15559","7.025514","172.30.1.104","172.30.1.205","TCP","54","135 > 42644 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15560","7.025521","172.30.1.205","172.30.1.104","TCP","54","42644 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15561","7.025630","172.30.1.104","172.30.1.205","TCP","66","49671 > 35282 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15562","7.025639","172.30.1.205","172.30.1.104","TCP","54","35282 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15563","7.025981","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15564","7.026307","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15565","7.026316","172.30.1.205","172.30.1.104","TCP","54","35282 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15566","7.028172","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15567","7.028506","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15568","7.028512","172.30.1.205","172.30.1.104","TCP","54","35282 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15569","7.029908","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15570","7.031459","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15571","7.031477","172.30.1.205","172.30.1.104","TCP","54","35282 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15572","7.032568","172.30.1.205","172.30.1.104","TCP","74","42648 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910258 TSecr=0 WS=128" "15573","7.032866","172.30.1.104","172.30.1.205","TCP","66","135 > 42648 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15574","7.032877","172.30.1.205","172.30.1.104","TCP","54","42648 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15575","7.033240","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15576","7.033527","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15577","7.033545","172.30.1.205","172.30.1.104","TCP","54","42648 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15578","7.035960","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15579","7.036304","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15580","7.036311","172.30.1.205","172.30.1.104","TCP","54","42648 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15581","7.038133","172.30.1.205","172.30.1.104","TCP","54","42648 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15582","7.038243","172.30.1.205","172.30.1.104","TCP","74","35286 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910264 TSecr=0 WS=128" "15583","7.038398","172.30.1.104","172.30.1.205","TCP","54","135 > 42648 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15584","7.038436","172.30.1.104","172.30.1.205","TCP","54","135 > 42648 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15585","7.038441","172.30.1.205","172.30.1.104","TCP","54","42648 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15586","7.038527","172.30.1.104","172.30.1.205","TCP","66","49671 > 35286 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15587","7.038536","172.30.1.205","172.30.1.104","TCP","54","35286 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15588","7.038886","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15589","7.039178","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15590","7.039187","172.30.1.205","172.30.1.104","TCP","54","35286 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15591","7.041086","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15592","7.041453","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15593","7.041461","172.30.1.205","172.30.1.104","TCP","54","35286 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15594","7.042816","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15595","7.044454","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15596","7.044465","172.30.1.205","172.30.1.104","TCP","54","35286 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15597","7.045444","172.30.1.205","172.30.1.104","TCP","74","42652 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910271 TSecr=0 WS=128" "15598","7.045763","172.30.1.104","172.30.1.205","TCP","66","135 > 42652 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15599","7.045778","172.30.1.205","172.30.1.104","TCP","54","42652 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15600","7.046164","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15601","7.046435","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15602","7.046445","172.30.1.205","172.30.1.104","TCP","54","42652 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15603","7.048678","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15604","7.049067","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15605","7.049074","172.30.1.205","172.30.1.104","TCP","54","42652 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15606","7.050893","172.30.1.205","172.30.1.104","TCP","54","42652 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15607","7.051009","172.30.1.205","172.30.1.104","TCP","74","35290 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910277 TSecr=0 WS=128" "15608","7.051174","172.30.1.104","172.30.1.205","TCP","54","135 > 42652 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15609","7.051184","172.30.1.104","172.30.1.205","TCP","54","135 > 42652 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15610","7.051190","172.30.1.205","172.30.1.104","TCP","54","42652 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15611","7.051272","172.30.1.104","172.30.1.205","TCP","66","49671 > 35290 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15612","7.051281","172.30.1.205","172.30.1.104","TCP","54","35290 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15613","7.051622","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15614","7.051957","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15615","7.051965","172.30.1.205","172.30.1.104","TCP","54","35290 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15616","7.053847","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15617","7.054228","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15618","7.054232","172.30.1.205","172.30.1.104","TCP","54","35290 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15619","7.055567","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15620","7.057183","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15621","7.057202","172.30.1.205","172.30.1.104","TCP","54","35290 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15622","7.058249","172.30.1.205","172.30.1.104","TCP","74","42656 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910284 TSecr=0 WS=128" "15623","7.058571","172.30.1.104","172.30.1.205","TCP","66","135 > 42656 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15624","7.058592","172.30.1.205","172.30.1.104","TCP","54","42656 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15625","7.059175","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15626","7.059466","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15627","7.059475","172.30.1.205","172.30.1.104","TCP","54","42656 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15628","7.061697","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15629","7.062101","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15630","7.062108","172.30.1.205","172.30.1.104","TCP","54","42656 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15631","7.063929","172.30.1.205","172.30.1.104","TCP","54","42656 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15632","7.064038","172.30.1.205","172.30.1.104","TCP","74","35294 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910290 TSecr=0 WS=128" "15633","7.064264","172.30.1.104","172.30.1.205","TCP","54","135 > 42656 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15634","7.064274","172.30.1.104","172.30.1.205","TCP","54","135 > 42656 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15635","7.064279","172.30.1.205","172.30.1.104","TCP","54","42656 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15636","7.064389","172.30.1.104","172.30.1.205","TCP","66","49671 > 35294 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15637","7.064397","172.30.1.205","172.30.1.104","TCP","54","35294 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15638","7.064743","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15639","7.065035","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15640","7.065044","172.30.1.205","172.30.1.104","TCP","54","35294 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15641","7.066903","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15642","7.067265","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15643","7.067271","172.30.1.205","172.30.1.104","TCP","54","35294 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15644","7.068624","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15645","7.070296","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15646","7.070305","172.30.1.205","172.30.1.104","TCP","54","35294 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15647","7.071238","172.30.1.205","172.30.1.104","TCP","74","42660 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910297 TSecr=0 WS=128" "15648","7.071538","172.30.1.104","172.30.1.205","TCP","66","135 > 42660 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15649","7.071559","172.30.1.205","172.30.1.104","TCP","54","42660 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15650","7.072126","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15651","7.072412","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15652","7.072421","172.30.1.205","172.30.1.104","TCP","54","42660 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15653","7.074623","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15654","7.075051","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15655","7.075058","172.30.1.205","172.30.1.104","TCP","54","42660 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15656","7.076866","172.30.1.205","172.30.1.104","TCP","54","42660 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15657","7.076974","172.30.1.205","172.30.1.104","TCP","74","35298 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910303 TSecr=0 WS=128" "15658","7.077129","172.30.1.104","172.30.1.205","TCP","54","135 > 42660 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15659","7.077191","172.30.1.104","172.30.1.205","TCP","54","135 > 42660 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15660","7.077197","172.30.1.205","172.30.1.104","TCP","54","42660 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15661","7.077270","172.30.1.104","172.30.1.205","TCP","66","49671 > 35298 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15662","7.077277","172.30.1.205","172.30.1.104","TCP","54","35298 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15663","7.077614","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15664","7.077899","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15665","7.077907","172.30.1.205","172.30.1.104","TCP","54","35298 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15666","7.079762","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15667","7.080118","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15668","7.080124","172.30.1.205","172.30.1.104","TCP","54","35298 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15669","7.081488","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15670","7.083203","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15671","7.083212","172.30.1.205","172.30.1.104","TCP","54","35298 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15672","7.084137","172.30.1.205","172.30.1.104","TCP","74","42664 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910310 TSecr=0 WS=128" "15673","7.084478","172.30.1.104","172.30.1.205","TCP","66","135 > 42664 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15674","7.084502","172.30.1.205","172.30.1.104","TCP","54","42664 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15675","7.085078","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15676","7.085366","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15677","7.085375","172.30.1.205","172.30.1.104","TCP","54","42664 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15678","7.087560","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15679","7.087951","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15680","7.087958","172.30.1.205","172.30.1.104","TCP","54","42664 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15681","7.088826","172.30.1.205","172.30.1.104","TCP","54","35254 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "15682","7.088874","172.30.1.205","172.30.1.104","TCP","54","35258 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "15683","7.088911","172.30.1.205","172.30.1.104","TCP","54","35262 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "15684","7.088943","172.30.1.205","172.30.1.104","TCP","54","35266 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "15685","7.088975","172.30.1.205","172.30.1.104","TCP","54","35270 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "15686","7.089002","172.30.1.205","172.30.1.104","TCP","54","35274 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "15687","7.089034","172.30.1.205","172.30.1.104","TCP","54","35278 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "15688","7.089067","172.30.1.205","172.30.1.104","TCP","54","35282 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "15689","7.089099","172.30.1.205","172.30.1.104","TCP","54","35286 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "15690","7.089126","172.30.1.205","172.30.1.104","TCP","54","35290 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "15691","7.089157","172.30.1.205","172.30.1.104","TCP","54","35294 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "15692","7.089184","172.30.1.205","172.30.1.104","TCP","54","35298 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "15693","7.089221","172.30.1.104","172.30.1.205","TCP","54","49671 > 35254 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15694","7.089240","172.30.1.104","172.30.1.205","TCP","54","49671 > 35258 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15695","7.089259","172.30.1.104","172.30.1.205","TCP","54","49671 > 35262 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15696","7.089280","172.30.1.104","172.30.1.205","TCP","54","49671 > 35258 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15697","7.089286","172.30.1.205","172.30.1.104","TCP","54","35258 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15698","7.089300","172.30.1.104","172.30.1.205","TCP","54","49671 > 35266 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15699","7.089320","172.30.1.104","172.30.1.205","TCP","54","49671 > 35270 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15700","7.089340","172.30.1.104","172.30.1.205","TCP","54","49671 > 35254 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15701","7.089344","172.30.1.205","172.30.1.104","TCP","54","35254 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15702","7.089407","172.30.1.104","172.30.1.205","TCP","54","49671 > 35274 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15703","7.089628","172.30.1.104","172.30.1.205","TCP","54","49671 > 35278 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15704","7.089646","172.30.1.104","172.30.1.205","TCP","54","49671 > 35278 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15705","7.089652","172.30.1.205","172.30.1.104","TCP","54","35278 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15706","7.089667","172.30.1.104","172.30.1.205","TCP","54","49671 > 35274 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15707","7.089669","172.30.1.205","172.30.1.104","TCP","54","35274 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15708","7.089690","172.30.1.104","172.30.1.205","TCP","54","49671 > 35270 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15709","7.089693","172.30.1.205","172.30.1.104","TCP","54","35270 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15710","7.089710","172.30.1.104","172.30.1.205","TCP","54","49671 > 35266 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15711","7.089713","172.30.1.205","172.30.1.104","TCP","54","35266 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15712","7.089731","172.30.1.104","172.30.1.205","TCP","54","49671 > 35262 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15713","7.089733","172.30.1.205","172.30.1.104","TCP","54","35262 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15714","7.089752","172.30.1.104","172.30.1.205","TCP","54","49671 > 35282 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15715","7.089771","172.30.1.104","172.30.1.205","TCP","54","49671 > 35286 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15716","7.089791","172.30.1.104","172.30.1.205","TCP","54","49671 > 35282 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15717","7.089794","172.30.1.205","172.30.1.104","TCP","54","35282 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15718","7.089811","172.30.1.104","172.30.1.205","TCP","54","49671 > 35290 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15719","7.089831","172.30.1.104","172.30.1.205","TCP","54","49671 > 35294 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15720","7.089852","172.30.1.104","172.30.1.205","TCP","54","49671 > 35298 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15721","7.089873","172.30.1.104","172.30.1.205","TCP","54","49671 > 35294 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15722","7.089876","172.30.1.205","172.30.1.104","TCP","54","35294 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15723","7.089893","172.30.1.104","172.30.1.205","TCP","54","49671 > 35298 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15724","7.089896","172.30.1.205","172.30.1.104","TCP","54","35298 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15725","7.089912","172.30.1.104","172.30.1.205","TCP","54","49671 > 35286 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15726","7.089915","172.30.1.205","172.30.1.104","TCP","54","35286 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15727","7.089933","172.30.1.104","172.30.1.205","TCP","54","49671 > 35290 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "15728","7.089936","172.30.1.205","172.30.1.104","TCP","54","35290 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "15729","7.090828","172.30.1.205","172.30.1.104","TCP","54","42664 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15730","7.090937","172.30.1.205","172.30.1.104","TCP","74","35302 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910317 TSecr=0 WS=128" "15731","7.091079","172.30.1.104","172.30.1.205","TCP","54","135 > 42664 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15732","7.091099","172.30.1.104","172.30.1.205","TCP","54","135 > 42664 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15733","7.091104","172.30.1.205","172.30.1.104","TCP","54","42664 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15734","7.091227","172.30.1.104","172.30.1.205","TCP","66","49671 > 35302 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15735","7.091235","172.30.1.205","172.30.1.104","TCP","54","35302 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15736","7.091596","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15737","7.091875","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15738","7.091883","172.30.1.205","172.30.1.104","TCP","54","35302 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15739","7.093817","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15740","7.094160","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15741","7.094166","172.30.1.205","172.30.1.104","TCP","54","35302 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15742","7.095505","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15743","7.097252","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15744","7.097261","172.30.1.205","172.30.1.104","TCP","54","35302 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15745","7.098189","172.30.1.205","172.30.1.104","TCP","74","42668 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910324 TSecr=0 WS=128" "15746","7.098489","172.30.1.104","172.30.1.205","TCP","66","135 > 42668 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15747","7.098499","172.30.1.205","172.30.1.104","TCP","54","42668 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15748","7.098844","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15749","7.099129","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15750","7.099137","172.30.1.205","172.30.1.104","TCP","54","42668 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15751","7.101346","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15752","7.101769","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15753","7.101775","172.30.1.205","172.30.1.104","TCP","54","42668 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15754","7.103576","172.30.1.205","172.30.1.104","TCP","54","42668 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15755","7.103687","172.30.1.205","172.30.1.104","TCP","74","35306 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910330 TSecr=0 WS=128" "15756","7.103841","172.30.1.104","172.30.1.205","TCP","54","135 > 42668 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15757","7.103862","172.30.1.104","172.30.1.205","TCP","54","135 > 42668 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15758","7.103867","172.30.1.205","172.30.1.104","TCP","54","42668 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15759","7.103948","172.30.1.104","172.30.1.205","TCP","66","49671 > 35306 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15760","7.103956","172.30.1.205","172.30.1.104","TCP","54","35306 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15761","7.104295","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15762","7.104573","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15763","7.104579","172.30.1.205","172.30.1.104","TCP","54","35306 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15764","7.106447","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15765","7.107872","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15766","7.107879","172.30.1.205","172.30.1.104","TCP","54","35306 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15767","7.109240","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15768","7.110975","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15769","7.110986","172.30.1.205","172.30.1.104","TCP","54","35306 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15770","7.111916","172.30.1.205","172.30.1.104","TCP","74","42672 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910338 TSecr=0 WS=128" "15771","7.112225","172.30.1.104","172.30.1.205","TCP","66","135 > 42672 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15772","7.112236","172.30.1.205","172.30.1.104","TCP","54","42672 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15773","7.112581","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15774","7.112867","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15775","7.112876","172.30.1.205","172.30.1.104","TCP","54","42672 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15776","7.115064","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15777","7.115463","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15778","7.115470","172.30.1.205","172.30.1.104","TCP","54","42672 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15779","7.117300","172.30.1.205","172.30.1.104","TCP","54","42672 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15780","7.117408","172.30.1.205","172.30.1.104","TCP","74","35310 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910343 TSecr=0 WS=128" "15781","7.117583","172.30.1.104","172.30.1.205","TCP","54","135 > 42672 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15782","7.117619","172.30.1.104","172.30.1.205","TCP","54","135 > 42672 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15783","7.117625","172.30.1.205","172.30.1.104","TCP","54","42672 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15784","7.117707","172.30.1.104","172.30.1.205","TCP","66","49671 > 35310 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15785","7.117715","172.30.1.205","172.30.1.104","TCP","54","35310 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15786","7.118054","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15787","7.118350","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15788","7.118357","172.30.1.205","172.30.1.104","TCP","54","35310 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15789","7.120209","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15790","7.120589","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15791","7.120600","172.30.1.205","172.30.1.104","TCP","54","35310 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15792","7.122101","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15793","7.123767","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15794","7.123776","172.30.1.205","172.30.1.104","TCP","54","35310 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15795","7.124697","172.30.1.205","172.30.1.104","TCP","74","42676 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910351 TSecr=0 WS=128" "15796","7.125010","172.30.1.104","172.30.1.205","TCP","66","135 > 42676 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15797","7.125020","172.30.1.205","172.30.1.104","TCP","54","42676 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15798","7.125373","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15799","7.125665","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15800","7.125674","172.30.1.205","172.30.1.104","TCP","54","42676 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15801","7.127849","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15802","7.128246","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15803","7.128252","172.30.1.205","172.30.1.104","TCP","54","42676 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15804","7.130086","172.30.1.205","172.30.1.104","TCP","54","42676 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15805","7.130195","172.30.1.205","172.30.1.104","TCP","74","35314 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910356 TSecr=0 WS=128" "15806","7.130349","172.30.1.104","172.30.1.205","TCP","54","135 > 42676 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15807","7.130380","172.30.1.104","172.30.1.205","TCP","54","135 > 42676 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15808","7.130385","172.30.1.205","172.30.1.104","TCP","54","42676 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15809","7.130458","172.30.1.104","172.30.1.205","TCP","66","49671 > 35314 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15810","7.130466","172.30.1.205","172.30.1.104","TCP","54","35314 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15811","7.130810","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15812","7.131112","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15813","7.131122","172.30.1.205","172.30.1.104","TCP","54","35314 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15814","7.133053","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15815","7.133448","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15816","7.133454","172.30.1.205","172.30.1.104","TCP","54","35314 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15817","7.134801","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15818","7.136492","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15819","7.136501","172.30.1.205","172.30.1.104","TCP","54","35314 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15820","7.137449","172.30.1.205","172.30.1.104","TCP","74","42680 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910363 TSecr=0 WS=128" "15821","7.137734","172.30.1.104","172.30.1.205","TCP","66","135 > 42680 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15822","7.137744","172.30.1.205","172.30.1.104","TCP","54","42680 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15823","7.138086","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15824","7.138372","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15825","7.138380","172.30.1.205","172.30.1.104","TCP","54","42680 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15826","7.140532","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15827","7.140911","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15828","7.140918","172.30.1.205","172.30.1.104","TCP","54","42680 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15829","7.142722","172.30.1.205","172.30.1.104","TCP","54","42680 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15830","7.142832","172.30.1.205","172.30.1.104","TCP","74","35318 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910369 TSecr=0 WS=128" "15831","7.143001","172.30.1.104","172.30.1.205","TCP","54","135 > 42680 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15832","7.143022","172.30.1.104","172.30.1.205","TCP","54","135 > 42680 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15833","7.143027","172.30.1.205","172.30.1.104","TCP","54","42680 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15834","7.143108","172.30.1.104","172.30.1.205","TCP","66","49671 > 35318 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15835","7.143116","172.30.1.205","172.30.1.104","TCP","54","35318 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15836","7.143457","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15837","7.143766","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15838","7.143775","172.30.1.205","172.30.1.104","TCP","54","35318 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15839","7.145673","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15840","7.146026","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15841","7.146031","172.30.1.205","172.30.1.104","TCP","54","35318 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15842","7.147363","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15843","7.149057","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15844","7.149066","172.30.1.205","172.30.1.104","TCP","54","35318 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15845","7.150002","172.30.1.205","172.30.1.104","TCP","74","42684 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910376 TSecr=0 WS=128" "15846","7.150310","172.30.1.104","172.30.1.205","TCP","66","135 > 42684 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15847","7.150321","172.30.1.205","172.30.1.104","TCP","54","42684 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15848","7.150667","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15849","7.150943","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15850","7.150952","172.30.1.205","172.30.1.104","TCP","54","42684 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15851","7.153157","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15852","7.153535","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15853","7.153547","172.30.1.205","172.30.1.104","TCP","54","42684 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15854","7.155602","172.30.1.205","172.30.1.104","TCP","54","42684 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15855","7.155714","172.30.1.205","172.30.1.104","TCP","74","35322 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910382 TSecr=0 WS=128" "15856","7.155854","172.30.1.104","172.30.1.205","TCP","54","135 > 42684 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15857","7.155875","172.30.1.104","172.30.1.205","TCP","54","135 > 42684 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15858","7.155881","172.30.1.205","172.30.1.104","TCP","54","42684 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15859","7.155987","172.30.1.104","172.30.1.205","TCP","66","49671 > 35322 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15860","7.155994","172.30.1.205","172.30.1.104","TCP","54","35322 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15861","7.156340","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15862","7.156606","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15863","7.156614","172.30.1.205","172.30.1.104","TCP","54","35322 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15864","7.158585","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15865","7.158965","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15866","7.158971","172.30.1.205","172.30.1.104","TCP","54","35322 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15867","7.160316","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15868","7.161952","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15869","7.161961","172.30.1.205","172.30.1.104","TCP","54","35322 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15870","7.162896","172.30.1.205","172.30.1.104","TCP","74","42688 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910389 TSecr=0 WS=128" "15871","7.163177","172.30.1.104","172.30.1.205","TCP","66","135 > 42688 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15872","7.163187","172.30.1.205","172.30.1.104","TCP","54","42688 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15873","7.163530","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15874","7.163789","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15875","7.163798","172.30.1.205","172.30.1.104","TCP","54","42688 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15876","7.166002","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15877","7.166379","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15878","7.166385","172.30.1.205","172.30.1.104","TCP","54","42688 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15879","7.168190","172.30.1.205","172.30.1.104","TCP","54","42688 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15880","7.168297","172.30.1.205","172.30.1.104","TCP","74","35326 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910394 TSecr=0 WS=128" "15881","7.168437","172.30.1.104","172.30.1.205","TCP","54","135 > 42688 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15882","7.168452","172.30.1.104","172.30.1.205","TCP","54","135 > 42688 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15883","7.168457","172.30.1.205","172.30.1.104","TCP","54","42688 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15884","7.168551","172.30.1.104","172.30.1.205","TCP","66","49671 > 35326 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15885","7.168560","172.30.1.205","172.30.1.104","TCP","54","35326 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15886","7.168931","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15887","7.169771","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15888","7.169780","172.30.1.205","172.30.1.104","TCP","54","35326 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15889","7.171653","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15890","7.172008","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15891","7.172014","172.30.1.205","172.30.1.104","TCP","54","35326 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15892","7.173394","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15893","7.175060","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15894","7.175070","172.30.1.205","172.30.1.104","TCP","54","35326 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15895","7.176006","172.30.1.205","172.30.1.104","TCP","74","42692 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910402 TSecr=0 WS=128" "15896","7.176335","172.30.1.104","172.30.1.205","TCP","66","135 > 42692 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15897","7.176345","172.30.1.205","172.30.1.104","TCP","54","42692 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15898","7.176690","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15899","7.176994","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15900","7.177003","172.30.1.205","172.30.1.104","TCP","54","42692 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15901","7.179185","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15902","7.179573","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15903","7.179579","172.30.1.205","172.30.1.104","TCP","54","42692 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15904","7.181397","172.30.1.205","172.30.1.104","TCP","54","42692 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15905","7.181508","172.30.1.205","172.30.1.104","TCP","74","35330 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910407 TSecr=0 WS=128" "15906","7.181660","172.30.1.104","172.30.1.205","TCP","54","135 > 42692 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15907","7.181705","172.30.1.104","172.30.1.205","TCP","54","135 > 42692 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15908","7.181711","172.30.1.205","172.30.1.104","TCP","54","42692 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15909","7.181806","172.30.1.104","172.30.1.205","TCP","66","49671 > 35330 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15910","7.181814","172.30.1.205","172.30.1.104","TCP","54","35330 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15911","7.182158","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15912","7.183287","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15913","7.183297","172.30.1.205","172.30.1.104","TCP","54","35330 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15914","7.185230","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15915","7.185601","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15916","7.185607","172.30.1.205","172.30.1.104","TCP","54","35330 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15917","7.186964","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15918","7.188577","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15919","7.188586","172.30.1.205","172.30.1.104","TCP","54","35330 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15920","7.189553","172.30.1.205","172.30.1.104","TCP","74","42696 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910415 TSecr=0 WS=128" "15921","7.189839","172.30.1.104","172.30.1.205","TCP","66","135 > 42696 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15922","7.189851","172.30.1.205","172.30.1.104","TCP","54","42696 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15923","7.190194","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15924","7.190471","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15925","7.190480","172.30.1.205","172.30.1.104","TCP","54","42696 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15926","7.192649","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15927","7.193015","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15928","7.193025","172.30.1.205","172.30.1.104","TCP","54","42696 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15929","7.194923","172.30.1.205","172.30.1.104","TCP","54","42696 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15930","7.195055","172.30.1.205","172.30.1.104","TCP","74","35334 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910421 TSecr=0 WS=128" "15931","7.195196","172.30.1.104","172.30.1.205","TCP","54","135 > 42696 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15932","7.195206","172.30.1.104","172.30.1.205","TCP","54","135 > 42696 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15933","7.195212","172.30.1.205","172.30.1.104","TCP","54","42696 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15934","7.195310","172.30.1.104","172.30.1.205","TCP","66","49671 > 35334 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15935","7.195319","172.30.1.205","172.30.1.104","TCP","54","35334 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15936","7.195694","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15937","7.197577","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15938","7.197585","172.30.1.205","172.30.1.104","TCP","54","35334 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15939","7.199520","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15940","7.199864","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15941","7.199871","172.30.1.205","172.30.1.104","TCP","54","35334 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15942","7.201289","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15943","7.203027","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15944","7.203037","172.30.1.205","172.30.1.104","TCP","54","35334 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15945","7.204018","172.30.1.205","172.30.1.104","TCP","74","42700 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910430 TSecr=0 WS=128" "15946","7.204276","172.30.1.104","172.30.1.205","TCP","66","135 > 42700 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15947","7.204287","172.30.1.205","172.30.1.104","TCP","54","42700 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15948","7.204646","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15949","7.204922","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15950","7.204931","172.30.1.205","172.30.1.104","TCP","54","42700 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15951","7.207157","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15952","7.207549","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15953","7.207555","172.30.1.205","172.30.1.104","TCP","54","42700 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15954","7.209405","172.30.1.205","172.30.1.104","TCP","54","42700 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15955","7.209521","172.30.1.205","172.30.1.104","TCP","74","35338 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910435 TSecr=0 WS=128" "15956","7.209678","172.30.1.104","172.30.1.205","TCP","54","135 > 42700 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15957","7.209730","172.30.1.104","172.30.1.205","TCP","54","135 > 42700 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15958","7.209737","172.30.1.205","172.30.1.104","TCP","54","42700 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15959","7.209819","172.30.1.104","172.30.1.205","TCP","66","49671 > 35338 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15960","7.209827","172.30.1.205","172.30.1.104","TCP","54","35338 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15961","7.210176","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15962","7.210483","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15963","7.210492","172.30.1.205","172.30.1.104","TCP","54","35338 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15964","7.212400","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15965","7.212794","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15966","7.212800","172.30.1.205","172.30.1.104","TCP","54","35338 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15967","7.214174","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15968","7.215934","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15969","7.215944","172.30.1.205","172.30.1.104","TCP","54","35338 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15970","7.216910","172.30.1.205","172.30.1.104","TCP","74","42704 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910443 TSecr=0 WS=128" "15971","7.217242","172.30.1.104","172.30.1.205","TCP","66","135 > 42704 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15972","7.217252","172.30.1.205","172.30.1.104","TCP","54","42704 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15973","7.217609","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15974","7.217915","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15975","7.217924","172.30.1.205","172.30.1.104","TCP","54","42704 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15976","7.220133","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "15977","7.220623","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "15978","7.220629","172.30.1.205","172.30.1.104","TCP","54","42704 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "15979","7.222478","172.30.1.205","172.30.1.104","TCP","54","42704 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "15980","7.222594","172.30.1.205","172.30.1.104","TCP","74","35342 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910449 TSecr=0 WS=128" "15981","7.222757","172.30.1.104","172.30.1.205","TCP","54","135 > 42704 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15982","7.222876","172.30.1.104","172.30.1.205","TCP","54","135 > 42704 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "15983","7.222883","172.30.1.205","172.30.1.104","TCP","54","42704 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "15984","7.222902","172.30.1.104","172.30.1.205","TCP","66","49671 > 35342 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15985","7.222910","172.30.1.205","172.30.1.104","TCP","54","35342 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15986","7.223264","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "15987","7.223589","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "15988","7.223598","172.30.1.205","172.30.1.104","TCP","54","35342 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "15989","7.225525","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "15990","7.225932","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "15991","7.225939","172.30.1.205","172.30.1.104","TCP","54","35342 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "15992","7.227290","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "15993","7.229082","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "15994","7.229091","172.30.1.205","172.30.1.104","TCP","54","35342 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "15995","7.230045","172.30.1.205","172.30.1.104","TCP","74","42708 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910456 TSecr=0 WS=128" "15996","7.230380","172.30.1.104","172.30.1.205","TCP","66","135 > 42708 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "15997","7.230391","172.30.1.205","172.30.1.104","TCP","54","42708 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "15998","7.230741","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "15999","7.231036","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16000","7.231045","172.30.1.205","172.30.1.104","TCP","54","42708 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16001","7.233261","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16002","7.233645","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16003","7.233651","172.30.1.205","172.30.1.104","TCP","54","42708 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16004","7.235475","172.30.1.205","172.30.1.104","TCP","54","42708 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16005","7.235586","172.30.1.205","172.30.1.104","TCP","74","35346 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910462 TSecr=0 WS=128" "16006","7.235739","172.30.1.104","172.30.1.205","TCP","54","135 > 42708 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16007","7.235763","172.30.1.104","172.30.1.205","TCP","54","135 > 42708 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16008","7.235768","172.30.1.205","172.30.1.104","TCP","54","42708 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16009","7.235877","172.30.1.104","172.30.1.205","TCP","66","49671 > 35346 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16010","7.235886","172.30.1.205","172.30.1.104","TCP","54","35346 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16011","7.236232","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16012","7.236510","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16013","7.236519","172.30.1.205","172.30.1.104","TCP","54","35346 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16014","7.238427","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16015","7.238796","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16016","7.238803","172.30.1.205","172.30.1.104","TCP","54","35346 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16017","7.240151","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16018","7.241849","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16019","7.241859","172.30.1.205","172.30.1.104","TCP","54","35346 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16020","7.242805","172.30.1.205","172.30.1.104","TCP","74","42712 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910469 TSecr=0 WS=128" "16021","7.243107","172.30.1.104","172.30.1.205","TCP","66","135 > 42712 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16022","7.243118","172.30.1.205","172.30.1.104","TCP","54","42712 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16023","7.243475","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16024","7.243803","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16025","7.243812","172.30.1.205","172.30.1.104","TCP","54","42712 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16026","7.246018","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16027","7.246437","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16028","7.246444","172.30.1.205","172.30.1.104","TCP","54","42712 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16029","7.247289","172.30.1.205","172.30.1.104","TCP","54","35306 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16030","7.247337","172.30.1.205","172.30.1.104","TCP","54","35310 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16031","7.247373","172.30.1.205","172.30.1.104","TCP","54","35314 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16032","7.247402","172.30.1.205","172.30.1.104","TCP","54","35318 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16033","7.247435","172.30.1.205","172.30.1.104","TCP","54","35322 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16034","7.247463","172.30.1.205","172.30.1.104","TCP","54","35326 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16035","7.247491","172.30.1.205","172.30.1.104","TCP","54","35330 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16036","7.247522","172.30.1.205","172.30.1.104","TCP","54","35334 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16037","7.247545","172.30.1.205","172.30.1.104","TCP","54","35338 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16038","7.247568","172.30.1.104","172.30.1.205","TCP","54","49671 > 35306 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16039","7.247589","172.30.1.205","172.30.1.104","TCP","54","35342 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16040","7.247625","172.30.1.205","172.30.1.104","TCP","54","35346 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16041","7.247695","172.30.1.205","172.30.1.104","TCP","54","35302 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16042","7.247716","172.30.1.104","172.30.1.205","TCP","54","49671 > 35310 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16043","7.247745","172.30.1.104","172.30.1.205","TCP","54","49671 > 35314 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16044","7.247818","172.30.1.104","172.30.1.205","TCP","54","49671 > 35306 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16045","7.247825","172.30.1.205","172.30.1.104","TCP","54","35306 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16046","7.247827","172.30.1.104","172.30.1.205","TCP","54","49671 > 35318 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16047","7.247832","172.30.1.104","172.30.1.205","TCP","54","49671 > 35322 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16048","7.247848","172.30.1.104","172.30.1.205","TCP","54","49671 > 35310 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16049","7.247851","172.30.1.205","172.30.1.104","TCP","54","35310 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16050","7.247948","172.30.1.104","172.30.1.205","TCP","54","49671 > 35326 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16051","7.247974","172.30.1.104","172.30.1.205","TCP","54","49671 > 35330 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16052","7.248011","172.30.1.104","172.30.1.205","TCP","54","49671 > 35330 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16053","7.248016","172.30.1.205","172.30.1.104","TCP","54","35330 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16054","7.248041","172.30.1.104","172.30.1.205","TCP","54","49671 > 35326 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16055","7.248044","172.30.1.205","172.30.1.104","TCP","54","35326 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16056","7.248069","172.30.1.104","172.30.1.205","TCP","54","49671 > 35322 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16057","7.248073","172.30.1.205","172.30.1.104","TCP","54","35322 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16058","7.248095","172.30.1.104","172.30.1.205","TCP","54","49671 > 35314 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16059","7.248098","172.30.1.205","172.30.1.104","TCP","54","35314 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16060","7.248130","172.30.1.104","172.30.1.205","TCP","54","49671 > 35318 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16061","7.248133","172.30.1.205","172.30.1.104","TCP","54","35318 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16062","7.248158","172.30.1.104","172.30.1.205","TCP","54","49671 > 35334 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16063","7.248184","172.30.1.104","172.30.1.205","TCP","54","49671 > 35338 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16064","7.248211","172.30.1.104","172.30.1.205","TCP","54","49671 > 35342 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16065","7.248237","172.30.1.104","172.30.1.205","TCP","54","49671 > 35346 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16066","7.248263","172.30.1.104","172.30.1.205","TCP","54","49671 > 35334 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16067","7.248268","172.30.1.205","172.30.1.104","TCP","54","35334 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16068","7.248292","172.30.1.104","172.30.1.205","TCP","54","49671 > 35346 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16069","7.248294","172.30.1.205","172.30.1.104","TCP","54","35346 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16070","7.248328","172.30.1.104","172.30.1.205","TCP","54","49671 > 35338 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16071","7.248331","172.30.1.205","172.30.1.104","TCP","54","35338 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16072","7.248355","172.30.1.104","172.30.1.205","TCP","54","49671 > 35342 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16073","7.248358","172.30.1.205","172.30.1.104","TCP","54","35342 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16074","7.248403","172.30.1.104","172.30.1.205","TCP","54","49671 > 35302 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16075","7.248429","172.30.1.104","172.30.1.205","TCP","54","49671 > 35302 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16076","7.248434","172.30.1.205","172.30.1.104","TCP","54","35302 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16077","7.249311","172.30.1.205","172.30.1.104","TCP","54","42712 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16078","7.249422","172.30.1.205","172.30.1.104","TCP","74","35350 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910475 TSecr=0 WS=128" "16079","7.249578","172.30.1.104","172.30.1.205","TCP","54","135 > 42712 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16080","7.249601","172.30.1.104","172.30.1.205","TCP","54","135 > 42712 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16081","7.249606","172.30.1.205","172.30.1.104","TCP","54","42712 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16082","7.249695","172.30.1.104","172.30.1.205","TCP","66","49671 > 35350 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16083","7.249704","172.30.1.205","172.30.1.104","TCP","54","35350 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16084","7.250065","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16085","7.250392","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16086","7.250401","172.30.1.205","172.30.1.104","TCP","54","35350 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16087","7.252273","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16088","7.253574","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16089","7.253582","172.30.1.205","172.30.1.104","TCP","54","35350 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16090","7.254949","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16091","7.256656","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16092","7.256665","172.30.1.205","172.30.1.104","TCP","54","35350 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16093","7.257634","172.30.1.205","172.30.1.104","TCP","74","42716 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910484 TSecr=0 WS=128" "16094","7.257952","172.30.1.104","172.30.1.205","TCP","66","135 > 42716 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16095","7.257963","172.30.1.205","172.30.1.104","TCP","54","42716 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16096","7.258320","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16097","7.258609","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16098","7.258618","172.30.1.205","172.30.1.104","TCP","54","42716 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16099","7.260855","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16100","7.261260","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16101","7.261267","172.30.1.205","172.30.1.104","TCP","54","42716 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16102","7.263103","172.30.1.205","172.30.1.104","TCP","54","42716 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16103","7.263215","172.30.1.205","172.30.1.104","TCP","74","35354 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910489 TSecr=0 WS=128" "16104","7.263390","172.30.1.104","172.30.1.205","TCP","54","135 > 42716 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16105","7.263464","172.30.1.104","172.30.1.205","TCP","54","135 > 42716 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16106","7.263469","172.30.1.205","172.30.1.104","TCP","54","42716 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16107","7.263557","172.30.1.104","172.30.1.205","TCP","66","49671 > 35354 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16108","7.263565","172.30.1.205","172.30.1.104","TCP","54","35354 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16109","7.263914","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16110","7.264226","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16111","7.264235","172.30.1.205","172.30.1.104","TCP","54","35354 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16112","7.266152","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16113","7.266518","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16114","7.266530","172.30.1.205","172.30.1.104","TCP","54","35354 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16115","7.268145","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16116","7.269872","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16117","7.269882","172.30.1.205","172.30.1.104","TCP","54","35354 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16118","7.270821","172.30.1.205","172.30.1.104","TCP","74","42720 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910497 TSecr=0 WS=128" "16119","7.271139","172.30.1.104","172.30.1.205","TCP","66","135 > 42720 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16120","7.271150","172.30.1.205","172.30.1.104","TCP","54","42720 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16121","7.271502","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16122","7.271786","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16123","7.271794","172.30.1.205","172.30.1.104","TCP","54","42720 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16124","7.274019","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16125","7.274414","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16126","7.274421","172.30.1.205","172.30.1.104","TCP","54","42720 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16127","7.276239","172.30.1.205","172.30.1.104","TCP","54","42720 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16128","7.276349","172.30.1.205","172.30.1.104","TCP","74","35358 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910502 TSecr=0 WS=128" "16129","7.276533","172.30.1.104","172.30.1.205","TCP","54","135 > 42720 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16130","7.276556","172.30.1.104","172.30.1.205","TCP","54","135 > 42720 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16131","7.276561","172.30.1.205","172.30.1.104","TCP","54","42720 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16132","7.276675","172.30.1.104","172.30.1.205","TCP","66","49671 > 35358 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16133","7.276683","172.30.1.205","172.30.1.104","TCP","54","35358 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16134","7.277067","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16135","7.277344","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16136","7.277353","172.30.1.205","172.30.1.104","TCP","54","35358 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16137","7.279245","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16138","7.279606","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16139","7.279612","172.30.1.205","172.30.1.104","TCP","54","35358 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16140","7.280997","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16141","7.282826","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16142","7.282835","172.30.1.205","172.30.1.104","TCP","54","35358 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16143","7.283779","172.30.1.205","172.30.1.104","TCP","74","42724 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910510 TSecr=0 WS=128" "16144","7.284089","172.30.1.104","172.30.1.205","TCP","66","135 > 42724 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16145","7.284099","172.30.1.205","172.30.1.104","TCP","54","42724 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16146","7.284450","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16147","7.284786","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16148","7.284795","172.30.1.205","172.30.1.104","TCP","54","42724 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16149","7.286991","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16150","7.287433","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16151","7.287439","172.30.1.205","172.30.1.104","TCP","54","42724 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16152","7.289287","172.30.1.205","172.30.1.104","TCP","54","42724 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16153","7.289397","172.30.1.205","172.30.1.104","TCP","74","35362 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910515 TSecr=0 WS=128" "16154","7.289557","172.30.1.104","172.30.1.205","TCP","54","135 > 42724 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16155","7.289568","172.30.1.104","172.30.1.205","TCP","54","135 > 42724 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16156","7.289573","172.30.1.205","172.30.1.104","TCP","54","42724 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16157","7.289724","172.30.1.104","172.30.1.205","TCP","66","49671 > 35362 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16158","7.289732","172.30.1.205","172.30.1.104","TCP","54","35362 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16159","7.290079","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16160","7.290376","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16161","7.290385","172.30.1.205","172.30.1.104","TCP","54","35362 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16162","7.292274","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16163","7.292678","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16164","7.292684","172.30.1.205","172.30.1.104","TCP","54","35362 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16165","7.294067","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16166","7.295733","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16167","7.295751","172.30.1.205","172.30.1.104","TCP","54","35362 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16168","7.296723","172.30.1.205","172.30.1.104","TCP","74","42728 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910523 TSecr=0 WS=128" "16169","7.296991","172.30.1.104","172.30.1.205","TCP","66","135 > 42728 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16170","7.297002","172.30.1.205","172.30.1.104","TCP","54","42728 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16171","7.297358","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16172","7.297633","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16173","7.297643","172.30.1.205","172.30.1.104","TCP","54","42728 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16174","7.299824","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16175","7.300225","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16176","7.300231","172.30.1.205","172.30.1.104","TCP","54","42728 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16177","7.302071","172.30.1.205","172.30.1.104","TCP","54","42728 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16178","7.302182","172.30.1.205","172.30.1.104","TCP","74","35366 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910528 TSecr=0 WS=128" "16179","7.302324","172.30.1.104","172.30.1.205","TCP","54","135 > 42728 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16180","7.302355","172.30.1.104","172.30.1.205","TCP","54","135 > 42728 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16181","7.302361","172.30.1.205","172.30.1.104","TCP","54","42728 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16182","7.302446","172.30.1.104","172.30.1.205","TCP","66","49671 > 35366 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16183","7.302454","172.30.1.205","172.30.1.104","TCP","54","35366 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16184","7.302817","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16185","7.303149","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16186","7.303158","172.30.1.205","172.30.1.104","TCP","54","35366 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16187","7.305057","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16188","7.305404","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16189","7.305411","172.30.1.205","172.30.1.104","TCP","54","35366 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16190","7.306764","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16191","7.308379","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16192","7.308388","172.30.1.205","172.30.1.104","TCP","54","35366 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16193","7.309346","172.30.1.205","172.30.1.104","TCP","74","42732 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910535 TSecr=0 WS=128" "16194","7.309645","172.30.1.104","172.30.1.205","TCP","66","135 > 42732 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16195","7.309656","172.30.1.205","172.30.1.104","TCP","54","42732 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16196","7.310008","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16197","7.310298","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16198","7.310307","172.30.1.205","172.30.1.104","TCP","54","42732 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16199","7.312476","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16200","7.312858","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16201","7.312867","172.30.1.205","172.30.1.104","TCP","54","42732 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16202","7.314772","172.30.1.205","172.30.1.104","TCP","54","42732 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16203","7.314894","172.30.1.205","172.30.1.104","TCP","74","35370 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910541 TSecr=0 WS=128" "16204","7.315064","172.30.1.104","172.30.1.205","TCP","54","135 > 42732 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16205","7.315096","172.30.1.104","172.30.1.205","TCP","54","135 > 42732 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16206","7.315103","172.30.1.205","172.30.1.104","TCP","54","42732 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16207","7.315195","172.30.1.104","172.30.1.205","TCP","66","49671 > 35370 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16208","7.315207","172.30.1.205","172.30.1.104","TCP","54","35370 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16209","7.315565","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16210","7.315862","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16211","7.315871","172.30.1.205","172.30.1.104","TCP","54","35370 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16212","7.317791","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16213","7.318183","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16214","7.318190","172.30.1.205","172.30.1.104","TCP","54","35370 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16215","7.319545","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16216","7.321247","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16217","7.321256","172.30.1.205","172.30.1.104","TCP","54","35370 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16218","7.322201","172.30.1.205","172.30.1.104","TCP","74","42736 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910548 TSecr=0 WS=128" "16219","7.322543","172.30.1.104","172.30.1.205","TCP","66","135 > 42736 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16220","7.322558","172.30.1.205","172.30.1.104","TCP","54","42736 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16221","7.322951","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16222","7.323239","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16223","7.323248","172.30.1.205","172.30.1.104","TCP","54","42736 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16224","7.325494","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16225","7.325918","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16226","7.325925","172.30.1.205","172.30.1.104","TCP","54","42736 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16227","7.327740","172.30.1.205","172.30.1.104","TCP","54","42736 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16228","7.327852","172.30.1.205","172.30.1.104","TCP","74","35374 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910554 TSecr=0 WS=128" "16229","7.328016","172.30.1.104","172.30.1.205","TCP","54","135 > 42736 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16230","7.328027","172.30.1.104","172.30.1.205","TCP","54","135 > 42736 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16231","7.328032","172.30.1.205","172.30.1.104","TCP","54","42736 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16232","7.328103","172.30.1.104","172.30.1.205","TCP","66","49671 > 35374 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16233","7.328112","172.30.1.205","172.30.1.104","TCP","54","35374 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16234","7.328454","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16235","7.328829","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16236","7.328838","172.30.1.205","172.30.1.104","TCP","54","35374 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16237","7.330725","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16238","7.331103","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16239","7.331110","172.30.1.205","172.30.1.104","TCP","54","35374 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16240","7.332461","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16241","7.334167","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16242","7.334178","172.30.1.205","172.30.1.104","TCP","54","35374 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16243","7.335139","172.30.1.205","172.30.1.104","TCP","74","42740 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910561 TSecr=0 WS=128" "16244","7.335432","172.30.1.104","172.30.1.205","TCP","66","135 > 42740 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16245","7.335443","172.30.1.205","172.30.1.104","TCP","54","42740 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16246","7.335795","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16247","7.336066","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16248","7.336075","172.30.1.205","172.30.1.104","TCP","54","42740 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16249","7.338286","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16250","7.338693","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16251","7.338699","172.30.1.205","172.30.1.104","TCP","54","42740 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16252","7.340499","172.30.1.205","172.30.1.104","TCP","54","42740 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16253","7.340607","172.30.1.205","172.30.1.104","TCP","74","35378 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910567 TSecr=0 WS=128" "16254","7.340771","172.30.1.104","172.30.1.205","TCP","54","135 > 42740 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16255","7.340817","172.30.1.104","172.30.1.205","TCP","54","135 > 42740 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16256","7.340824","172.30.1.205","172.30.1.104","TCP","54","42740 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16257","7.340928","172.30.1.104","172.30.1.205","TCP","66","49671 > 35378 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16258","7.340936","172.30.1.205","172.30.1.104","TCP","54","35378 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16259","7.341306","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16260","7.341633","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16261","7.341641","172.30.1.205","172.30.1.104","TCP","54","35378 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16262","7.343502","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16263","7.343834","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16264","7.343840","172.30.1.205","172.30.1.104","TCP","54","35378 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16265","7.345223","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16266","7.348077","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16267","7.348087","172.30.1.205","172.30.1.104","TCP","54","35378 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16268","7.349053","172.30.1.205","172.30.1.104","TCP","74","42744 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910575 TSecr=0 WS=128" "16269","7.349359","172.30.1.104","172.30.1.205","TCP","66","135 > 42744 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16270","7.349370","172.30.1.205","172.30.1.104","TCP","54","42744 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16271","7.349720","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16272","7.349991","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16273","7.350000","172.30.1.205","172.30.1.104","TCP","54","42744 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16274","7.352175","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16275","7.352583","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16276","7.352590","172.30.1.205","172.30.1.104","TCP","54","42744 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16277","7.354422","172.30.1.205","172.30.1.104","TCP","54","42744 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16278","7.354531","172.30.1.205","172.30.1.104","TCP","74","35382 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910580 TSecr=0 WS=128" "16279","7.354752","172.30.1.104","172.30.1.205","TCP","54","135 > 42744 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16280","7.354783","172.30.1.104","172.30.1.205","TCP","54","135 > 42744 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16281","7.354789","172.30.1.205","172.30.1.104","TCP","54","42744 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16282","7.354828","172.30.1.104","172.30.1.205","TCP","66","49671 > 35382 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16283","7.354836","172.30.1.205","172.30.1.104","TCP","54","35382 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16284","7.355191","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16285","7.355513","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16286","7.355521","172.30.1.205","172.30.1.104","TCP","54","35382 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16287","7.357398","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16288","7.357789","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16289","7.357795","172.30.1.205","172.30.1.104","TCP","54","35382 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16290","7.359133","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16291","7.360910","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16292","7.360919","172.30.1.205","172.30.1.104","TCP","54","35382 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16293","7.361854","172.30.1.205","172.30.1.104","TCP","74","42748 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910588 TSecr=0 WS=128" "16294","7.362130","172.30.1.104","172.30.1.205","TCP","66","135 > 42748 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16295","7.362140","172.30.1.205","172.30.1.104","TCP","54","42748 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16296","7.362492","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16297","7.362767","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16298","7.362776","172.30.1.205","172.30.1.104","TCP","54","42748 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16299","7.364962","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16300","7.365374","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16301","7.365380","172.30.1.205","172.30.1.104","TCP","54","42748 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16302","7.367181","172.30.1.205","172.30.1.104","TCP","54","42748 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16303","7.367290","172.30.1.205","172.30.1.104","TCP","74","35386 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910593 TSecr=0 WS=128" "16304","7.367445","172.30.1.104","172.30.1.205","TCP","54","135 > 42748 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16305","7.367473","172.30.1.104","172.30.1.205","TCP","54","135 > 42748 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16306","7.367478","172.30.1.205","172.30.1.104","TCP","54","42748 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16307","7.367559","172.30.1.104","172.30.1.205","TCP","66","49671 > 35386 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16308","7.367567","172.30.1.205","172.30.1.104","TCP","54","35386 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16309","7.367909","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16310","7.369422","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16311","7.369432","172.30.1.205","172.30.1.104","TCP","54","35386 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16312","7.371293","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16313","7.371685","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16314","7.371691","172.30.1.205","172.30.1.104","TCP","54","35386 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16315","7.373056","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16316","7.374823","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16317","7.374834","172.30.1.205","172.30.1.104","TCP","54","35386 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16318","7.375773","172.30.1.205","172.30.1.104","TCP","74","42752 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910602 TSecr=0 WS=128" "16319","7.376069","172.30.1.104","172.30.1.205","TCP","66","135 > 42752 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16320","7.376079","172.30.1.205","172.30.1.104","TCP","54","42752 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16321","7.376427","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16322","7.376750","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16323","7.376758","172.30.1.205","172.30.1.104","TCP","54","42752 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16324","7.378953","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16325","7.379344","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16326","7.379351","172.30.1.205","172.30.1.104","TCP","54","42752 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16327","7.381178","172.30.1.205","172.30.1.104","TCP","54","42752 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16328","7.381287","172.30.1.205","172.30.1.104","TCP","74","35390 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910607 TSecr=0 WS=128" "16329","7.381422","172.30.1.104","172.30.1.205","TCP","54","135 > 42752 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16330","7.381565","172.30.1.104","172.30.1.205","TCP","66","49671 > 35390 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16331","7.381574","172.30.1.205","172.30.1.104","TCP","54","35390 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16332","7.381922","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16333","7.383921","172.30.1.104","172.30.1.205","TCP","54","135 > 42752 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16334","7.383928","172.30.1.205","172.30.1.104","TCP","54","42752 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16335","7.384060","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16336","7.384070","172.30.1.205","172.30.1.104","TCP","54","35390 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16337","7.386011","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16338","7.386350","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16339","7.386356","172.30.1.205","172.30.1.104","TCP","54","35390 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16340","7.387694","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16341","7.389405","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16342","7.389414","172.30.1.205","172.30.1.104","TCP","54","35390 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16343","7.390345","172.30.1.205","172.30.1.104","TCP","74","42756 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910616 TSecr=0 WS=128" "16344","7.390633","172.30.1.104","172.30.1.205","TCP","66","135 > 42756 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16345","7.390644","172.30.1.205","172.30.1.104","TCP","54","42756 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16346","7.390989","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16347","7.391262","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16348","7.391270","172.30.1.205","172.30.1.104","TCP","54","42756 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16349","7.393471","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16350","7.393846","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16351","7.393852","172.30.1.205","172.30.1.104","TCP","54","42756 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16352","7.395654","172.30.1.205","172.30.1.104","TCP","54","42756 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16353","7.395762","172.30.1.205","172.30.1.104","TCP","74","35394 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910622 TSecr=0 WS=128" "16354","7.395937","172.30.1.104","172.30.1.205","TCP","54","135 > 42756 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16355","7.395945","172.30.1.104","172.30.1.205","TCP","54","135 > 42756 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16356","7.395950","172.30.1.205","172.30.1.104","TCP","54","42756 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16357","7.396028","172.30.1.104","172.30.1.205","TCP","66","49671 > 35394 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16358","7.396036","172.30.1.205","172.30.1.104","TCP","54","35394 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16359","7.396376","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16360","7.396668","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16361","7.396677","172.30.1.205","172.30.1.104","TCP","54","35394 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16362","7.398566","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16363","7.398910","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16364","7.398916","172.30.1.205","172.30.1.104","TCP","54","35394 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16365","7.400244","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16366","7.401913","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16367","7.401922","172.30.1.205","172.30.1.104","TCP","54","35394 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16368","7.402857","172.30.1.205","172.30.1.104","TCP","74","42760 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910629 TSecr=0 WS=128" "16369","7.403134","172.30.1.104","172.30.1.205","TCP","66","135 > 42760 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16370","7.403144","172.30.1.205","172.30.1.104","TCP","54","42760 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16371","7.403486","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16372","7.403815","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16373","7.403824","172.30.1.205","172.30.1.104","TCP","54","42760 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16374","7.406012","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16375","7.406430","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16376","7.406437","172.30.1.205","172.30.1.104","TCP","54","42760 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16377","7.407282","172.30.1.205","172.30.1.104","TCP","54","35354 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16378","7.407330","172.30.1.205","172.30.1.104","TCP","54","35358 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16379","7.407377","172.30.1.205","172.30.1.104","TCP","54","35362 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16380","7.407412","172.30.1.205","172.30.1.104","TCP","54","35366 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16381","7.407444","172.30.1.205","172.30.1.104","TCP","54","35370 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16382","7.407471","172.30.1.205","172.30.1.104","TCP","54","35374 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16383","7.407498","172.30.1.205","172.30.1.104","TCP","54","35378 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16384","7.407541","172.30.1.205","172.30.1.104","TCP","54","35382 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16385","7.407571","172.30.1.205","172.30.1.104","TCP","54","35386 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16386","7.407578","172.30.1.104","172.30.1.205","TCP","54","49671 > 35354 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16387","7.407595","172.30.1.104","172.30.1.205","TCP","54","49671 > 35358 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16388","7.407627","172.30.1.205","172.30.1.104","TCP","54","35390 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16389","7.407653","172.30.1.205","172.30.1.104","TCP","54","35394 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16390","7.407736","172.30.1.104","172.30.1.205","TCP","54","49671 > 35354 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16391","7.407743","172.30.1.205","172.30.1.104","TCP","54","35354 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16392","7.407757","172.30.1.104","172.30.1.205","TCP","54","49671 > 35358 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16393","7.407759","172.30.1.205","172.30.1.104","TCP","54","35358 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16394","7.407765","172.30.1.205","172.30.1.104","TCP","54","35350 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16395","7.408049","172.30.1.104","172.30.1.205","TCP","54","49671 > 35362 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16396","7.408063","172.30.1.104","172.30.1.205","TCP","54","49671 > 35366 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16397","7.408087","172.30.1.104","172.30.1.205","TCP","54","49671 > 35370 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16398","7.408110","172.30.1.104","172.30.1.205","TCP","54","49671 > 35374 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16399","7.408132","172.30.1.104","172.30.1.205","TCP","54","49671 > 35378 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16400","7.408151","172.30.1.104","172.30.1.205","TCP","54","49671 > 35382 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16401","7.408171","172.30.1.104","172.30.1.205","TCP","54","49671 > 35386 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16402","7.408192","172.30.1.104","172.30.1.205","TCP","54","49671 > 35390 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16403","7.408223","172.30.1.104","172.30.1.205","TCP","54","49671 > 35394 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16404","7.408243","172.30.1.104","172.30.1.205","TCP","54","49671 > 35394 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16405","7.408248","172.30.1.205","172.30.1.104","TCP","54","35394 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16406","7.408275","172.30.1.104","172.30.1.205","TCP","54","49671 > 35390 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16407","7.408278","172.30.1.205","172.30.1.104","TCP","54","35390 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16408","7.408302","172.30.1.104","172.30.1.205","TCP","54","49671 > 35386 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16409","7.408305","172.30.1.205","172.30.1.104","TCP","54","35386 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16410","7.408318","172.30.1.104","172.30.1.205","TCP","54","49671 > 35382 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16411","7.408321","172.30.1.205","172.30.1.104","TCP","54","35382 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16412","7.408337","172.30.1.104","172.30.1.205","TCP","54","49671 > 35378 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16413","7.408339","172.30.1.205","172.30.1.104","TCP","54","35378 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16414","7.408356","172.30.1.104","172.30.1.205","TCP","54","49671 > 35374 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16415","7.408359","172.30.1.205","172.30.1.104","TCP","54","35374 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16416","7.408376","172.30.1.104","172.30.1.205","TCP","54","49671 > 35362 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16417","7.408379","172.30.1.205","172.30.1.104","TCP","54","35362 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16418","7.408394","172.30.1.104","172.30.1.205","TCP","54","49671 > 35366 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16419","7.408397","172.30.1.205","172.30.1.104","TCP","54","35366 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16420","7.408413","172.30.1.104","172.30.1.205","TCP","54","49671 > 35370 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16421","7.408416","172.30.1.205","172.30.1.104","TCP","54","35370 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16422","7.408433","172.30.1.104","172.30.1.205","TCP","54","49671 > 35350 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16423","7.408452","172.30.1.104","172.30.1.205","TCP","54","49671 > 35350 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16424","7.408456","172.30.1.205","172.30.1.104","TCP","54","35350 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16425","7.409611","172.30.1.205","172.30.1.104","TCP","54","42760 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16426","7.409731","172.30.1.205","172.30.1.104","TCP","74","35398 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910636 TSecr=0 WS=128" "16427","7.409928","172.30.1.104","172.30.1.205","TCP","54","135 > 42760 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16428","7.409936","172.30.1.104","172.30.1.205","TCP","54","135 > 42760 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16429","7.409940","172.30.1.205","172.30.1.104","TCP","54","42760 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16430","7.410016","172.30.1.104","172.30.1.205","TCP","66","49671 > 35398 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16431","7.410024","172.30.1.205","172.30.1.104","TCP","54","35398 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16432","7.410379","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16433","7.410645","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16434","7.410661","172.30.1.205","172.30.1.104","TCP","54","35398 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16435","7.412534","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16436","7.412881","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16437","7.412888","172.30.1.205","172.30.1.104","TCP","54","35398 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16438","7.414245","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16439","7.415956","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16440","7.415965","172.30.1.205","172.30.1.104","TCP","54","35398 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16441","7.416909","172.30.1.205","172.30.1.104","TCP","74","42764 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910643 TSecr=0 WS=128" "16442","7.417254","172.30.1.104","172.30.1.205","TCP","66","135 > 42764 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16443","7.417265","172.30.1.205","172.30.1.104","TCP","54","42764 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16444","7.417623","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16445","7.417932","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16446","7.417941","172.30.1.205","172.30.1.104","TCP","54","42764 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16447","7.420104","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16448","7.420542","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16449","7.420548","172.30.1.205","172.30.1.104","TCP","54","42764 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16450","7.422356","172.30.1.205","172.30.1.104","TCP","54","42764 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16451","7.422465","172.30.1.205","172.30.1.104","TCP","74","35402 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910648 TSecr=0 WS=128" "16452","7.422620","172.30.1.104","172.30.1.205","TCP","54","135 > 42764 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16453","7.422675","172.30.1.104","172.30.1.205","TCP","54","135 > 42764 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16454","7.422681","172.30.1.205","172.30.1.104","TCP","54","42764 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16455","7.422754","172.30.1.104","172.30.1.205","TCP","66","49671 > 35402 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16456","7.422762","172.30.1.205","172.30.1.104","TCP","54","35402 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16457","7.423103","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16458","7.423436","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16459","7.423445","172.30.1.205","172.30.1.104","TCP","54","35402 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16460","7.425323","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16461","7.425707","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16462","7.425713","172.30.1.205","172.30.1.104","TCP","54","35402 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16463","7.427070","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16464","7.428840","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16465","7.428849","172.30.1.205","172.30.1.104","TCP","54","35402 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16466","7.429777","172.30.1.205","172.30.1.104","TCP","74","42768 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910656 TSecr=0 WS=128" "16467","7.430087","172.30.1.104","172.30.1.205","TCP","66","135 > 42768 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16468","7.430097","172.30.1.205","172.30.1.104","TCP","54","42768 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16469","7.430450","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16470","7.430761","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16471","7.430770","172.30.1.205","172.30.1.104","TCP","54","42768 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16472","7.432988","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16473","7.433400","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16474","7.433406","172.30.1.205","172.30.1.104","TCP","54","42768 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16475","7.435212","172.30.1.205","172.30.1.104","TCP","54","42768 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16476","7.435321","172.30.1.205","172.30.1.104","TCP","74","35406 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910661 TSecr=0 WS=128" "16477","7.435526","172.30.1.104","172.30.1.205","TCP","54","135 > 42768 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16478","7.435554","172.30.1.104","172.30.1.205","TCP","54","135 > 42768 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16479","7.435560","172.30.1.205","172.30.1.104","TCP","54","42768 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16480","7.435680","172.30.1.104","172.30.1.205","TCP","66","49671 > 35406 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16481","7.435688","172.30.1.205","172.30.1.104","TCP","54","35406 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16482","7.436034","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16483","7.436346","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16484","7.436354","172.30.1.205","172.30.1.104","TCP","54","35406 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16485","7.438241","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16486","7.438611","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16487","7.438615","172.30.1.205","172.30.1.104","TCP","54","35406 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16488","7.439950","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16489","7.441817","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16490","7.441826","172.30.1.205","172.30.1.104","TCP","54","35406 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16491","7.442771","172.30.1.205","172.30.1.104","TCP","74","42772 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910669 TSecr=0 WS=128" "16492","7.443078","172.30.1.104","172.30.1.205","TCP","66","135 > 42772 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16493","7.443089","172.30.1.205","172.30.1.104","TCP","54","42772 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16494","7.443435","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16495","7.443713","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16496","7.443721","172.30.1.205","172.30.1.104","TCP","54","42772 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16497","7.445947","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16498","7.446402","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16499","7.446408","172.30.1.205","172.30.1.104","TCP","54","42772 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16500","7.448212","172.30.1.205","172.30.1.104","TCP","54","42772 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16501","7.448321","172.30.1.205","172.30.1.104","TCP","74","35410 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910674 TSecr=0 WS=128" "16502","7.448502","172.30.1.104","172.30.1.205","TCP","54","135 > 42772 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16503","7.448511","172.30.1.104","172.30.1.205","TCP","54","135 > 42772 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16504","7.448515","172.30.1.205","172.30.1.104","TCP","54","42772 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16505","7.448585","172.30.1.104","172.30.1.205","TCP","66","49671 > 35410 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16506","7.448594","172.30.1.205","172.30.1.104","TCP","54","35410 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16507","7.448971","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16508","7.449273","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16509","7.449281","172.30.1.205","172.30.1.104","TCP","54","35410 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16510","7.451153","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16511","7.451577","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16512","7.451584","172.30.1.205","172.30.1.104","TCP","54","35410 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16513","7.452953","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16514","7.454744","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16515","7.454754","172.30.1.205","172.30.1.104","TCP","54","35410 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16516","7.455680","172.30.1.205","172.30.1.104","TCP","74","42776 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910682 TSecr=0 WS=128" "16517","7.455956","172.30.1.104","172.30.1.205","TCP","66","135 > 42776 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16518","7.455967","172.30.1.205","172.30.1.104","TCP","54","42776 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16519","7.456313","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16520","7.456636","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16521","7.456644","172.30.1.205","172.30.1.104","TCP","54","42776 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16522","7.458835","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16523","7.459251","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16524","7.459261","172.30.1.205","172.30.1.104","TCP","54","42776 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16525","7.461190","172.30.1.205","172.30.1.104","TCP","54","42776 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16526","7.461314","172.30.1.205","172.30.1.104","TCP","74","35414 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910687 TSecr=0 WS=128" "16527","7.461558","172.30.1.104","172.30.1.205","TCP","54","135 > 42776 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16528","7.461565","172.30.1.104","172.30.1.205","TCP","54","135 > 42776 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16529","7.461571","172.30.1.205","172.30.1.104","TCP","54","42776 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16530","7.461633","172.30.1.104","172.30.1.205","TCP","66","49671 > 35414 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16531","7.461642","172.30.1.205","172.30.1.104","TCP","54","35414 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16532","7.461987","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16533","7.462280","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16534","7.462289","172.30.1.205","172.30.1.104","TCP","54","35414 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16535","7.464161","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16536","7.464526","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16537","7.464532","172.30.1.205","172.30.1.104","TCP","54","35414 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16538","7.465933","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16539","7.467719","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16540","7.467729","172.30.1.205","172.30.1.104","TCP","54","35414 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16541","7.468677","172.30.1.205","172.30.1.104","TCP","74","42780 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910695 TSecr=0 WS=128" "16542","7.468994","172.30.1.104","172.30.1.205","TCP","66","135 > 42780 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16543","7.469005","172.30.1.205","172.30.1.104","TCP","54","42780 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16544","7.469363","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16545","7.469670","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16546","7.469680","172.30.1.205","172.30.1.104","TCP","54","42780 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16547","7.471874","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16548","7.472308","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16549","7.472315","172.30.1.205","172.30.1.104","TCP","54","42780 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16550","7.474179","172.30.1.205","172.30.1.104","TCP","54","42780 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16551","7.474297","172.30.1.205","172.30.1.104","TCP","74","35418 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910700 TSecr=0 WS=128" "16552","7.474481","172.30.1.104","172.30.1.205","TCP","54","135 > 42780 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16553","7.474509","172.30.1.104","172.30.1.205","TCP","54","135 > 42780 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16554","7.474515","172.30.1.205","172.30.1.104","TCP","54","42780 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16555","7.474623","172.30.1.104","172.30.1.205","TCP","66","49671 > 35418 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16556","7.474633","172.30.1.205","172.30.1.104","TCP","54","35418 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16557","7.474987","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16558","7.475401","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16559","7.475410","172.30.1.205","172.30.1.104","TCP","54","35418 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16560","7.477334","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16561","7.477709","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16562","7.477715","172.30.1.205","172.30.1.104","TCP","54","35418 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16563","7.479072","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16564","7.481006","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16565","7.481020","172.30.1.205","172.30.1.104","TCP","54","35418 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16566","7.482035","172.30.1.205","172.30.1.104","TCP","74","42784 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910708 TSecr=0 WS=128" "16567","7.482340","172.30.1.104","172.30.1.205","TCP","66","135 > 42784 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16568","7.482351","172.30.1.205","172.30.1.104","TCP","54","42784 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16569","7.482704","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16570","7.482976","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16571","7.482985","172.30.1.205","172.30.1.104","TCP","54","42784 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16572","7.485233","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16573","7.485649","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16574","7.485655","172.30.1.205","172.30.1.104","TCP","54","42784 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16575","7.487465","172.30.1.205","172.30.1.104","TCP","54","42784 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16576","7.487590","172.30.1.205","172.30.1.104","TCP","74","35422 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910714 TSecr=0 WS=128" "16577","7.487764","172.30.1.104","172.30.1.205","TCP","54","135 > 42784 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16578","7.487773","172.30.1.104","172.30.1.205","TCP","54","135 > 42784 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16579","7.487778","172.30.1.205","172.30.1.104","TCP","54","42784 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16580","7.487874","172.30.1.104","172.30.1.205","TCP","66","49671 > 35422 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16581","7.487882","172.30.1.205","172.30.1.104","TCP","54","35422 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16582","7.488231","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16583","7.488535","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16584","7.488544","172.30.1.205","172.30.1.104","TCP","54","35422 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16585","7.490461","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16586","7.490823","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16587","7.490829","172.30.1.205","172.30.1.104","TCP","54","35422 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16588","7.492249","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16589","7.494041","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16590","7.494050","172.30.1.205","172.30.1.104","TCP","54","35422 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16591","7.495018","172.30.1.205","172.30.1.104","TCP","74","42788 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910721 TSecr=0 WS=128" "16592","7.495340","172.30.1.104","172.30.1.205","TCP","66","135 > 42788 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16593","7.495351","172.30.1.205","172.30.1.104","TCP","54","42788 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16594","7.495702","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16595","7.496060","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16596","7.496069","172.30.1.205","172.30.1.104","TCP","54","42788 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16597","7.498275","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16598","7.498679","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16599","7.498685","172.30.1.205","172.30.1.104","TCP","54","42788 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16600","7.500483","172.30.1.205","172.30.1.104","TCP","54","42788 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16601","7.500593","172.30.1.205","172.30.1.104","TCP","74","35426 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910727 TSecr=0 WS=128" "16602","7.500744","172.30.1.104","172.30.1.205","TCP","54","135 > 42788 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16603","7.500791","172.30.1.104","172.30.1.205","TCP","54","135 > 42788 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16604","7.500798","172.30.1.205","172.30.1.104","TCP","54","42788 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16605","7.500874","172.30.1.104","172.30.1.205","TCP","66","49671 > 35426 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16606","7.500882","172.30.1.205","172.30.1.104","TCP","54","35426 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16607","7.501231","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16608","7.501499","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16609","7.501508","172.30.1.205","172.30.1.104","TCP","54","35426 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16610","7.503378","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16611","7.503734","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16612","7.503753","172.30.1.205","172.30.1.104","TCP","54","35426 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16613","7.505154","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16614","7.506981","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16615","7.506990","172.30.1.205","172.30.1.104","TCP","54","35426 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16616","7.507916","172.30.1.205","172.30.1.104","TCP","74","42792 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910734 TSecr=0 WS=128" "16617","7.508237","172.30.1.104","172.30.1.205","TCP","66","135 > 42792 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16618","7.508248","172.30.1.205","172.30.1.104","TCP","54","42792 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16619","7.508594","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16620","7.508891","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16621","7.508900","172.30.1.205","172.30.1.104","TCP","54","42792 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16622","7.511073","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16623","7.511458","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16624","7.511464","172.30.1.205","172.30.1.104","TCP","54","42792 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16625","7.513295","172.30.1.205","172.30.1.104","TCP","54","42792 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16626","7.513403","172.30.1.205","172.30.1.104","TCP","74","35430 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910739 TSecr=0 WS=128" "16627","7.513578","172.30.1.104","172.30.1.205","TCP","54","135 > 42792 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16628","7.513587","172.30.1.104","172.30.1.205","TCP","54","135 > 42792 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16629","7.513592","172.30.1.205","172.30.1.104","TCP","54","42792 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16630","7.513680","172.30.1.104","172.30.1.205","TCP","66","49671 > 35430 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16631","7.513689","172.30.1.205","172.30.1.104","TCP","54","35430 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16632","7.514029","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16633","7.514311","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16634","7.514318","172.30.1.205","172.30.1.104","TCP","54","35430 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16635","7.516161","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16636","7.518668","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16637","7.518675","172.30.1.205","172.30.1.104","TCP","54","35430 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16638","7.520023","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16639","7.521836","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16640","7.521846","172.30.1.205","172.30.1.104","TCP","54","35430 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16641","7.522782","172.30.1.205","172.30.1.104","TCP","74","42796 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910749 TSecr=0 WS=128" "16642","7.523110","172.30.1.104","172.30.1.205","TCP","66","135 > 42796 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16643","7.523121","172.30.1.205","172.30.1.104","TCP","54","42796 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16644","7.523465","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16645","7.523750","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16646","7.523759","172.30.1.205","172.30.1.104","TCP","54","42796 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16647","7.525956","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16648","7.526369","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16649","7.526376","172.30.1.205","172.30.1.104","TCP","54","42796 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16650","7.528196","172.30.1.205","172.30.1.104","TCP","54","42796 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16651","7.528326","172.30.1.205","172.30.1.104","TCP","74","35434 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910754 TSecr=0 WS=128" "16652","7.528436","172.30.1.104","172.30.1.205","TCP","54","135 > 42796 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16653","7.528472","172.30.1.104","172.30.1.205","TCP","54","135 > 42796 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16654","7.528479","172.30.1.205","172.30.1.104","TCP","54","42796 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16655","7.528601","172.30.1.104","172.30.1.205","TCP","66","49671 > 35434 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16656","7.528609","172.30.1.205","172.30.1.104","TCP","54","35434 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16657","7.528994","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16658","7.529281","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16659","7.529290","172.30.1.205","172.30.1.104","TCP","54","35434 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16660","7.531167","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16661","7.532755","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16662","7.532761","172.30.1.205","172.30.1.104","TCP","54","35434 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16663","7.534124","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16664","7.535903","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16665","7.535914","172.30.1.205","172.30.1.104","TCP","54","35434 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16666","7.536915","172.30.1.205","172.30.1.104","TCP","74","42800 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910763 TSecr=0 WS=128" "16667","7.537256","172.30.1.104","172.30.1.205","TCP","66","135 > 42800 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16668","7.537267","172.30.1.205","172.30.1.104","TCP","54","42800 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16669","7.537624","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16670","7.537889","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16671","7.537898","172.30.1.205","172.30.1.104","TCP","54","42800 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16672","7.540097","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16673","7.540512","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16674","7.540519","172.30.1.205","172.30.1.104","TCP","54","42800 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16675","7.542339","172.30.1.205","172.30.1.104","TCP","54","42800 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16676","7.542450","172.30.1.205","172.30.1.104","TCP","74","35438 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910768 TSecr=0 WS=128" "16677","7.542644","172.30.1.104","172.30.1.205","TCP","54","135 > 42800 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16678","7.542657","172.30.1.104","172.30.1.205","TCP","54","135 > 42800 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16679","7.542666","172.30.1.205","172.30.1.104","TCP","54","42800 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16680","7.542744","172.30.1.104","172.30.1.205","TCP","66","49671 > 35438 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16681","7.542755","172.30.1.205","172.30.1.104","TCP","54","35438 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16682","7.543157","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16683","7.543428","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16684","7.543437","172.30.1.205","172.30.1.104","TCP","54","35438 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16685","7.545395","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16686","7.546833","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16687","7.546841","172.30.1.205","172.30.1.104","TCP","54","35438 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16688","7.548225","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16689","7.550003","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16690","7.550018","172.30.1.205","172.30.1.104","TCP","54","35438 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16691","7.551057","172.30.1.205","172.30.1.104","TCP","74","42804 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910777 TSecr=0 WS=128" "16692","7.551377","172.30.1.104","172.30.1.205","TCP","66","135 > 42804 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16693","7.551391","172.30.1.205","172.30.1.104","TCP","54","42804 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16694","7.551757","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16695","7.552046","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16696","7.552057","172.30.1.205","172.30.1.104","TCP","54","42804 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16697","7.554310","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16698","7.554761","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16699","7.554769","172.30.1.205","172.30.1.104","TCP","54","42804 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16700","7.556639","172.30.1.205","172.30.1.104","TCP","54","42804 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16701","7.556766","172.30.1.205","172.30.1.104","TCP","74","35442 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910783 TSecr=0 WS=128" "16702","7.556933","172.30.1.104","172.30.1.205","TCP","54","135 > 42804 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16703","7.556955","172.30.1.104","172.30.1.205","TCP","54","135 > 42804 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16704","7.556962","172.30.1.205","172.30.1.104","TCP","54","42804 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16705","7.557063","172.30.1.104","172.30.1.205","TCP","66","49671 > 35442 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16706","7.557071","172.30.1.205","172.30.1.104","TCP","54","35442 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16707","7.557422","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16708","7.557730","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16709","7.557739","172.30.1.205","172.30.1.104","TCP","54","35442 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16710","7.559605","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16711","7.559945","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16712","7.559952","172.30.1.205","172.30.1.104","TCP","54","35442 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16713","7.561328","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16714","7.564327","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16715","7.564336","172.30.1.205","172.30.1.104","TCP","54","35442 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16716","7.565294","172.30.1.205","172.30.1.104","TCP","74","42808 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910791 TSecr=0 WS=128" "16717","7.565595","172.30.1.104","172.30.1.205","TCP","66","135 > 42808 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16718","7.565605","172.30.1.205","172.30.1.104","TCP","54","42808 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16719","7.565964","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16720","7.566277","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16721","7.566286","172.30.1.205","172.30.1.104","TCP","54","42808 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16722","7.568448","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16723","7.568843","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16724","7.568849","172.30.1.205","172.30.1.104","TCP","54","42808 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16725","7.569689","172.30.1.205","172.30.1.104","TCP","54","35402 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16726","7.569737","172.30.1.205","172.30.1.104","TCP","54","35406 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16727","7.569774","172.30.1.205","172.30.1.104","TCP","54","35410 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16728","7.569807","172.30.1.205","172.30.1.104","TCP","54","35414 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16729","7.569839","172.30.1.205","172.30.1.104","TCP","54","35418 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16730","7.569872","172.30.1.205","172.30.1.104","TCP","54","35422 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16731","7.569895","172.30.1.205","172.30.1.104","TCP","54","35426 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16732","7.569926","172.30.1.205","172.30.1.104","TCP","54","35430 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16733","7.569952","172.30.1.205","172.30.1.104","TCP","54","35434 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16734","7.569974","172.30.1.205","172.30.1.104","TCP","54","35438 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16735","7.569994","172.30.1.205","172.30.1.104","TCP","54","35442 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16736","7.570067","172.30.1.205","172.30.1.104","TCP","54","35398 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "16737","7.570140","172.30.1.104","172.30.1.205","TCP","54","49671 > 35402 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16738","7.570150","172.30.1.104","172.30.1.205","TCP","54","49671 > 35406 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16739","7.570153","172.30.1.104","172.30.1.205","TCP","54","49671 > 35402 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16740","7.570159","172.30.1.205","172.30.1.104","TCP","54","35402 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16741","7.570166","172.30.1.104","172.30.1.205","TCP","54","49671 > 35410 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16742","7.570674","172.30.1.104","172.30.1.205","TCP","54","49671 > 35414 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16743","7.570682","172.30.1.104","172.30.1.205","TCP","54","49671 > 35414 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16744","7.570689","172.30.1.205","172.30.1.104","TCP","54","35414 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16745","7.570696","172.30.1.104","172.30.1.205","TCP","54","49671 > 35406 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16746","7.570698","172.30.1.205","172.30.1.104","TCP","54","35406 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16747","7.570699","172.30.1.104","172.30.1.205","TCP","54","49671 > 35410 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16748","7.570701","172.30.1.205","172.30.1.104","TCP","54","35410 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16749","7.570702","172.30.1.104","172.30.1.205","TCP","54","49671 > 35418 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16750","7.570706","172.30.1.104","172.30.1.205","TCP","54","49671 > 35422 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16751","7.570708","172.30.1.104","172.30.1.205","TCP","54","49671 > 35418 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16752","7.570710","172.30.1.205","172.30.1.104","TCP","54","35418 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16753","7.570711","172.30.1.104","172.30.1.205","TCP","54","49671 > 35426 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16754","7.570713","172.30.1.104","172.30.1.205","TCP","54","49671 > 35430 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16755","7.570716","172.30.1.104","172.30.1.205","TCP","54","49671 > 35430 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16756","7.570718","172.30.1.205","172.30.1.104","TCP","54","35430 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16757","7.570719","172.30.1.104","172.30.1.205","TCP","54","49671 > 35434 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16758","7.570722","172.30.1.104","172.30.1.205","TCP","54","49671 > 35422 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16759","7.570724","172.30.1.205","172.30.1.104","TCP","54","35422 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16760","7.570725","172.30.1.104","172.30.1.205","TCP","54","49671 > 35438 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16761","7.570731","172.30.1.104","172.30.1.205","TCP","54","49671 > 35438 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16762","7.570734","172.30.1.205","172.30.1.104","TCP","54","35438 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16763","7.570882","172.30.1.104","172.30.1.205","TCP","54","49671 > 35442 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16764","7.570887","172.30.1.104","172.30.1.205","TCP","54","49671 > 35434 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16765","7.570890","172.30.1.205","172.30.1.104","TCP","54","35434 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16766","7.570896","172.30.1.104","172.30.1.205","TCP","54","49671 > 35398 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16767","7.570900","172.30.1.104","172.30.1.205","TCP","54","49671 > 35398 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16768","7.570902","172.30.1.205","172.30.1.104","TCP","54","35398 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16769","7.570911","172.30.1.104","172.30.1.205","TCP","54","49671 > 35442 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16770","7.570913","172.30.1.205","172.30.1.104","TCP","54","35442 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16771","7.570914","172.30.1.104","172.30.1.205","TCP","54","49671 > 35426 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "16772","7.570916","172.30.1.205","172.30.1.104","TCP","54","35426 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "16773","7.571499","172.30.1.205","172.30.1.104","TCP","54","42808 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16774","7.571623","172.30.1.205","172.30.1.104","TCP","74","35446 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910798 TSecr=0 WS=128" "16775","7.571748","172.30.1.104","172.30.1.205","TCP","54","135 > 42808 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16776","7.571760","172.30.1.104","172.30.1.205","TCP","54","135 > 42808 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16777","7.571764","172.30.1.205","172.30.1.104","TCP","54","42808 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16778","7.571880","172.30.1.104","172.30.1.205","TCP","66","49671 > 35446 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16779","7.571888","172.30.1.205","172.30.1.104","TCP","54","35446 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16780","7.572242","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16781","7.572514","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16782","7.572521","172.30.1.205","172.30.1.104","TCP","54","35446 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16783","7.574427","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16784","7.574791","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16785","7.574798","172.30.1.205","172.30.1.104","TCP","54","35446 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16786","7.576173","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16787","7.577866","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16788","7.577875","172.30.1.205","172.30.1.104","TCP","54","35446 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16789","7.578836","172.30.1.205","172.30.1.104","TCP","74","42812 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910805 TSecr=0 WS=128" "16790","7.579125","172.30.1.104","172.30.1.205","TCP","66","135 > 42812 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16791","7.579136","172.30.1.205","172.30.1.104","TCP","54","42812 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16792","7.579481","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16793","7.579758","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16794","7.579767","172.30.1.205","172.30.1.104","TCP","54","42812 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16795","7.582004","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16796","7.582373","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16797","7.582379","172.30.1.205","172.30.1.104","TCP","54","42812 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16798","7.584182","172.30.1.205","172.30.1.104","TCP","54","42812 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16799","7.584291","172.30.1.205","172.30.1.104","TCP","74","35450 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910810 TSecr=0 WS=128" "16800","7.584468","172.30.1.104","172.30.1.205","TCP","54","135 > 42812 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16801","7.584491","172.30.1.104","172.30.1.205","TCP","54","135 > 42812 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16802","7.584496","172.30.1.205","172.30.1.104","TCP","54","42812 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16803","7.584587","172.30.1.104","172.30.1.205","TCP","66","49671 > 35450 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16804","7.584595","172.30.1.205","172.30.1.104","TCP","54","35450 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16805","7.584971","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16806","7.585264","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16807","7.585272","172.30.1.205","172.30.1.104","TCP","54","35450 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16808","7.587138","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16809","7.587490","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16810","7.587496","172.30.1.205","172.30.1.104","TCP","54","35450 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16811","7.588861","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16812","7.590708","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16813","7.590717","172.30.1.205","172.30.1.104","TCP","54","35450 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16814","7.591654","172.30.1.205","172.30.1.104","TCP","74","42816 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910818 TSecr=0 WS=128" "16815","7.591939","172.30.1.104","172.30.1.205","TCP","66","135 > 42816 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16816","7.591949","172.30.1.205","172.30.1.104","TCP","54","42816 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16817","7.592296","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16818","7.592567","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16819","7.592576","172.30.1.205","172.30.1.104","TCP","54","42816 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16820","7.594860","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16821","7.595264","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16822","7.595271","172.30.1.205","172.30.1.104","TCP","54","42816 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16823","7.597100","172.30.1.205","172.30.1.104","TCP","54","42816 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16824","7.597209","172.30.1.205","172.30.1.104","TCP","74","35454 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910823 TSecr=0 WS=128" "16825","7.597365","172.30.1.104","172.30.1.205","TCP","54","135 > 42816 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16826","7.597376","172.30.1.104","172.30.1.205","TCP","54","135 > 42816 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16827","7.597381","172.30.1.205","172.30.1.104","TCP","54","42816 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16828","7.597464","172.30.1.104","172.30.1.205","TCP","66","49671 > 35454 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16829","7.597472","172.30.1.205","172.30.1.104","TCP","54","35454 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16830","7.597827","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16831","7.598105","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16832","7.598113","172.30.1.205","172.30.1.104","TCP","54","35454 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16833","7.599969","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16834","7.600339","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16835","7.600345","172.30.1.205","172.30.1.104","TCP","54","35454 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16836","7.601708","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16837","7.603476","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16838","7.603485","172.30.1.205","172.30.1.104","TCP","54","35454 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16839","7.604404","172.30.1.205","172.30.1.104","TCP","74","42820 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910830 TSecr=0 WS=128" "16840","7.604676","172.30.1.104","172.30.1.205","TCP","66","135 > 42820 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16841","7.604686","172.30.1.205","172.30.1.104","TCP","54","42820 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16842","7.605063","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16843","7.605393","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16844","7.605402","172.30.1.205","172.30.1.104","TCP","54","42820 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16845","7.607577","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16846","7.608007","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16847","7.608014","172.30.1.205","172.30.1.104","TCP","54","42820 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16848","7.609861","172.30.1.205","172.30.1.104","TCP","54","42820 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16849","7.609972","172.30.1.205","172.30.1.104","TCP","74","35458 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910836 TSecr=0 WS=128" "16850","7.610123","172.30.1.104","172.30.1.205","TCP","54","135 > 42820 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16851","7.610151","172.30.1.104","172.30.1.205","TCP","54","135 > 42820 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16852","7.610156","172.30.1.205","172.30.1.104","TCP","54","42820 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16853","7.610260","172.30.1.104","172.30.1.205","TCP","66","49671 > 35458 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16854","7.610268","172.30.1.205","172.30.1.104","TCP","54","35458 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16855","7.610612","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16856","7.610909","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16857","7.610918","172.30.1.205","172.30.1.104","TCP","54","35458 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16858","7.612813","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16859","7.613210","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16860","7.613216","172.30.1.205","172.30.1.104","TCP","54","35458 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16861","7.614559","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16862","7.616366","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16863","7.616375","172.30.1.205","172.30.1.104","TCP","54","35458 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16864","7.617329","172.30.1.205","172.30.1.104","TCP","74","42824 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910843 TSecr=0 WS=128" "16865","7.617618","172.30.1.104","172.30.1.205","TCP","66","135 > 42824 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16866","7.617629","172.30.1.205","172.30.1.104","TCP","54","42824 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16867","7.617971","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16868","7.618262","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16869","7.618271","172.30.1.205","172.30.1.104","TCP","54","42824 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16870","7.620436","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16871","7.620831","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16872","7.620838","172.30.1.205","172.30.1.104","TCP","54","42824 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16873","7.622653","172.30.1.205","172.30.1.104","TCP","54","42824 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16874","7.622763","172.30.1.205","172.30.1.104","TCP","74","35462 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910849 TSecr=0 WS=128" "16875","7.622954","172.30.1.104","172.30.1.205","TCP","54","135 > 42824 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16876","7.622976","172.30.1.104","172.30.1.205","TCP","54","135 > 42824 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16877","7.622982","172.30.1.205","172.30.1.104","TCP","54","42824 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16878","7.623028","172.30.1.104","172.30.1.205","TCP","66","49671 > 35462 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16879","7.623036","172.30.1.205","172.30.1.104","TCP","54","35462 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16880","7.623374","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16881","7.623684","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16882","7.623694","172.30.1.205","172.30.1.104","TCP","54","35462 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16883","7.625612","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16884","7.625991","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16885","7.625998","172.30.1.205","172.30.1.104","TCP","54","35462 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16886","7.627339","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16887","7.629063","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16888","7.629072","172.30.1.205","172.30.1.104","TCP","54","35462 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16889","7.630008","172.30.1.205","172.30.1.104","TCP","74","42828 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910856 TSecr=0 WS=128" "16890","7.630301","172.30.1.104","172.30.1.205","TCP","66","135 > 42828 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16891","7.630311","172.30.1.205","172.30.1.104","TCP","54","42828 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16892","7.630655","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16893","7.630962","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16894","7.630971","172.30.1.205","172.30.1.104","TCP","54","42828 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16895","7.633170","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16896","7.633574","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16897","7.633580","172.30.1.205","172.30.1.104","TCP","54","42828 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16898","7.635396","172.30.1.205","172.30.1.104","TCP","54","42828 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16899","7.635502","172.30.1.205","172.30.1.104","TCP","74","35466 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910861 TSecr=0 WS=128" "16900","7.635656","172.30.1.104","172.30.1.205","TCP","54","135 > 42828 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16901","7.635678","172.30.1.104","172.30.1.205","TCP","54","135 > 42828 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16902","7.635683","172.30.1.205","172.30.1.104","TCP","54","42828 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16903","7.635782","172.30.1.104","172.30.1.205","TCP","66","49671 > 35466 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16904","7.635790","172.30.1.205","172.30.1.104","TCP","54","35466 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16905","7.636132","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16906","7.636469","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16907","7.636478","172.30.1.205","172.30.1.104","TCP","54","35466 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16908","7.638385","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16909","7.638773","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16910","7.638779","172.30.1.205","172.30.1.104","TCP","54","35466 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16911","7.640123","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16912","7.641955","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16913","7.641971","172.30.1.205","172.30.1.104","TCP","54","35466 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16914","7.642914","172.30.1.205","172.30.1.104","TCP","74","42832 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910869 TSecr=0 WS=128" "16915","7.643199","172.30.1.104","172.30.1.205","TCP","66","135 > 42832 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16916","7.643208","172.30.1.205","172.30.1.104","TCP","54","42832 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16917","7.643554","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16918","7.643821","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16919","7.643830","172.30.1.205","172.30.1.104","TCP","54","42832 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16920","7.646022","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16921","7.646432","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16922","7.646438","172.30.1.205","172.30.1.104","TCP","54","42832 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16923","7.648263","172.30.1.205","172.30.1.104","TCP","54","42832 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16924","7.648374","172.30.1.205","172.30.1.104","TCP","74","35470 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910874 TSecr=0 WS=128" "16925","7.648544","172.30.1.104","172.30.1.205","TCP","54","135 > 42832 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16926","7.648564","172.30.1.104","172.30.1.205","TCP","54","135 > 42832 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16927","7.648569","172.30.1.205","172.30.1.104","TCP","54","42832 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16928","7.648656","172.30.1.104","172.30.1.205","TCP","66","49671 > 35470 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16929","7.648664","172.30.1.205","172.30.1.104","TCP","54","35470 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16930","7.649037","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16931","7.649307","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16932","7.649315","172.30.1.205","172.30.1.104","TCP","54","35470 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16933","7.651175","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16934","7.652184","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16935","7.652190","172.30.1.205","172.30.1.104","TCP","54","35470 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16936","7.653568","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16937","7.657166","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16938","7.657176","172.30.1.205","172.30.1.104","TCP","54","35470 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16939","7.658139","172.30.1.205","172.30.1.104","TCP","74","42836 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910884 TSecr=0 WS=128" "16940","7.658806","172.30.1.104","172.30.1.205","TCP","66","135 > 42836 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16941","7.658817","172.30.1.205","172.30.1.104","TCP","54","42836 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16942","7.659176","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16943","7.659462","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16944","7.659471","172.30.1.205","172.30.1.104","TCP","54","42836 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16945","7.661749","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16946","7.662195","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16947","7.662201","172.30.1.205","172.30.1.104","TCP","54","42836 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16948","7.664018","172.30.1.205","172.30.1.104","TCP","54","42836 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16949","7.664127","172.30.1.205","172.30.1.104","TCP","74","35474 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910890 TSecr=0 WS=128" "16950","7.664290","172.30.1.104","172.30.1.205","TCP","54","135 > 42836 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16951","7.664329","172.30.1.104","172.30.1.205","TCP","54","135 > 42836 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16952","7.664335","172.30.1.205","172.30.1.104","TCP","54","42836 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16953","7.664411","172.30.1.104","172.30.1.205","TCP","66","49671 > 35474 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16954","7.664419","172.30.1.205","172.30.1.104","TCP","54","35474 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16955","7.664758","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16956","7.665118","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16957","7.665127","172.30.1.205","172.30.1.104","TCP","54","35474 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16958","7.666996","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16959","7.667397","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16960","7.667404","172.30.1.205","172.30.1.104","TCP","54","35474 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16961","7.668751","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16962","7.670599","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16963","7.670608","172.30.1.205","172.30.1.104","TCP","54","35474 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16964","7.671543","172.30.1.205","172.30.1.104","TCP","74","42840 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910897 TSecr=0 WS=128" "16965","7.671838","172.30.1.104","172.30.1.205","TCP","66","135 > 42840 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16966","7.671848","172.30.1.205","172.30.1.104","TCP","54","42840 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16967","7.672194","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16968","7.672479","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16969","7.672488","172.30.1.205","172.30.1.104","TCP","54","42840 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16970","7.674682","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16971","7.675104","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16972","7.675110","172.30.1.205","172.30.1.104","TCP","54","42840 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16973","7.676938","172.30.1.205","172.30.1.104","TCP","54","42840 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16974","7.677048","172.30.1.205","172.30.1.104","TCP","74","35478 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910903 TSecr=0 WS=128" "16975","7.677225","172.30.1.104","172.30.1.205","TCP","54","135 > 42840 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16976","7.677300","172.30.1.104","172.30.1.205","TCP","54","135 > 42840 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "16977","7.677306","172.30.1.205","172.30.1.104","TCP","54","42840 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "16978","7.677381","172.30.1.104","172.30.1.205","TCP","66","49671 > 35478 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16979","7.677389","172.30.1.205","172.30.1.104","TCP","54","35478 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16980","7.677731","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "16981","7.678026","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16982","7.678036","172.30.1.205","172.30.1.104","TCP","54","35478 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16983","7.679908","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "16984","7.680268","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "16985","7.680275","172.30.1.205","172.30.1.104","TCP","54","35478 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "16986","7.681671","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "16987","7.683561","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "16988","7.683570","172.30.1.205","172.30.1.104","TCP","54","35478 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "16989","7.684516","172.30.1.205","172.30.1.104","TCP","74","42844 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910910 TSecr=0 WS=128" "16990","7.684842","172.30.1.104","172.30.1.205","TCP","66","135 > 42844 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "16991","7.684852","172.30.1.205","172.30.1.104","TCP","54","42844 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "16992","7.685212","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "16993","7.685513","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "16994","7.685521","172.30.1.205","172.30.1.104","TCP","54","42844 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "16995","7.687703","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "16996","7.688132","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "16997","7.688139","172.30.1.205","172.30.1.104","TCP","54","42844 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "16998","7.689975","172.30.1.205","172.30.1.104","TCP","54","42844 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "16999","7.690086","172.30.1.205","172.30.1.104","TCP","74","35482 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910916 TSecr=0 WS=128" "17000","7.690233","172.30.1.104","172.30.1.205","TCP","54","135 > 42844 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17001","7.690254","172.30.1.104","172.30.1.205","TCP","54","135 > 42844 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17002","7.690260","172.30.1.205","172.30.1.104","TCP","54","42844 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17003","7.690357","172.30.1.104","172.30.1.205","TCP","66","49671 > 35482 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17004","7.690365","172.30.1.205","172.30.1.104","TCP","54","35482 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17005","7.690726","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17006","7.691039","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17007","7.691049","172.30.1.205","172.30.1.104","TCP","54","35482 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17008","7.692961","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17009","7.693343","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17010","7.693349","172.30.1.205","172.30.1.104","TCP","54","35482 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17011","7.694688","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17012","7.696519","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17013","7.696528","172.30.1.205","172.30.1.104","TCP","54","35482 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17014","7.697500","172.30.1.205","172.30.1.104","TCP","74","42848 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910923 TSecr=0 WS=128" "17015","7.697851","172.30.1.104","172.30.1.205","TCP","66","135 > 42848 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17016","7.697861","172.30.1.205","172.30.1.104","TCP","54","42848 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17017","7.698215","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17018","7.698531","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17019","7.698540","172.30.1.205","172.30.1.104","TCP","54","42848 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17020","7.700712","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17021","7.701136","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17022","7.701143","172.30.1.205","172.30.1.104","TCP","54","42848 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17023","7.702947","172.30.1.205","172.30.1.104","TCP","54","42848 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17024","7.703058","172.30.1.205","172.30.1.104","TCP","74","35486 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910929 TSecr=0 WS=128" "17025","7.703259","172.30.1.104","172.30.1.205","TCP","54","135 > 42848 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17026","7.703285","172.30.1.104","172.30.1.205","TCP","54","135 > 42848 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17027","7.703291","172.30.1.205","172.30.1.104","TCP","54","42848 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17028","7.703389","172.30.1.104","172.30.1.205","TCP","66","49671 > 35486 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17029","7.703397","172.30.1.205","172.30.1.104","TCP","54","35486 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17030","7.703748","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17031","7.705221","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17032","7.705229","172.30.1.205","172.30.1.104","TCP","54","35486 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17033","7.707112","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17034","7.707528","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17035","7.707534","172.30.1.205","172.30.1.104","TCP","54","35486 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17036","7.708896","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17037","7.710734","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17038","7.710745","172.30.1.205","172.30.1.104","TCP","54","35486 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17039","7.711687","172.30.1.205","172.30.1.104","TCP","74","42852 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910938 TSecr=0 WS=128" "17040","7.712007","172.30.1.104","172.30.1.205","TCP","66","135 > 42852 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17041","7.712018","172.30.1.205","172.30.1.104","TCP","54","42852 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17042","7.712363","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17043","7.712684","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17044","7.712693","172.30.1.205","172.30.1.104","TCP","54","42852 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17045","7.714893","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17046","7.715344","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17047","7.715351","172.30.1.205","172.30.1.104","TCP","54","42852 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17048","7.717195","172.30.1.205","172.30.1.104","TCP","54","42852 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17049","7.717308","172.30.1.205","172.30.1.104","TCP","74","35490 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910943 TSecr=0 WS=128" "17050","7.717483","172.30.1.104","172.30.1.205","TCP","54","135 > 42852 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17051","7.717509","172.30.1.104","172.30.1.205","TCP","54","135 > 42852 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17052","7.717518","172.30.1.205","172.30.1.104","TCP","54","42852 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17053","7.717617","172.30.1.104","172.30.1.205","TCP","66","49671 > 35490 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17054","7.717628","172.30.1.205","172.30.1.104","TCP","54","35490 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17055","7.718028","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17056","7.718350","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17057","7.718360","172.30.1.205","172.30.1.104","TCP","54","35490 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17058","7.720285","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17059","7.720693","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17060","7.720700","172.30.1.205","172.30.1.104","TCP","54","35490 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17061","7.722083","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17062","7.723890","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17063","7.723900","172.30.1.205","172.30.1.104","TCP","54","35490 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17064","7.724878","172.30.1.205","172.30.1.104","TCP","74","42856 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910951 TSecr=0 WS=128" "17065","7.725205","172.30.1.104","172.30.1.205","TCP","66","135 > 42856 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17066","7.725216","172.30.1.205","172.30.1.104","TCP","54","42856 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17067","7.725576","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17068","7.725878","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17069","7.725886","172.30.1.205","172.30.1.104","TCP","54","42856 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17070","7.728073","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17071","7.728488","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17072","7.728495","172.30.1.205","172.30.1.104","TCP","54","42856 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17073","7.729377","172.30.1.205","172.30.1.104","TCP","54","35450 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17074","7.729428","172.30.1.205","172.30.1.104","TCP","54","35454 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17075","7.729461","172.30.1.205","172.30.1.104","TCP","54","35458 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17076","7.729490","172.30.1.205","172.30.1.104","TCP","54","35462 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17077","7.729513","172.30.1.205","172.30.1.104","TCP","54","35466 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17078","7.729539","172.30.1.205","172.30.1.104","TCP","54","35470 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17079","7.729567","172.30.1.205","172.30.1.104","TCP","54","35474 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17080","7.729593","172.30.1.205","172.30.1.104","TCP","54","35478 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17081","7.729616","172.30.1.205","172.30.1.104","TCP","54","35482 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17082","7.729637","172.30.1.205","172.30.1.104","TCP","54","35486 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17083","7.729667","172.30.1.205","172.30.1.104","TCP","54","35490 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17084","7.729677","172.30.1.104","172.30.1.205","TCP","54","49671 > 35450 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17085","7.729763","172.30.1.205","172.30.1.104","TCP","54","35446 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17086","7.729868","172.30.1.104","172.30.1.205","TCP","54","49671 > 35454 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17087","7.729878","172.30.1.104","172.30.1.205","TCP","54","49671 > 35450 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17088","7.729885","172.30.1.205","172.30.1.104","TCP","54","35450 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17089","7.729993","172.30.1.104","172.30.1.205","TCP","54","49671 > 35454 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17090","7.729998","172.30.1.205","172.30.1.104","TCP","54","35454 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17091","7.730000","172.30.1.104","172.30.1.205","TCP","54","49671 > 35458 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17092","7.730006","172.30.1.104","172.30.1.205","TCP","54","49671 > 35462 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17093","7.730009","172.30.1.104","172.30.1.205","TCP","54","49671 > 35466 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17094","7.730060","172.30.1.104","172.30.1.205","TCP","54","49671 > 35458 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17095","7.730065","172.30.1.205","172.30.1.104","TCP","54","35458 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17096","7.730112","172.30.1.104","172.30.1.205","TCP","54","49671 > 35470 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17097","7.730157","172.30.1.104","172.30.1.205","TCP","54","49671 > 35470 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17098","7.730165","172.30.1.205","172.30.1.104","TCP","54","35470 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17099","7.730187","172.30.1.104","172.30.1.205","TCP","54","49671 > 35462 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17100","7.730191","172.30.1.205","172.30.1.104","TCP","54","35462 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17101","7.730216","172.30.1.104","172.30.1.205","TCP","54","49671 > 35466 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17102","7.730220","172.30.1.205","172.30.1.104","TCP","54","35466 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17103","7.730247","172.30.1.104","172.30.1.205","TCP","54","49671 > 35474 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17104","7.730277","172.30.1.104","172.30.1.205","TCP","54","49671 > 35482 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17105","7.730307","172.30.1.104","172.30.1.205","TCP","54","49671 > 35486 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17106","7.730336","172.30.1.104","172.30.1.205","TCP","54","49671 > 35478 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17107","7.730367","172.30.1.104","172.30.1.205","TCP","54","49671 > 35486 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17108","7.730372","172.30.1.205","172.30.1.104","TCP","54","35486 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17109","7.730398","172.30.1.104","172.30.1.205","TCP","54","49671 > 35482 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17110","7.730402","172.30.1.205","172.30.1.104","TCP","54","35482 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17111","7.730428","172.30.1.104","172.30.1.205","TCP","54","49671 > 35474 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17112","7.730432","172.30.1.205","172.30.1.104","TCP","54","35474 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17113","7.730459","172.30.1.104","172.30.1.205","TCP","54","49671 > 35478 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17114","7.730462","172.30.1.205","172.30.1.104","TCP","54","35478 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17115","7.730876","172.30.1.104","172.30.1.205","TCP","54","49671 > 35490 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17116","7.730903","172.30.1.104","172.30.1.205","TCP","54","49671 > 35446 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17117","7.731013","172.30.1.104","172.30.1.205","TCP","54","49671 > 35490 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17118","7.731019","172.30.1.205","172.30.1.104","TCP","54","35490 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17119","7.731043","172.30.1.104","172.30.1.205","TCP","54","49671 > 35446 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17120","7.731046","172.30.1.205","172.30.1.104","TCP","54","35446 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17121","7.731359","172.30.1.205","172.30.1.104","TCP","54","42856 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17122","7.731476","172.30.1.205","172.30.1.104","TCP","74","35494 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910957 TSecr=0 WS=128" "17123","7.731627","172.30.1.104","172.30.1.205","TCP","54","135 > 42856 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17124","7.731656","172.30.1.104","172.30.1.205","TCP","54","135 > 42856 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17125","7.731661","172.30.1.205","172.30.1.104","TCP","54","42856 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17126","7.731767","172.30.1.104","172.30.1.205","TCP","66","49671 > 35494 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17127","7.731775","172.30.1.205","172.30.1.104","TCP","54","35494 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17128","7.732143","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17129","7.732451","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17130","7.732459","172.30.1.205","172.30.1.104","TCP","54","35494 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17131","7.734384","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17132","7.735727","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17133","7.735733","172.30.1.205","172.30.1.104","TCP","54","35494 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17134","7.737132","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17135","7.738885","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17136","7.738894","172.30.1.205","172.30.1.104","TCP","54","35494 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17137","7.739849","172.30.1.205","172.30.1.104","TCP","74","42860 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910966 TSecr=0 WS=128" "17138","7.740157","172.30.1.104","172.30.1.205","TCP","66","135 > 42860 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17139","7.740171","172.30.1.205","172.30.1.104","TCP","54","42860 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17140","7.740535","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17141","7.740850","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17142","7.740860","172.30.1.205","172.30.1.104","TCP","54","42860 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17143","7.743061","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17144","7.743468","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17145","7.743475","172.30.1.205","172.30.1.104","TCP","54","42860 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17146","7.745302","172.30.1.205","172.30.1.104","TCP","54","42860 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17147","7.745416","172.30.1.205","172.30.1.104","TCP","74","35498 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910971 TSecr=0 WS=128" "17148","7.745603","172.30.1.104","172.30.1.205","TCP","54","135 > 42860 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17149","7.745631","172.30.1.104","172.30.1.205","TCP","54","135 > 42860 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17150","7.745637","172.30.1.205","172.30.1.104","TCP","54","42860 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17151","7.745742","172.30.1.104","172.30.1.205","TCP","66","49671 > 35498 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17152","7.745750","172.30.1.205","172.30.1.104","TCP","54","35498 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17153","7.746097","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17154","7.746424","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17155","7.746438","172.30.1.205","172.30.1.104","TCP","54","35498 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17156","7.748407","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17157","7.748816","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17158","7.748823","172.30.1.205","172.30.1.104","TCP","54","35498 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17159","7.750185","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17160","7.751982","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17161","7.751994","172.30.1.205","172.30.1.104","TCP","54","35498 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17162","7.752961","172.30.1.205","172.30.1.104","TCP","74","42864 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910979 TSecr=0 WS=128" "17163","7.753333","172.30.1.104","172.30.1.205","TCP","66","135 > 42864 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17164","7.753344","172.30.1.205","172.30.1.104","TCP","54","42864 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17165","7.753694","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17166","7.754032","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17167","7.754042","172.30.1.205","172.30.1.104","TCP","54","42864 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17168","7.756235","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17169","7.756664","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17170","7.756671","172.30.1.205","172.30.1.104","TCP","54","42864 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17171","7.758504","172.30.1.205","172.30.1.104","TCP","54","42864 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17172","7.758616","172.30.1.205","172.30.1.104","TCP","74","35502 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910985 TSecr=0 WS=128" "17173","7.758794","172.30.1.104","172.30.1.205","TCP","54","135 > 42864 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17174","7.758820","172.30.1.104","172.30.1.205","TCP","54","135 > 42864 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17175","7.758826","172.30.1.205","172.30.1.104","TCP","54","42864 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17176","7.758917","172.30.1.104","172.30.1.205","TCP","66","49671 > 35502 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17177","7.758925","172.30.1.205","172.30.1.104","TCP","54","35502 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17178","7.759275","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17179","7.759823","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17180","7.759832","172.30.1.205","172.30.1.104","TCP","54","35502 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17181","7.761728","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17182","7.762277","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17183","7.762286","172.30.1.205","172.30.1.104","TCP","54","35502 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17184","7.763751","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17185","7.767907","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17186","7.767916","172.30.1.205","172.30.1.104","TCP","54","35502 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17187","7.768887","172.30.1.205","172.30.1.104","TCP","74","42868 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499910995 TSecr=0 WS=128" "17188","7.769210","172.30.1.104","172.30.1.205","TCP","66","135 > 42868 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17189","7.769222","172.30.1.205","172.30.1.104","TCP","54","42868 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17190","7.769583","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17191","7.769911","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17192","7.769920","172.30.1.205","172.30.1.104","TCP","54","42868 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17193","7.772130","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17194","7.772559","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17195","7.772570","172.30.1.205","172.30.1.104","TCP","54","42868 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17196","7.774492","172.30.1.205","172.30.1.104","TCP","54","42868 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17197","7.774624","172.30.1.205","172.30.1.104","TCP","74","35506 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911001 TSecr=0 WS=128" "17198","7.775001","172.30.1.104","172.30.1.205","TCP","54","135 > 42868 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17199","7.775011","172.30.1.104","172.30.1.205","TCP","54","135 > 42868 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17200","7.775016","172.30.1.205","172.30.1.104","TCP","54","42868 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17201","7.775022","172.30.1.104","172.30.1.205","TCP","66","49671 > 35506 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17202","7.775030","172.30.1.205","172.30.1.104","TCP","54","35506 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17203","7.775391","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17204","7.775686","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17205","7.775695","172.30.1.205","172.30.1.104","TCP","54","35506 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17206","7.777625","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17207","7.778011","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17208","7.778017","172.30.1.205","172.30.1.104","TCP","54","35506 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17209","7.779365","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17210","7.781124","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17211","7.781135","172.30.1.205","172.30.1.104","TCP","54","35506 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17212","7.782092","172.30.1.205","172.30.1.104","TCP","74","42872 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911008 TSecr=0 WS=128" "17213","7.782414","172.30.1.104","172.30.1.205","TCP","66","135 > 42872 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17214","7.782425","172.30.1.205","172.30.1.104","TCP","54","42872 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17215","7.782775","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17216","7.783148","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17217","7.783157","172.30.1.205","172.30.1.104","TCP","54","42872 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17218","7.785426","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17219","7.785857","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17220","7.785863","172.30.1.205","172.30.1.104","TCP","54","42872 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17221","7.787668","172.30.1.205","172.30.1.104","TCP","54","42872 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17222","7.787777","172.30.1.205","172.30.1.104","TCP","74","35510 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911014 TSecr=0 WS=128" "17223","7.787956","172.30.1.104","172.30.1.205","TCP","54","135 > 42872 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17224","7.787986","172.30.1.104","172.30.1.205","TCP","54","135 > 42872 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17225","7.787992","172.30.1.205","172.30.1.104","TCP","54","42872 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17226","7.788125","172.30.1.104","172.30.1.205","TCP","66","49671 > 35510 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17227","7.788133","172.30.1.205","172.30.1.104","TCP","54","35510 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17228","7.788474","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17229","7.788807","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17230","7.788816","172.30.1.205","172.30.1.104","TCP","54","35510 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17231","7.790695","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17232","7.791326","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17233","7.791332","172.30.1.205","172.30.1.104","TCP","54","35510 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17234","7.792669","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17235","7.794440","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17236","7.794450","172.30.1.205","172.30.1.104","TCP","54","35510 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17237","7.795378","172.30.1.205","172.30.1.104","TCP","74","42876 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911021 TSecr=0 WS=128" "17238","7.795714","172.30.1.104","172.30.1.205","TCP","66","135 > 42876 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17239","7.795725","172.30.1.205","172.30.1.104","TCP","54","42876 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17240","7.796069","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17241","7.796401","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17242","7.796410","172.30.1.205","172.30.1.104","TCP","54","42876 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17243","7.798604","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17244","7.799006","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17245","7.799013","172.30.1.205","172.30.1.104","TCP","54","42876 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17246","7.800834","172.30.1.205","172.30.1.104","TCP","54","42876 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17247","7.800945","172.30.1.205","172.30.1.104","TCP","74","35514 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911027 TSecr=0 WS=128" "17248","7.801130","172.30.1.104","172.30.1.205","TCP","54","135 > 42876 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17249","7.801159","172.30.1.104","172.30.1.205","TCP","54","135 > 42876 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17250","7.801165","172.30.1.205","172.30.1.104","TCP","54","42876 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17251","7.801306","172.30.1.104","172.30.1.205","TCP","66","49671 > 35514 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17252","7.801322","172.30.1.205","172.30.1.104","TCP","54","35514 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17253","7.801933","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17254","7.802258","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17255","7.802266","172.30.1.205","172.30.1.104","TCP","54","35514 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17256","7.804137","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17257","7.804539","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17258","7.804546","172.30.1.205","172.30.1.104","TCP","54","35514 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17259","7.805927","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17260","7.807686","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17261","7.807704","172.30.1.205","172.30.1.104","TCP","54","35514 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17262","7.808767","172.30.1.205","172.30.1.104","TCP","74","42880 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911035 TSecr=0 WS=128" "17263","7.809087","172.30.1.104","172.30.1.205","TCP","66","135 > 42880 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17264","7.809098","172.30.1.205","172.30.1.104","TCP","54","42880 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17265","7.809445","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17266","7.809771","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17267","7.809780","172.30.1.205","172.30.1.104","TCP","54","42880 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17268","7.811961","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17269","7.812358","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17270","7.812365","172.30.1.205","172.30.1.104","TCP","54","42880 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17271","7.814199","172.30.1.205","172.30.1.104","TCP","54","42880 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17272","7.814309","172.30.1.205","172.30.1.104","TCP","74","35518 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911040 TSecr=0 WS=128" "17273","7.814478","172.30.1.104","172.30.1.205","TCP","54","135 > 42880 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17274","7.814507","172.30.1.104","172.30.1.205","TCP","54","135 > 42880 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17275","7.814519","172.30.1.205","172.30.1.104","TCP","54","42880 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17276","7.814657","172.30.1.104","172.30.1.205","TCP","66","49671 > 35518 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17277","7.814665","172.30.1.205","172.30.1.104","TCP","54","35518 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17278","7.815006","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17279","7.816554","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17280","7.816561","172.30.1.205","172.30.1.104","TCP","54","35518 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17281","7.818453","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17282","7.818853","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17283","7.818860","172.30.1.205","172.30.1.104","TCP","54","35518 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17284","7.820229","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17285","7.822076","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17286","7.822087","172.30.1.205","172.30.1.104","TCP","54","35518 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17287","7.823048","172.30.1.205","172.30.1.104","TCP","74","42884 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911049 TSecr=0 WS=128" "17288","7.823351","172.30.1.104","172.30.1.205","TCP","66","135 > 42884 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17289","7.823362","172.30.1.205","172.30.1.104","TCP","54","42884 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17290","7.823718","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17291","7.824025","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17292","7.824034","172.30.1.205","172.30.1.104","TCP","54","42884 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17293","7.826257","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17294","7.826698","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17295","7.826705","172.30.1.205","172.30.1.104","TCP","54","42884 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17296","7.828506","172.30.1.205","172.30.1.104","TCP","54","42884 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17297","7.828616","172.30.1.205","172.30.1.104","TCP","74","35522 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911055 TSecr=0 WS=128" "17298","7.828795","172.30.1.104","172.30.1.205","TCP","54","135 > 42884 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17299","7.828828","172.30.1.104","172.30.1.205","TCP","54","135 > 42884 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17300","7.828835","172.30.1.205","172.30.1.104","TCP","54","42884 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17301","7.828978","172.30.1.104","172.30.1.205","TCP","66","49671 > 35522 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17302","7.828986","172.30.1.205","172.30.1.104","TCP","54","35522 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17303","7.829338","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17304","7.829647","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17305","7.829655","172.30.1.205","172.30.1.104","TCP","54","35522 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17306","7.831529","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17307","7.831907","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17308","7.831913","172.30.1.205","172.30.1.104","TCP","54","35522 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17309","7.833299","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17310","7.835047","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17311","7.835058","172.30.1.205","172.30.1.104","TCP","54","35522 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17312","7.836015","172.30.1.205","172.30.1.104","TCP","74","42888 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911062 TSecr=0 WS=128" "17313","7.836324","172.30.1.104","172.30.1.205","TCP","66","135 > 42888 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17314","7.836334","172.30.1.205","172.30.1.104","TCP","54","42888 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17315","7.836678","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17316","7.836979","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17317","7.836989","172.30.1.205","172.30.1.104","TCP","54","42888 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17318","7.839169","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17319","7.839540","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17320","7.839547","172.30.1.205","172.30.1.104","TCP","54","42888 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17321","7.841369","172.30.1.205","172.30.1.104","TCP","54","42888 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17322","7.841477","172.30.1.205","172.30.1.104","TCP","74","35526 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911067 TSecr=0 WS=128" "17323","7.841621","172.30.1.104","172.30.1.205","TCP","54","135 > 42888 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17324","7.841641","172.30.1.104","172.30.1.205","TCP","54","135 > 42888 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17325","7.841646","172.30.1.205","172.30.1.104","TCP","54","42888 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17326","7.841775","172.30.1.104","172.30.1.205","TCP","66","49671 > 35526 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17327","7.841792","172.30.1.205","172.30.1.104","TCP","54","35526 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17328","7.842137","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17329","7.842422","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17330","7.842430","172.30.1.205","172.30.1.104","TCP","54","35526 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17331","7.844290","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17332","7.844647","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17333","7.844653","172.30.1.205","172.30.1.104","TCP","54","35526 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17334","7.846016","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17335","7.847747","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17336","7.847756","172.30.1.205","172.30.1.104","TCP","54","35526 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17337","7.848678","172.30.1.205","172.30.1.104","TCP","74","42892 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911075 TSecr=0 WS=128" "17338","7.848957","172.30.1.104","172.30.1.205","TCP","66","135 > 42892 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17339","7.848968","172.30.1.205","172.30.1.104","TCP","54","42892 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17340","7.849318","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17341","7.849623","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17342","7.849631","172.30.1.205","172.30.1.104","TCP","54","42892 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17343","7.851843","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17344","7.852228","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17345","7.852234","172.30.1.205","172.30.1.104","TCP","54","42892 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17346","7.854055","172.30.1.205","172.30.1.104","TCP","54","42892 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17347","7.854167","172.30.1.205","172.30.1.104","TCP","74","35530 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911080 TSecr=0 WS=128" "17348","7.854336","172.30.1.104","172.30.1.205","TCP","54","135 > 42892 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17349","7.854360","172.30.1.104","172.30.1.205","TCP","54","135 > 42892 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17350","7.854372","172.30.1.205","172.30.1.104","TCP","54","42892 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17351","7.854469","172.30.1.104","172.30.1.205","TCP","66","49671 > 35530 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17352","7.854478","172.30.1.205","172.30.1.104","TCP","54","35530 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17353","7.854818","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17354","7.855129","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17355","7.855141","172.30.1.205","172.30.1.104","TCP","54","35530 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17356","7.857148","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17357","7.857555","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17358","7.857562","172.30.1.205","172.30.1.104","TCP","54","35530 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17359","7.858942","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17360","7.860733","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17361","7.860743","172.30.1.205","172.30.1.104","TCP","54","35530 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17362","7.861709","172.30.1.205","172.30.1.104","TCP","74","42896 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911088 TSecr=0 WS=128" "17363","7.862057","172.30.1.104","172.30.1.205","TCP","66","135 > 42896 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17364","7.862068","172.30.1.205","172.30.1.104","TCP","54","42896 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17365","7.862419","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17366","7.862758","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17367","7.862771","172.30.1.205","172.30.1.104","TCP","54","42896 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17368","7.865074","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17369","7.865487","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17370","7.865494","172.30.1.205","172.30.1.104","TCP","54","42896 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17371","7.867301","172.30.1.205","172.30.1.104","TCP","54","42896 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17372","7.867420","172.30.1.205","172.30.1.104","TCP","74","35534 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911093 TSecr=0 WS=128" "17373","7.867619","172.30.1.104","172.30.1.205","TCP","54","135 > 42896 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17374","7.867645","172.30.1.104","172.30.1.205","TCP","54","135 > 42896 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17375","7.867651","172.30.1.205","172.30.1.104","TCP","54","42896 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17376","7.867694","172.30.1.104","172.30.1.205","TCP","66","49671 > 35534 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17377","7.867703","172.30.1.205","172.30.1.104","TCP","54","35534 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17378","7.868059","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17379","7.868341","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17380","7.868350","172.30.1.205","172.30.1.104","TCP","54","35534 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17381","7.870286","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17382","7.870636","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17383","7.870643","172.30.1.205","172.30.1.104","TCP","54","35534 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17384","7.871985","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17385","7.873763","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17386","7.873772","172.30.1.205","172.30.1.104","TCP","54","35534 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17387","7.874727","172.30.1.205","172.30.1.104","TCP","74","42900 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911101 TSecr=0 WS=128" "17388","7.875034","172.30.1.104","172.30.1.205","TCP","66","135 > 42900 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17389","7.875045","172.30.1.205","172.30.1.104","TCP","54","42900 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17390","7.875393","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17391","7.875700","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17392","7.875708","172.30.1.205","172.30.1.104","TCP","54","42900 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17393","7.877929","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17394","7.878339","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17395","7.878346","172.30.1.205","172.30.1.104","TCP","54","42900 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17396","7.880151","172.30.1.205","172.30.1.104","TCP","54","42900 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17397","7.880262","172.30.1.205","172.30.1.104","TCP","74","35538 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911106 TSecr=0 WS=128" "17398","7.880439","172.30.1.104","172.30.1.205","TCP","54","135 > 42900 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17399","7.880462","172.30.1.104","172.30.1.205","TCP","54","135 > 42900 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17400","7.880468","172.30.1.205","172.30.1.104","TCP","54","42900 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17401","7.880546","172.30.1.104","172.30.1.205","TCP","66","49671 > 35538 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17402","7.880554","172.30.1.205","172.30.1.104","TCP","54","35538 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17403","7.880929","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17404","7.881218","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17405","7.881226","172.30.1.205","172.30.1.104","TCP","54","35538 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17406","7.883104","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17407","7.883473","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17408","7.883479","172.30.1.205","172.30.1.104","TCP","54","35538 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17409","7.884846","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17410","7.886564","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17411","7.886575","172.30.1.205","172.30.1.104","TCP","54","35538 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17412","7.887547","172.30.1.205","172.30.1.104","TCP","74","42904 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911113 TSecr=0 WS=128" "17413","7.887872","172.30.1.104","172.30.1.205","TCP","66","135 > 42904 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17414","7.887882","172.30.1.205","172.30.1.104","TCP","54","42904 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17415","7.888230","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17416","7.888514","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17417","7.888522","172.30.1.205","172.30.1.104","TCP","54","42904 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17418","7.890720","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17419","7.891094","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17420","7.891100","172.30.1.205","172.30.1.104","TCP","54","42904 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17421","7.891950","172.30.1.205","172.30.1.104","TCP","54","35498 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17422","7.891998","172.30.1.205","172.30.1.104","TCP","54","35502 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17423","7.892033","172.30.1.205","172.30.1.104","TCP","54","35506 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17424","7.892066","172.30.1.205","172.30.1.104","TCP","54","35510 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17425","7.892093","172.30.1.205","172.30.1.104","TCP","54","35514 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17426","7.892120","172.30.1.205","172.30.1.104","TCP","54","35518 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17427","7.892150","172.30.1.205","172.30.1.104","TCP","54","35522 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17428","7.892177","172.30.1.205","172.30.1.104","TCP","54","35526 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17429","7.892204","172.30.1.205","172.30.1.104","TCP","54","35530 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17430","7.892232","172.30.1.205","172.30.1.104","TCP","54","35534 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17431","7.892262","172.30.1.205","172.30.1.104","TCP","54","35538 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17432","7.892331","172.30.1.205","172.30.1.104","TCP","54","35494 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17433","7.892509","172.30.1.104","172.30.1.205","TCP","54","49671 > 35498 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17434","7.892522","172.30.1.104","172.30.1.205","TCP","54","49671 > 35502 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17435","7.892547","172.30.1.104","172.30.1.205","TCP","54","49671 > 35498 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17436","7.892554","172.30.1.205","172.30.1.104","TCP","54","35498 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17437","7.892567","172.30.1.104","172.30.1.205","TCP","54","49671 > 35506 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17438","7.892590","172.30.1.104","172.30.1.205","TCP","54","49671 > 35510 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17439","7.892609","172.30.1.104","172.30.1.205","TCP","54","49671 > 35514 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17440","7.892628","172.30.1.104","172.30.1.205","TCP","54","49671 > 35510 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17441","7.892633","172.30.1.205","172.30.1.104","TCP","54","35510 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17442","7.892649","172.30.1.104","172.30.1.205","TCP","54","49671 > 35518 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17443","7.892667","172.30.1.104","172.30.1.205","TCP","54","49671 > 35522 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17444","7.892687","172.30.1.104","172.30.1.205","TCP","54","49671 > 35526 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17445","7.892707","172.30.1.104","172.30.1.205","TCP","54","49671 > 35502 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17446","7.892716","172.30.1.205","172.30.1.104","TCP","54","35502 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17447","7.892740","172.30.1.104","172.30.1.205","TCP","54","49671 > 35530 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17448","7.892758","172.30.1.104","172.30.1.205","TCP","54","49671 > 35530 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17449","7.892761","172.30.1.205","172.30.1.104","TCP","54","35530 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17450","7.892788","172.30.1.104","172.30.1.205","TCP","54","49671 > 35534 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17451","7.892803","172.30.1.104","172.30.1.205","TCP","54","49671 > 35538 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17452","7.892814","172.30.1.104","172.30.1.205","TCP","54","49671 > 35526 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17453","7.892823","172.30.1.205","172.30.1.104","TCP","54","35526 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17454","7.892846","172.30.1.104","172.30.1.205","TCP","54","49671 > 35522 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17455","7.892850","172.30.1.205","172.30.1.104","TCP","54","35522 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17456","7.892866","172.30.1.104","172.30.1.205","TCP","54","49671 > 35518 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17457","7.892870","172.30.1.205","172.30.1.104","TCP","54","35518 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17458","7.892885","172.30.1.104","172.30.1.205","TCP","54","49671 > 35514 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17459","7.892888","172.30.1.205","172.30.1.104","TCP","54","35514 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17460","7.892905","172.30.1.104","172.30.1.205","TCP","54","49671 > 35538 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17461","7.892908","172.30.1.205","172.30.1.104","TCP","54","35538 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17462","7.892924","172.30.1.104","172.30.1.205","TCP","54","49671 > 35534 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17463","7.892927","172.30.1.205","172.30.1.104","TCP","54","35534 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17464","7.892944","172.30.1.104","172.30.1.205","TCP","54","49671 > 35506 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17465","7.892948","172.30.1.205","172.30.1.104","TCP","54","35506 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17466","7.892964","172.30.1.104","172.30.1.205","TCP","54","49671 > 35494 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17467","7.892985","172.30.1.104","172.30.1.205","TCP","54","49671 > 35494 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17468","7.892989","172.30.1.205","172.30.1.104","TCP","54","35494 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17469","7.893943","172.30.1.205","172.30.1.104","TCP","54","42904 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17470","7.894053","172.30.1.205","172.30.1.104","TCP","74","35542 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911120 TSecr=0 WS=128" "17471","7.894206","172.30.1.104","172.30.1.205","TCP","54","135 > 42904 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17472","7.894227","172.30.1.104","172.30.1.205","TCP","54","135 > 42904 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17473","7.894235","172.30.1.205","172.30.1.104","TCP","54","42904 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17474","7.894398","172.30.1.104","172.30.1.205","TCP","66","49671 > 35542 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17475","7.894406","172.30.1.205","172.30.1.104","TCP","54","35542 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17476","7.894755","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17477","7.895076","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17478","7.895085","172.30.1.205","172.30.1.104","TCP","54","35542 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17479","7.896987","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17480","7.897457","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17481","7.897463","172.30.1.205","172.30.1.104","TCP","54","35542 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17482","7.898817","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17483","7.900621","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17484","7.900635","172.30.1.205","172.30.1.104","TCP","54","35542 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17485","7.901627","172.30.1.205","172.30.1.104","TCP","74","42908 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911128 TSecr=0 WS=128" "17486","7.901973","172.30.1.104","172.30.1.205","TCP","66","135 > 42908 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17487","7.901984","172.30.1.205","172.30.1.104","TCP","54","42908 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17488","7.902340","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17489","7.902719","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17490","7.902727","172.30.1.205","172.30.1.104","TCP","54","42908 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17491","7.904938","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17492","7.905370","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17493","7.905377","172.30.1.205","172.30.1.104","TCP","54","42908 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17494","7.907192","172.30.1.205","172.30.1.104","TCP","54","42908 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17495","7.907303","172.30.1.205","172.30.1.104","TCP","74","35546 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911133 TSecr=0 WS=128" "17496","7.907474","172.30.1.104","172.30.1.205","TCP","54","135 > 42908 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17497","7.907501","172.30.1.104","172.30.1.205","TCP","54","135 > 42908 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17498","7.907507","172.30.1.205","172.30.1.104","TCP","54","42908 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17499","7.907662","172.30.1.104","172.30.1.205","TCP","66","49671 > 35546 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17500","7.907670","172.30.1.205","172.30.1.104","TCP","54","35546 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17501","7.908013","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17502","7.908331","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17503","7.908341","172.30.1.205","172.30.1.104","TCP","54","35546 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17504","7.910247","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17505","7.910646","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17506","7.910653","172.30.1.205","172.30.1.104","TCP","54","35546 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17507","7.912002","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17508","7.913824","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17509","7.913837","172.30.1.205","172.30.1.104","TCP","54","35546 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17510","7.914865","172.30.1.205","172.30.1.104","TCP","74","42912 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911141 TSecr=0 WS=128" "17511","7.915220","172.30.1.104","172.30.1.205","TCP","66","135 > 42912 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17512","7.915232","172.30.1.205","172.30.1.104","TCP","54","42912 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17513","7.915590","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17514","7.915904","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17515","7.915913","172.30.1.205","172.30.1.104","TCP","54","42912 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17516","7.918147","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17517","7.918564","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17518","7.918571","172.30.1.205","172.30.1.104","TCP","54","42912 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17519","7.920383","172.30.1.205","172.30.1.104","TCP","54","42912 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17520","7.920501","172.30.1.205","172.30.1.104","TCP","74","35550 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911146 TSecr=0 WS=128" "17521","7.920716","172.30.1.104","172.30.1.205","TCP","54","135 > 42912 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17522","7.920725","172.30.1.104","172.30.1.205","TCP","54","135 > 42912 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17523","7.920731","172.30.1.205","172.30.1.104","TCP","54","42912 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17524","7.920835","172.30.1.104","172.30.1.205","TCP","66","49671 > 35550 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17525","7.920845","172.30.1.205","172.30.1.104","TCP","54","35550 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17526","7.921199","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17527","7.921516","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17528","7.921526","172.30.1.205","172.30.1.104","TCP","54","35550 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17529","7.923415","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17530","7.923817","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17531","7.923823","172.30.1.205","172.30.1.104","TCP","54","35550 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17532","7.925204","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17533","7.927009","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17534","7.927019","172.30.1.205","172.30.1.104","TCP","54","35550 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17535","7.927985","172.30.1.205","172.30.1.104","TCP","74","42916 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911154 TSecr=0 WS=128" "17536","7.928297","172.30.1.104","172.30.1.205","TCP","66","135 > 42916 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17537","7.928308","172.30.1.205","172.30.1.104","TCP","54","42916 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17538","7.928657","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17539","7.929007","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17540","7.929016","172.30.1.205","172.30.1.104","TCP","54","42916 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17541","7.931204","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17542","7.931610","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17543","7.931617","172.30.1.205","172.30.1.104","TCP","54","42916 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17544","7.933453","172.30.1.205","172.30.1.104","TCP","54","42916 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17545","7.933563","172.30.1.205","172.30.1.104","TCP","74","35554 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911159 TSecr=0 WS=128" "17546","7.933739","172.30.1.104","172.30.1.205","TCP","54","135 > 42916 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17547","7.933824","172.30.1.104","172.30.1.205","TCP","54","135 > 42916 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17548","7.933830","172.30.1.205","172.30.1.104","TCP","54","42916 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17549","7.933919","172.30.1.104","172.30.1.205","TCP","66","49671 > 35554 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17550","7.933927","172.30.1.205","172.30.1.104","TCP","54","35554 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17551","7.934277","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17552","7.934584","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17553","7.934593","172.30.1.205","172.30.1.104","TCP","54","35554 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17554","7.936479","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17555","7.936885","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17556","7.936892","172.30.1.205","172.30.1.104","TCP","54","35554 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17557","7.938258","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17558","7.940088","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17559","7.940100","172.30.1.205","172.30.1.104","TCP","54","35554 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17560","7.941094","172.30.1.205","172.30.1.104","TCP","74","42920 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911167 TSecr=0 WS=128" "17561","7.941418","172.30.1.104","172.30.1.205","TCP","66","135 > 42920 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17562","7.941429","172.30.1.205","172.30.1.104","TCP","54","42920 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17563","7.941776","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17564","7.942094","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17565","7.942103","172.30.1.205","172.30.1.104","TCP","54","42920 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17566","7.944273","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17567","7.944707","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17568","7.944713","172.30.1.205","172.30.1.104","TCP","54","42920 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17569","7.946534","172.30.1.205","172.30.1.104","TCP","54","42920 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17570","7.946645","172.30.1.205","172.30.1.104","TCP","74","35558 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911173 TSecr=0 WS=128" "17571","7.946848","172.30.1.104","172.30.1.205","TCP","54","135 > 42920 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17572","7.946857","172.30.1.104","172.30.1.205","TCP","54","135 > 42920 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17573","7.946863","172.30.1.205","172.30.1.104","TCP","54","42920 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17574","7.946957","172.30.1.104","172.30.1.205","TCP","66","49671 > 35558 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17575","7.946965","172.30.1.205","172.30.1.104","TCP","54","35558 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17576","7.947306","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17577","7.947671","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17578","7.947680","172.30.1.205","172.30.1.104","TCP","54","35558 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17579","7.949581","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17580","7.949962","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17581","7.949968","172.30.1.205","172.30.1.104","TCP","54","35558 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17582","7.951309","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17583","7.953860","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17584","7.953869","172.30.1.205","172.30.1.104","TCP","54","35558 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17585","7.954811","172.30.1.205","172.30.1.104","TCP","74","42924 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911181 TSecr=0 WS=128" "17586","7.955117","172.30.1.104","172.30.1.205","TCP","66","135 > 42924 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17587","7.955128","172.30.1.205","172.30.1.104","TCP","54","42924 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17588","7.955478","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17589","7.955801","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17590","7.955810","172.30.1.205","172.30.1.104","TCP","54","42924 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17591","7.958016","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17592","7.958431","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17593","7.958438","172.30.1.205","172.30.1.104","TCP","54","42924 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17594","7.960248","172.30.1.205","172.30.1.104","TCP","54","42924 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17595","7.960359","172.30.1.205","172.30.1.104","TCP","74","35562 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911186 TSecr=0 WS=128" "17596","7.960574","172.30.1.104","172.30.1.205","TCP","54","135 > 42924 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17597","7.960609","172.30.1.104","172.30.1.205","TCP","54","135 > 42924 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17598","7.960615","172.30.1.205","172.30.1.104","TCP","54","42924 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17599","7.960718","172.30.1.104","172.30.1.205","TCP","66","49671 > 35562 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17600","7.960726","172.30.1.205","172.30.1.104","TCP","54","35562 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17601","7.961091","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17602","7.961400","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17603","7.961416","172.30.1.205","172.30.1.104","TCP","54","35562 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17604","7.963285","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17605","7.963659","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17606","7.963666","172.30.1.205","172.30.1.104","TCP","54","35562 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17607","7.965044","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17608","7.966829","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17609","7.966838","172.30.1.205","172.30.1.104","TCP","54","35562 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17610","7.967779","172.30.1.205","172.30.1.104","TCP","74","42928 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911194 TSecr=0 WS=128" "17611","7.968075","172.30.1.104","172.30.1.205","TCP","66","135 > 42928 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17612","7.968085","172.30.1.205","172.30.1.104","TCP","54","42928 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17613","7.968427","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17614","7.968852","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17615","7.968861","172.30.1.205","172.30.1.104","TCP","54","42928 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17616","7.971043","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17617","7.971519","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17618","7.971525","172.30.1.205","172.30.1.104","TCP","54","42928 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17619","7.973338","172.30.1.205","172.30.1.104","TCP","54","42928 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17620","7.973448","172.30.1.205","172.30.1.104","TCP","74","35566 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911199 TSecr=0 WS=128" "17621","7.973621","172.30.1.104","172.30.1.205","TCP","54","135 > 42928 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17622","7.973667","172.30.1.104","172.30.1.205","TCP","54","135 > 42928 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17623","7.973672","172.30.1.205","172.30.1.104","TCP","54","42928 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17624","7.973792","172.30.1.104","172.30.1.205","TCP","66","49671 > 35566 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17625","7.973800","172.30.1.205","172.30.1.104","TCP","54","35566 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17626","7.974146","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17627","7.974495","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17628","7.974503","172.30.1.205","172.30.1.104","TCP","54","35566 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17629","7.976378","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17630","7.976751","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17631","7.976757","172.30.1.205","172.30.1.104","TCP","54","35566 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17632","7.978120","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17633","7.979889","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17634","7.979899","172.30.1.205","172.30.1.104","TCP","54","35566 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17635","7.980858","172.30.1.205","172.30.1.104","TCP","74","42932 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911207 TSecr=0 WS=128" "17636","7.981175","172.30.1.104","172.30.1.205","TCP","66","135 > 42932 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17637","7.981185","172.30.1.205","172.30.1.104","TCP","54","42932 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17638","7.981531","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17639","7.981875","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17640","7.981883","172.30.1.205","172.30.1.104","TCP","54","42932 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17641","7.984056","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17642","7.984446","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17643","7.984452","172.30.1.205","172.30.1.104","TCP","54","42932 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17644","7.986270","172.30.1.205","172.30.1.104","TCP","54","42932 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17645","7.986377","172.30.1.205","172.30.1.104","TCP","74","35570 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911212 TSecr=0 WS=128" "17646","7.986570","172.30.1.104","172.30.1.205","TCP","54","135 > 42932 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17647","7.986595","172.30.1.104","172.30.1.205","TCP","54","135 > 42932 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17648","7.986600","172.30.1.205","172.30.1.104","TCP","54","42932 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17649","7.986702","172.30.1.104","172.30.1.205","TCP","66","49671 > 35570 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17650","7.986710","172.30.1.205","172.30.1.104","TCP","54","35570 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17651","7.987062","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17652","7.987384","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17653","7.987392","172.30.1.205","172.30.1.104","TCP","54","35570 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17654","7.989261","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17655","7.989687","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17656","7.989695","172.30.1.205","172.30.1.104","TCP","54","35570 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17657","7.991041","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17658","7.992846","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17659","7.992859","172.30.1.205","172.30.1.104","TCP","54","35570 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17660","7.993799","172.30.1.205","172.30.1.104","TCP","74","42936 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911220 TSecr=0 WS=128" "17661","7.994103","172.30.1.104","172.30.1.205","TCP","66","135 > 42936 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17662","7.994114","172.30.1.205","172.30.1.104","TCP","54","42936 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17663","7.994462","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17664","7.994782","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17665","7.994791","172.30.1.205","172.30.1.104","TCP","54","42936 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17666","7.996976","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17667","7.997392","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17668","7.997399","172.30.1.205","172.30.1.104","TCP","54","42936 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17669","7.999185","172.30.1.205","172.30.1.104","TCP","54","42936 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17670","7.999294","172.30.1.205","172.30.1.104","TCP","74","35574 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911225 TSecr=0 WS=128" "17671","7.999501","172.30.1.104","172.30.1.205","TCP","54","135 > 42936 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17672","7.999544","172.30.1.104","172.30.1.205","TCP","54","135 > 42936 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17673","7.999549","172.30.1.205","172.30.1.104","TCP","54","42936 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17674","7.999643","172.30.1.104","172.30.1.205","TCP","66","49671 > 35574 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17675","7.999651","172.30.1.205","172.30.1.104","TCP","54","35574 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17676","7.999994","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17677","8.002503","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17678","8.002511","172.30.1.205","172.30.1.104","TCP","54","35574 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17679","8.004358","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17680","8.004762","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17681","8.004768","172.30.1.205","172.30.1.104","TCP","54","35574 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17682","8.006126","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17683","8.007967","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17684","8.007976","172.30.1.205","172.30.1.104","TCP","54","35574 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17685","8.008928","172.30.1.205","172.30.1.104","TCP","74","42940 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911235 TSecr=0 WS=128" "17686","8.009282","172.30.1.104","172.30.1.205","TCP","66","135 > 42940 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17687","8.009292","172.30.1.205","172.30.1.104","TCP","54","42940 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17688","8.009641","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17689","8.009957","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17690","8.009966","172.30.1.205","172.30.1.104","TCP","54","42940 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17691","8.012161","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17692","8.012615","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17693","8.012625","172.30.1.205","172.30.1.104","TCP","54","42940 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17694","8.014576","172.30.1.205","172.30.1.104","TCP","54","42940 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17695","8.014727","172.30.1.205","172.30.1.104","TCP","74","35578 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911241 TSecr=0 WS=128" "17696","8.014876","172.30.1.104","172.30.1.205","TCP","54","135 > 42940 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17697","8.014906","172.30.1.104","172.30.1.205","TCP","54","135 > 42940 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17698","8.014914","172.30.1.205","172.30.1.104","TCP","54","42940 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17699","8.015070","172.30.1.104","172.30.1.205","TCP","66","49671 > 35578 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17700","8.015079","172.30.1.205","172.30.1.104","TCP","54","35578 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17701","8.015436","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17702","8.015742","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17703","8.015751","172.30.1.205","172.30.1.104","TCP","54","35578 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17704","8.017684","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17705","8.018145","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17706","8.018151","172.30.1.205","172.30.1.104","TCP","54","35578 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17707","8.019514","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17708","8.021398","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17709","8.021408","172.30.1.205","172.30.1.104","TCP","54","35578 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17710","8.022415","172.30.1.205","172.30.1.104","TCP","74","42944 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911248 TSecr=0 WS=128" "17711","8.022753","172.30.1.104","172.30.1.205","TCP","66","135 > 42944 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17712","8.022765","172.30.1.205","172.30.1.104","TCP","54","42944 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17713","8.023120","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17714","8.026829","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17715","8.026839","172.30.1.205","172.30.1.104","TCP","54","42944 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17716","8.029122","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17717","8.029586","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17718","8.029593","172.30.1.205","172.30.1.104","TCP","54","42944 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17719","8.031455","172.30.1.205","172.30.1.104","TCP","54","42944 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17720","8.031607","172.30.1.205","172.30.1.104","TCP","74","35582 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911258 TSecr=0 WS=128" "17721","8.031747","172.30.1.104","172.30.1.205","TCP","54","135 > 42944 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17722","8.031824","172.30.1.104","172.30.1.205","TCP","54","135 > 42944 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17723","8.031831","172.30.1.205","172.30.1.104","TCP","54","42944 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17724","8.031943","172.30.1.104","172.30.1.205","TCP","66","49671 > 35582 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17725","8.031952","172.30.1.205","172.30.1.104","TCP","54","35582 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17726","8.032303","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17727","8.032648","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17728","8.032657","172.30.1.205","172.30.1.104","TCP","54","35582 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17729","8.034577","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17730","8.034953","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17731","8.034960","172.30.1.205","172.30.1.104","TCP","54","35582 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17732","8.036324","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17733","8.038113","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17734","8.038123","172.30.1.205","172.30.1.104","TCP","54","35582 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17735","8.039110","172.30.1.205","172.30.1.104","TCP","74","42948 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911265 TSecr=0 WS=128" "17736","8.039455","172.30.1.104","172.30.1.205","TCP","66","135 > 42948 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17737","8.039467","172.30.1.205","172.30.1.104","TCP","54","42948 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17738","8.039820","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17739","8.040130","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17740","8.040139","172.30.1.205","172.30.1.104","TCP","54","42948 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17741","8.042386","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17742","8.042783","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17743","8.042790","172.30.1.205","172.30.1.104","TCP","54","42948 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17744","8.044607","172.30.1.205","172.30.1.104","TCP","54","42948 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17745","8.044726","172.30.1.205","172.30.1.104","TCP","74","35586 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911271 TSecr=0 WS=128" "17746","8.044892","172.30.1.104","172.30.1.205","TCP","54","135 > 42948 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17747","8.044936","172.30.1.104","172.30.1.205","TCP","54","135 > 42948 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17748","8.044943","172.30.1.205","172.30.1.104","TCP","54","42948 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17749","8.045040","172.30.1.104","172.30.1.205","TCP","66","49671 > 35586 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17750","8.045048","172.30.1.205","172.30.1.104","TCP","54","35586 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17751","8.045395","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17752","8.045694","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17753","8.045703","172.30.1.205","172.30.1.104","TCP","54","35586 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17754","8.047602","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17755","8.048004","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17756","8.048010","172.30.1.205","172.30.1.104","TCP","54","35586 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17757","8.049414","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17758","8.051179","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17759","8.051189","172.30.1.205","172.30.1.104","TCP","54","35586 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17760","8.052162","172.30.1.205","172.30.1.104","TCP","74","42952 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911278 TSecr=0 WS=128" "17761","8.052476","172.30.1.104","172.30.1.205","TCP","66","135 > 42952 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17762","8.052487","172.30.1.205","172.30.1.104","TCP","54","42952 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17763","8.052879","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17764","8.053194","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17765","8.053203","172.30.1.205","172.30.1.104","TCP","54","42952 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17766","8.055393","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17767","8.055818","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17768","8.055825","172.30.1.205","172.30.1.104","TCP","54","42952 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17769","8.056677","172.30.1.205","172.30.1.104","TCP","54","35546 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17770","8.056731","172.30.1.205","172.30.1.104","TCP","54","35550 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17771","8.056763","172.30.1.205","172.30.1.104","TCP","54","35554 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17772","8.056821","172.30.1.205","172.30.1.104","TCP","54","35558 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17773","8.056857","172.30.1.205","172.30.1.104","TCP","54","35562 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17774","8.056886","172.30.1.205","172.30.1.104","TCP","54","35566 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17775","8.056910","172.30.1.205","172.30.1.104","TCP","54","35570 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17776","8.056938","172.30.1.205","172.30.1.104","TCP","54","35574 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17777","8.056960","172.30.1.205","172.30.1.104","TCP","54","35578 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17778","8.056982","172.30.1.205","172.30.1.104","TCP","54","35582 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17779","8.056991","172.30.1.104","172.30.1.205","TCP","54","49671 > 35546 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17780","8.057025","172.30.1.104","172.30.1.205","TCP","54","49671 > 35550 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17781","8.057040","172.30.1.205","172.30.1.104","TCP","54","35586 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17782","8.057054","172.30.1.104","172.30.1.205","TCP","54","49671 > 35546 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17783","8.057061","172.30.1.205","172.30.1.104","TCP","54","35546 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17784","8.057086","172.30.1.104","172.30.1.205","TCP","54","49671 > 35550 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17785","8.057089","172.30.1.205","172.30.1.104","TCP","54","35550 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17786","8.057146","172.30.1.205","172.30.1.104","TCP","54","35542 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "17787","8.057340","172.30.1.104","172.30.1.205","TCP","54","49671 > 35554 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17788","8.057371","172.30.1.104","172.30.1.205","TCP","54","49671 > 35558 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17789","8.057402","172.30.1.104","172.30.1.205","TCP","54","49671 > 35562 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17790","8.057434","172.30.1.104","172.30.1.205","TCP","54","49671 > 35566 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17791","8.057465","172.30.1.104","172.30.1.205","TCP","54","49671 > 35566 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17792","8.057471","172.30.1.205","172.30.1.104","TCP","54","35566 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17793","8.057493","172.30.1.104","172.30.1.205","TCP","54","49671 > 35554 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17794","8.057497","172.30.1.205","172.30.1.104","TCP","54","35554 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17795","8.057522","172.30.1.104","172.30.1.205","TCP","54","49671 > 35558 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17796","8.057526","172.30.1.205","172.30.1.104","TCP","54","35558 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17797","8.057556","172.30.1.104","172.30.1.205","TCP","54","49671 > 35562 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17798","8.057559","172.30.1.205","172.30.1.104","TCP","54","35562 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17799","8.057587","172.30.1.104","172.30.1.205","TCP","54","49671 > 35570 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17800","8.057633","172.30.1.104","172.30.1.205","TCP","54","49671 > 35574 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17801","8.057668","172.30.1.104","172.30.1.205","TCP","54","49671 > 35578 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17802","8.057709","172.30.1.104","172.30.1.205","TCP","54","49671 > 35582 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17803","8.057749","172.30.1.104","172.30.1.205","TCP","54","49671 > 35586 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17804","8.057774","172.30.1.104","172.30.1.205","TCP","54","49671 > 35586 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17805","8.057778","172.30.1.205","172.30.1.104","TCP","54","35586 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17806","8.057806","172.30.1.104","172.30.1.205","TCP","54","49671 > 35582 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17807","8.057809","172.30.1.205","172.30.1.104","TCP","54","35582 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17808","8.057837","172.30.1.104","172.30.1.205","TCP","54","49671 > 35570 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17809","8.057840","172.30.1.205","172.30.1.104","TCP","54","35570 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17810","8.057869","172.30.1.104","172.30.1.205","TCP","54","49671 > 35574 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17811","8.057873","172.30.1.205","172.30.1.104","TCP","54","35574 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17812","8.057901","172.30.1.104","172.30.1.205","TCP","54","49671 > 35578 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17813","8.057904","172.30.1.205","172.30.1.104","TCP","54","35578 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17814","8.058324","172.30.1.104","172.30.1.205","TCP","54","49671 > 35542 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17815","8.058379","172.30.1.104","172.30.1.205","TCP","54","49671 > 35542 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "17816","8.058385","172.30.1.205","172.30.1.104","TCP","54","35542 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "17817","8.058829","172.30.1.205","172.30.1.104","TCP","54","42952 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17818","8.058944","172.30.1.205","172.30.1.104","TCP","74","35590 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911285 TSecr=0 WS=128" "17819","8.059101","172.30.1.104","172.30.1.205","TCP","54","135 > 42952 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17820","8.059128","172.30.1.104","172.30.1.205","TCP","54","135 > 42952 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17821","8.059133","172.30.1.205","172.30.1.104","TCP","54","42952 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17822","8.059270","172.30.1.104","172.30.1.205","TCP","66","49671 > 35590 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17823","8.059279","172.30.1.205","172.30.1.104","TCP","54","35590 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17824","8.059640","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17825","8.059954","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17826","8.059963","172.30.1.205","172.30.1.104","TCP","54","35590 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17827","8.061921","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17828","8.062325","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17829","8.062331","172.30.1.205","172.30.1.104","TCP","54","35590 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17830","8.063712","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17831","8.065499","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17832","8.065509","172.30.1.205","172.30.1.104","TCP","54","35590 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17833","8.066512","172.30.1.205","172.30.1.104","TCP","74","42956 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911292 TSecr=0 WS=128" "17834","8.066854","172.30.1.104","172.30.1.205","TCP","66","135 > 42956 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17835","8.066867","172.30.1.205","172.30.1.104","TCP","54","42956 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17836","8.067230","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17837","8.067558","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17838","8.067567","172.30.1.205","172.30.1.104","TCP","54","42956 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17839","8.069824","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17840","8.070241","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17841","8.070248","172.30.1.205","172.30.1.104","TCP","54","42956 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17842","8.072075","172.30.1.205","172.30.1.104","TCP","54","42956 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17843","8.072215","172.30.1.205","172.30.1.104","TCP","74","35594 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911298 TSecr=0 WS=128" "17844","8.072368","172.30.1.104","172.30.1.205","TCP","54","135 > 42956 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17845","8.072401","172.30.1.104","172.30.1.205","TCP","54","135 > 42956 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17846","8.072409","172.30.1.205","172.30.1.104","TCP","54","42956 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17847","8.072585","172.30.1.104","172.30.1.205","TCP","66","49671 > 35594 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17848","8.072594","172.30.1.205","172.30.1.104","TCP","54","35594 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17849","8.072979","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17850","8.073307","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17851","8.073316","172.30.1.205","172.30.1.104","TCP","54","35594 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17852","8.075183","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17853","8.075560","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17854","8.075566","172.30.1.205","172.30.1.104","TCP","54","35594 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17855","8.076980","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17856","8.078819","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17857","8.078830","172.30.1.205","172.30.1.104","TCP","54","35594 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17858","8.079810","172.30.1.205","172.30.1.104","TCP","74","42960 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911306 TSecr=0 WS=128" "17859","8.080150","172.30.1.104","172.30.1.205","TCP","66","135 > 42960 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17860","8.080162","172.30.1.205","172.30.1.104","TCP","54","42960 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17861","8.080515","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17862","8.080831","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17863","8.080841","172.30.1.205","172.30.1.104","TCP","54","42960 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17864","8.083060","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17865","8.083501","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17866","8.083512","172.30.1.205","172.30.1.104","TCP","54","42960 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17867","8.085439","172.30.1.205","172.30.1.104","TCP","54","42960 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17868","8.085567","172.30.1.205","172.30.1.104","TCP","74","35598 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911311 TSecr=0 WS=128" "17869","8.085753","172.30.1.104","172.30.1.205","TCP","54","135 > 42960 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17870","8.085779","172.30.1.104","172.30.1.205","TCP","54","135 > 42960 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17871","8.085786","172.30.1.205","172.30.1.104","TCP","54","42960 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17872","8.085919","172.30.1.104","172.30.1.205","TCP","66","49671 > 35598 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17873","8.085928","172.30.1.205","172.30.1.104","TCP","54","35598 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17874","8.086290","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17875","8.086589","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17876","8.086600","172.30.1.205","172.30.1.104","TCP","54","35598 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17877","8.088471","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17878","8.088860","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17879","8.088867","172.30.1.205","172.30.1.104","TCP","54","35598 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17880","8.090251","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17881","8.092276","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17882","8.092286","172.30.1.205","172.30.1.104","TCP","54","35598 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17883","8.093258","172.30.1.205","172.30.1.104","TCP","74","42964 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911319 TSecr=0 WS=128" "17884","8.093604","172.30.1.104","172.30.1.205","TCP","66","135 > 42964 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17885","8.093615","172.30.1.205","172.30.1.104","TCP","54","42964 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17886","8.093966","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17887","8.094284","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17888","8.094299","172.30.1.205","172.30.1.104","TCP","54","42964 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17889","8.096479","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17890","8.096920","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17891","8.096927","172.30.1.205","172.30.1.104","TCP","54","42964 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17892","8.098745","172.30.1.205","172.30.1.104","TCP","54","42964 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17893","8.098856","172.30.1.205","172.30.1.104","TCP","74","35602 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911325 TSecr=0 WS=128" "17894","8.099077","172.30.1.104","172.30.1.205","TCP","54","135 > 42964 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17895","8.099103","172.30.1.104","172.30.1.205","TCP","54","135 > 42964 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17896","8.099109","172.30.1.205","172.30.1.104","TCP","54","42964 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17897","8.099238","172.30.1.104","172.30.1.205","TCP","66","49671 > 35602 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17898","8.099248","172.30.1.205","172.30.1.104","TCP","54","35602 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17899","8.099610","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17900","8.099995","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17901","8.100013","172.30.1.205","172.30.1.104","TCP","54","35602 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17902","8.102182","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17903","8.103754","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17904","8.103760","172.30.1.205","172.30.1.104","TCP","54","35602 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17905","8.105143","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17906","8.107081","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17907","8.107091","172.30.1.205","172.30.1.104","TCP","54","35602 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17908","8.108030","172.30.1.205","172.30.1.104","TCP","74","42968 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911334 TSecr=0 WS=128" "17909","8.108447","172.30.1.104","172.30.1.205","TCP","66","135 > 42968 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17910","8.108460","172.30.1.205","172.30.1.104","TCP","54","42968 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17911","8.108853","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17912","8.109156","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17913","8.109165","172.30.1.205","172.30.1.104","TCP","54","42968 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17914","8.111335","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17915","8.111772","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17916","8.111778","172.30.1.205","172.30.1.104","TCP","54","42968 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17917","8.113602","172.30.1.205","172.30.1.104","TCP","54","42968 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17918","8.113713","172.30.1.205","172.30.1.104","TCP","74","35606 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911340 TSecr=0 WS=128" "17919","8.113927","172.30.1.104","172.30.1.205","TCP","54","135 > 42968 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17920","8.113972","172.30.1.104","172.30.1.205","TCP","54","135 > 42968 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17921","8.113984","172.30.1.205","172.30.1.104","TCP","54","42968 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17922","8.114028","172.30.1.104","172.30.1.205","TCP","66","49671 > 35606 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17923","8.114040","172.30.1.205","172.30.1.104","TCP","54","35606 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17924","8.114438","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17925","8.114780","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17926","8.114789","172.30.1.205","172.30.1.104","TCP","54","35606 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17927","8.116704","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17928","8.117120","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17929","8.117127","172.30.1.205","172.30.1.104","TCP","54","35606 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17930","8.118482","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17931","8.120309","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17932","8.120320","172.30.1.205","172.30.1.104","TCP","54","35606 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17933","8.121299","172.30.1.205","172.30.1.104","TCP","74","42972 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911347 TSecr=0 WS=128" "17934","8.121608","172.30.1.104","172.30.1.205","TCP","66","135 > 42972 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17935","8.121619","172.30.1.205","172.30.1.104","TCP","54","42972 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17936","8.121965","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17937","8.124383","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17938","8.124392","172.30.1.205","172.30.1.104","TCP","54","42972 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17939","8.126612","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17940","8.127035","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17941","8.127041","172.30.1.205","172.30.1.104","TCP","54","42972 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17942","8.128876","172.30.1.205","172.30.1.104","TCP","54","42972 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17943","8.128996","172.30.1.205","172.30.1.104","TCP","74","35610 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911355 TSecr=0 WS=128" "17944","8.129194","172.30.1.104","172.30.1.205","TCP","54","135 > 42972 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17945","8.129288","172.30.1.104","172.30.1.205","TCP","66","49671 > 35610 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17946","8.129298","172.30.1.205","172.30.1.104","TCP","54","35610 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17947","8.129645","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17948","8.129778","172.30.1.104","172.30.1.205","TCP","54","135 > 42972 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17949","8.129784","172.30.1.205","172.30.1.104","TCP","54","42972 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17950","8.129954","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17951","8.129962","172.30.1.205","172.30.1.104","TCP","54","35610 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17952","8.131842","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17953","8.132230","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17954","8.132236","172.30.1.205","172.30.1.104","TCP","54","35610 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17955","8.133617","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17956","8.135477","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17957","8.135488","172.30.1.205","172.30.1.104","TCP","54","35610 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17958","8.136432","172.30.1.205","172.30.1.104","TCP","74","42976 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911362 TSecr=0 WS=128" "17959","8.136750","172.30.1.104","172.30.1.205","TCP","66","135 > 42976 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17960","8.136760","172.30.1.205","172.30.1.104","TCP","54","42976 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17961","8.137123","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17962","8.137458","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17963","8.137466","172.30.1.205","172.30.1.104","TCP","54","42976 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17964","8.139661","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17965","8.140075","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17966","8.140081","172.30.1.205","172.30.1.104","TCP","54","42976 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17967","8.141909","172.30.1.205","172.30.1.104","TCP","54","42976 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17968","8.142026","172.30.1.205","172.30.1.104","TCP","74","35614 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911368 TSecr=0 WS=128" "17969","8.142240","172.30.1.104","172.30.1.205","TCP","54","135 > 42976 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17970","8.142268","172.30.1.104","172.30.1.205","TCP","54","135 > 42976 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17971","8.142273","172.30.1.205","172.30.1.104","TCP","54","42976 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17972","8.142379","172.30.1.104","172.30.1.205","TCP","66","49671 > 35614 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17973","8.142387","172.30.1.205","172.30.1.104","TCP","54","35614 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17974","8.142732","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "17975","8.143072","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17976","8.143080","172.30.1.205","172.30.1.104","TCP","54","35614 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17977","8.144992","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "17978","8.145459","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "17979","8.145465","172.30.1.205","172.30.1.104","TCP","54","35614 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "17980","8.146813","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "17981","8.148620","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "17982","8.148635","172.30.1.205","172.30.1.104","TCP","54","35614 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "17983","8.149595","172.30.1.205","172.30.1.104","TCP","74","42980 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911376 TSecr=0 WS=128" "17984","8.149913","172.30.1.104","172.30.1.205","TCP","66","135 > 42980 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17985","8.149923","172.30.1.205","172.30.1.104","TCP","54","42980 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17986","8.150274","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "17987","8.150609","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "17988","8.150618","172.30.1.205","172.30.1.104","TCP","54","42980 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "17989","8.152833","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "17990","8.153261","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "17991","8.153267","172.30.1.205","172.30.1.104","TCP","54","42980 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "17992","8.155071","172.30.1.205","172.30.1.104","TCP","54","42980 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "17993","8.155183","172.30.1.205","172.30.1.104","TCP","74","35618 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911381 TSecr=0 WS=128" "17994","8.155366","172.30.1.104","172.30.1.205","TCP","54","135 > 42980 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17995","8.155395","172.30.1.104","172.30.1.205","TCP","54","135 > 42980 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "17996","8.155400","172.30.1.205","172.30.1.104","TCP","54","42980 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "17997","8.155502","172.30.1.104","172.30.1.205","TCP","66","49671 > 35618 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "17998","8.155511","172.30.1.205","172.30.1.104","TCP","54","35618 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "17999","8.155866","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18000","8.156177","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18001","8.156185","172.30.1.205","172.30.1.104","TCP","54","35618 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18002","8.158068","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18003","8.158479","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18004","8.158485","172.30.1.205","172.30.1.104","TCP","54","35618 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18005","8.159834","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18006","8.161623","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18007","8.161632","172.30.1.205","172.30.1.104","TCP","54","35618 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18008","8.162568","172.30.1.205","172.30.1.104","TCP","74","42984 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911388 TSecr=0 WS=128" "18009","8.162866","172.30.1.104","172.30.1.205","TCP","66","135 > 42984 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18010","8.162877","172.30.1.205","172.30.1.104","TCP","54","42984 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18011","8.163223","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18012","8.163533","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18013","8.163542","172.30.1.205","172.30.1.104","TCP","54","42984 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18014","8.165760","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18015","8.166215","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18016","8.166225","172.30.1.205","172.30.1.104","TCP","54","42984 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18017","8.168123","172.30.1.205","172.30.1.104","TCP","54","42984 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18018","8.168246","172.30.1.205","172.30.1.104","TCP","74","35622 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911394 TSecr=0 WS=128" "18019","8.168445","172.30.1.104","172.30.1.205","TCP","54","135 > 42984 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18020","8.168477","172.30.1.104","172.30.1.205","TCP","54","135 > 42984 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18021","8.168484","172.30.1.205","172.30.1.104","TCP","54","42984 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18022","8.168528","172.30.1.104","172.30.1.205","TCP","66","49671 > 35622 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18023","8.168537","172.30.1.205","172.30.1.104","TCP","54","35622 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18024","8.168920","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18025","8.169281","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18026","8.169288","172.30.1.205","172.30.1.104","TCP","54","35622 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18027","8.171156","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18028","8.173250","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18029","8.173263","172.30.1.205","172.30.1.104","TCP","54","35622 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18030","8.174626","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18031","8.176451","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18032","8.176463","172.30.1.205","172.30.1.104","TCP","54","35622 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18033","8.177468","172.30.1.205","172.30.1.104","TCP","74","42988 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911403 TSecr=0 WS=128" "18034","8.177814","172.30.1.104","172.30.1.205","TCP","66","135 > 42988 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18035","8.177825","172.30.1.205","172.30.1.104","TCP","54","42988 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18036","8.178185","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18037","8.178497","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18038","8.178506","172.30.1.205","172.30.1.104","TCP","54","42988 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18039","8.180720","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18040","8.181156","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18041","8.181162","172.30.1.205","172.30.1.104","TCP","54","42988 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18042","8.183006","172.30.1.205","172.30.1.104","TCP","54","42988 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18043","8.183120","172.30.1.205","172.30.1.104","TCP","74","35626 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911409 TSecr=0 WS=128" "18044","8.183299","172.30.1.104","172.30.1.205","TCP","54","135 > 42988 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18045","8.183344","172.30.1.104","172.30.1.205","TCP","54","135 > 42988 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18046","8.183349","172.30.1.205","172.30.1.104","TCP","54","42988 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18047","8.183450","172.30.1.104","172.30.1.205","TCP","66","49671 > 35626 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18048","8.183458","172.30.1.205","172.30.1.104","TCP","54","35626 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18049","8.183807","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18050","8.184125","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18051","8.184134","172.30.1.205","172.30.1.104","TCP","54","35626 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18052","8.186062","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18053","8.186453","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18054","8.186460","172.30.1.205","172.30.1.104","TCP","54","35626 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18055","8.187803","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18056","8.189604","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18057","8.189613","172.30.1.205","172.30.1.104","TCP","54","35626 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18058","8.190555","172.30.1.205","172.30.1.104","TCP","74","42992 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911416 TSecr=0 WS=128" "18059","8.190904","172.30.1.104","172.30.1.205","TCP","66","135 > 42992 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18060","8.190929","172.30.1.205","172.30.1.104","TCP","54","42992 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18061","8.191472","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18062","8.191786","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18063","8.191795","172.30.1.205","172.30.1.104","TCP","54","42992 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18064","8.194027","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18065","8.194462","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18066","8.194468","172.30.1.205","172.30.1.104","TCP","54","42992 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18067","8.196292","172.30.1.205","172.30.1.104","TCP","54","42992 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18068","8.196404","172.30.1.205","172.30.1.104","TCP","74","35630 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911422 TSecr=0 WS=128" "18069","8.196591","172.30.1.104","172.30.1.205","TCP","54","135 > 42992 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18070","8.196618","172.30.1.104","172.30.1.205","TCP","54","135 > 42992 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18071","8.196623","172.30.1.205","172.30.1.104","TCP","54","42992 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18072","8.196732","172.30.1.104","172.30.1.205","TCP","66","49671 > 35630 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18073","8.196740","172.30.1.205","172.30.1.104","TCP","54","35630 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18074","8.197113","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18075","8.198122","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18076","8.198130","172.30.1.205","172.30.1.104","TCP","54","35630 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18077","8.200022","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18078","8.200417","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18079","8.200423","172.30.1.205","172.30.1.104","TCP","54","35630 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18080","8.201814","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18081","8.203597","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18082","8.203606","172.30.1.205","172.30.1.104","TCP","54","35630 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18083","8.204528","172.30.1.205","172.30.1.104","TCP","74","42996 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911430 TSecr=0 WS=128" "18084","8.204846","172.30.1.104","172.30.1.205","TCP","66","135 > 42996 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18085","8.204858","172.30.1.205","172.30.1.104","TCP","54","42996 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18086","8.205215","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18087","8.205529","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18088","8.205538","172.30.1.205","172.30.1.104","TCP","54","42996 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18089","8.207725","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18090","8.208128","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18091","8.208135","172.30.1.205","172.30.1.104","TCP","54","42996 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18092","8.209956","172.30.1.205","172.30.1.104","TCP","54","42996 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18093","8.210071","172.30.1.205","172.30.1.104","TCP","74","35634 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911436 TSecr=0 WS=128" "18094","8.210231","172.30.1.104","172.30.1.205","TCP","54","135 > 42996 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18095","8.210261","172.30.1.104","172.30.1.205","TCP","54","135 > 42996 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18096","8.210267","172.30.1.205","172.30.1.104","TCP","54","42996 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18097","8.210374","172.30.1.104","172.30.1.205","TCP","66","49671 > 35634 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18098","8.210389","172.30.1.205","172.30.1.104","TCP","54","35634 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18099","8.210731","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18100","8.211027","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18101","8.211036","172.30.1.205","172.30.1.104","TCP","54","35634 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18102","8.212937","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18103","8.213370","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18104","8.213377","172.30.1.205","172.30.1.104","TCP","54","35634 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18105","8.214720","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18106","8.216612","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18107","8.216624","172.30.1.205","172.30.1.104","TCP","54","35634 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18108","8.217594","172.30.1.205","172.30.1.104","TCP","74","43000 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911444 TSecr=0 WS=128" "18109","8.217899","172.30.1.104","172.30.1.205","TCP","66","135 > 43000 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18110","8.217909","172.30.1.205","172.30.1.104","TCP","54","43000 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18111","8.218277","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18112","8.218582","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18113","8.218591","172.30.1.205","172.30.1.104","TCP","54","43000 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18114","8.220775","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18115","8.221226","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18116","8.221236","172.30.1.205","172.30.1.104","TCP","54","43000 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18117","8.222152","172.30.1.205","172.30.1.104","TCP","54","35594 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18118","8.222201","172.30.1.205","172.30.1.104","TCP","54","35598 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18119","8.222233","172.30.1.205","172.30.1.104","TCP","54","35602 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18120","8.222261","172.30.1.205","172.30.1.104","TCP","54","35606 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18121","8.222284","172.30.1.205","172.30.1.104","TCP","54","35610 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18122","8.222312","172.30.1.205","172.30.1.104","TCP","54","35614 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18123","8.222339","172.30.1.205","172.30.1.104","TCP","54","35618 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18124","8.222365","172.30.1.205","172.30.1.104","TCP","54","35622 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18125","8.222388","172.30.1.205","172.30.1.104","TCP","54","35626 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18126","8.222410","172.30.1.205","172.30.1.104","TCP","54","35630 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18127","8.222430","172.30.1.104","172.30.1.205","TCP","54","49671 > 35594 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18128","8.222450","172.30.1.205","172.30.1.104","TCP","54","35634 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18129","8.222529","172.30.1.205","172.30.1.104","TCP","54","35590 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18130","8.222584","172.30.1.104","172.30.1.205","TCP","54","49671 > 35598 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18131","8.222614","172.30.1.104","172.30.1.205","TCP","54","49671 > 35594 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18132","8.222621","172.30.1.205","172.30.1.104","TCP","54","35594 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18133","8.222637","172.30.1.104","172.30.1.205","TCP","54","49671 > 35598 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18134","8.222640","172.30.1.205","172.30.1.104","TCP","54","35598 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18135","8.222667","172.30.1.104","172.30.1.205","TCP","54","49671 > 35602 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18136","8.222694","172.30.1.104","172.30.1.205","TCP","54","49671 > 35606 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18137","8.222723","172.30.1.104","172.30.1.205","TCP","54","49671 > 35610 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18138","8.222752","172.30.1.104","172.30.1.205","TCP","54","49671 > 35602 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18139","8.222756","172.30.1.205","172.30.1.104","TCP","54","35602 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18140","8.222781","172.30.1.104","172.30.1.205","TCP","54","49671 > 35614 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18141","8.222810","172.30.1.104","172.30.1.205","TCP","54","49671 > 35614 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18142","8.222814","172.30.1.205","172.30.1.104","TCP","54","35614 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18143","8.222847","172.30.1.104","172.30.1.205","TCP","54","49671 > 35606 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18144","8.222851","172.30.1.205","172.30.1.104","TCP","54","35606 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18145","8.222888","172.30.1.104","172.30.1.205","TCP","54","49671 > 35610 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18146","8.222892","172.30.1.205","172.30.1.104","TCP","54","35610 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18147","8.222910","172.30.1.104","172.30.1.205","TCP","54","49671 > 35618 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18148","8.222939","172.30.1.104","172.30.1.205","TCP","54","49671 > 35622 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18149","8.222969","172.30.1.104","172.30.1.205","TCP","54","49671 > 35626 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18150","8.223003","172.30.1.104","172.30.1.205","TCP","54","49671 > 35630 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18151","8.223034","172.30.1.104","172.30.1.205","TCP","54","49671 > 35618 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18152","8.223039","172.30.1.205","172.30.1.104","TCP","54","35618 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18153","8.223064","172.30.1.104","172.30.1.205","TCP","54","49671 > 35630 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18154","8.223067","172.30.1.205","172.30.1.104","TCP","54","35630 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18155","8.223094","172.30.1.104","172.30.1.205","TCP","54","49671 > 35622 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18156","8.223097","172.30.1.205","172.30.1.104","TCP","54","35622 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18157","8.223133","172.30.1.104","172.30.1.205","TCP","54","49671 > 35626 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18158","8.223136","172.30.1.205","172.30.1.104","TCP","54","35626 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18159","8.223522","172.30.1.104","172.30.1.205","TCP","54","49671 > 35634 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18160","8.223548","172.30.1.104","172.30.1.205","TCP","54","49671 > 35590 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18161","8.223576","172.30.1.104","172.30.1.205","TCP","54","49671 > 35634 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18162","8.223581","172.30.1.205","172.30.1.104","TCP","54","35634 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18163","8.223686","172.30.1.104","172.30.1.205","TCP","54","49671 > 35590 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18164","8.223691","172.30.1.205","172.30.1.104","TCP","54","35590 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18165","8.224148","172.30.1.205","172.30.1.104","TCP","54","43000 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18166","8.224265","172.30.1.205","172.30.1.104","TCP","74","35638 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911450 TSecr=0 WS=128" "18167","8.224422","172.30.1.104","172.30.1.205","TCP","54","135 > 43000 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18168","8.224454","172.30.1.104","172.30.1.205","TCP","54","135 > 43000 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18169","8.224459","172.30.1.205","172.30.1.104","TCP","54","43000 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18170","8.224598","172.30.1.104","172.30.1.205","TCP","66","49671 > 35638 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18171","8.224609","172.30.1.205","172.30.1.104","TCP","54","35638 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18172","8.225000","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18173","8.225301","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18174","8.225308","172.30.1.205","172.30.1.104","TCP","54","35638 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18175","8.227190","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18176","8.227601","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18177","8.227607","172.30.1.205","172.30.1.104","TCP","54","35638 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18178","8.228981","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18179","8.230981","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18180","8.230990","172.30.1.205","172.30.1.104","TCP","54","35638 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18181","8.231920","172.30.1.205","172.30.1.104","TCP","74","43004 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911458 TSecr=0 WS=128" "18182","8.232249","172.30.1.104","172.30.1.205","TCP","66","135 > 43004 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18183","8.232259","172.30.1.205","172.30.1.104","TCP","54","43004 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18184","8.232604","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18185","8.232930","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18186","8.232940","172.30.1.205","172.30.1.104","TCP","54","43004 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18187","8.235116","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18188","8.235519","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18189","8.235526","172.30.1.205","172.30.1.104","TCP","54","43004 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18190","8.237347","172.30.1.205","172.30.1.104","TCP","54","43004 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18191","8.237455","172.30.1.205","172.30.1.104","TCP","74","35642 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911463 TSecr=0 WS=128" "18192","8.237675","172.30.1.104","172.30.1.205","TCP","54","135 > 43004 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18193","8.237693","172.30.1.104","172.30.1.205","TCP","54","135 > 43004 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18194","8.237700","172.30.1.205","172.30.1.104","TCP","54","43004 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18195","8.237818","172.30.1.104","172.30.1.205","TCP","66","49671 > 35642 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18196","8.237829","172.30.1.205","172.30.1.104","TCP","54","35642 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18197","8.238233","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18198","8.238564","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18199","8.238574","172.30.1.205","172.30.1.104","TCP","54","35642 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18200","8.240483","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18201","8.240890","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18202","8.240897","172.30.1.205","172.30.1.104","TCP","54","35642 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18203","8.242256","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18204","8.244095","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18205","8.244104","172.30.1.205","172.30.1.104","TCP","54","35642 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18206","8.245079","172.30.1.205","172.30.1.104","TCP","74","43008 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911471 TSecr=0 WS=128" "18207","8.245384","172.30.1.104","172.30.1.205","TCP","66","135 > 43008 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18208","8.245395","172.30.1.205","172.30.1.104","TCP","54","43008 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18209","8.245747","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18210","8.246084","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18211","8.246092","172.30.1.205","172.30.1.104","TCP","54","43008 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18212","8.248288","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18213","8.248741","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18214","8.248749","172.30.1.205","172.30.1.104","TCP","54","43008 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18215","8.250581","172.30.1.205","172.30.1.104","TCP","54","43008 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18216","8.250694","172.30.1.205","172.30.1.104","TCP","74","35646 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911477 TSecr=0 WS=128" "18217","8.250860","172.30.1.104","172.30.1.205","TCP","54","135 > 43008 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18218","8.250889","172.30.1.104","172.30.1.205","TCP","54","135 > 43008 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18219","8.250895","172.30.1.205","172.30.1.104","TCP","54","43008 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18220","8.250997","172.30.1.104","172.30.1.205","TCP","66","49671 > 35646 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18221","8.251005","172.30.1.205","172.30.1.104","TCP","54","35646 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18222","8.251360","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18223","8.251682","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18224","8.251691","172.30.1.205","172.30.1.104","TCP","54","35646 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18225","8.253619","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18226","8.254001","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18227","8.254007","172.30.1.205","172.30.1.104","TCP","54","35646 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18228","8.255356","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18229","8.257184","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18230","8.257193","172.30.1.205","172.30.1.104","TCP","54","35646 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18231","8.258152","172.30.1.205","172.30.1.104","TCP","74","43012 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911484 TSecr=0 WS=128" "18232","8.258457","172.30.1.104","172.30.1.205","TCP","66","135 > 43012 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18233","8.258468","172.30.1.205","172.30.1.104","TCP","54","43012 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18234","8.258819","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18235","8.259137","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18236","8.259146","172.30.1.205","172.30.1.104","TCP","54","43012 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18237","8.261364","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18238","8.261821","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18239","8.261828","172.30.1.205","172.30.1.104","TCP","54","43012 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18240","8.263665","172.30.1.205","172.30.1.104","TCP","54","43012 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18241","8.263777","172.30.1.205","172.30.1.104","TCP","74","35650 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911490 TSecr=0 WS=128" "18242","8.263996","172.30.1.104","172.30.1.205","TCP","54","135 > 43012 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18243","8.264032","172.30.1.104","172.30.1.205","TCP","54","135 > 43012 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18244","8.264037","172.30.1.205","172.30.1.104","TCP","54","43012 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18245","8.264143","172.30.1.104","172.30.1.205","TCP","66","49671 > 35650 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18246","8.264151","172.30.1.205","172.30.1.104","TCP","54","35650 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18247","8.264505","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18248","8.264853","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18249","8.264862","172.30.1.205","172.30.1.104","TCP","54","35650 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18250","8.266741","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18251","8.268316","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18252","8.268320","172.30.1.205","172.30.1.104","TCP","54","35650 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18253","8.269724","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18254","8.271643","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18255","8.271654","172.30.1.205","172.30.1.104","TCP","54","35650 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18256","8.272606","172.30.1.205","172.30.1.104","TCP","74","43016 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911499 TSecr=0 WS=128" "18257","8.272924","172.30.1.104","172.30.1.205","TCP","66","135 > 43016 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18258","8.272935","172.30.1.205","172.30.1.104","TCP","54","43016 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18259","8.273295","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18260","8.273605","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18261","8.273614","172.30.1.205","172.30.1.104","TCP","54","43016 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18262","8.275824","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18263","8.276246","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18264","8.276252","172.30.1.205","172.30.1.104","TCP","54","43016 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18265","8.278086","172.30.1.205","172.30.1.104","TCP","54","43016 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18266","8.278196","172.30.1.205","172.30.1.104","TCP","74","35654 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911504 TSecr=0 WS=128" "18267","8.278356","172.30.1.104","172.30.1.205","TCP","54","135 > 43016 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18268","8.278386","172.30.1.104","172.30.1.205","TCP","54","135 > 43016 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18269","8.278392","172.30.1.205","172.30.1.104","TCP","54","43016 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18270","8.278500","172.30.1.104","172.30.1.205","TCP","66","49671 > 35654 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18271","8.278508","172.30.1.205","172.30.1.104","TCP","54","35654 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18272","8.278858","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18273","8.279162","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18274","8.279171","172.30.1.205","172.30.1.104","TCP","54","35654 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18275","8.281094","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18276","8.281485","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18277","8.281491","172.30.1.205","172.30.1.104","TCP","54","35654 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18278","8.282840","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18279","8.285941","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18280","8.285950","172.30.1.205","172.30.1.104","TCP","54","35654 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18281","8.286907","172.30.1.205","172.30.1.104","TCP","74","43020 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911513 TSecr=0 WS=128" "18282","8.287263","172.30.1.104","172.30.1.205","TCP","66","135 > 43020 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18283","8.287273","172.30.1.205","172.30.1.104","TCP","54","43020 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18284","8.287636","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18285","8.287964","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18286","8.287973","172.30.1.205","172.30.1.104","TCP","54","43020 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18287","8.290219","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18288","8.290707","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18289","8.290714","172.30.1.205","172.30.1.104","TCP","54","43020 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18290","8.292541","172.30.1.205","172.30.1.104","TCP","54","43020 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18291","8.292652","172.30.1.205","172.30.1.104","TCP","74","35658 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911519 TSecr=0 WS=128" "18292","8.292887","172.30.1.104","172.30.1.205","TCP","54","135 > 43020 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18293","8.292964","172.30.1.104","172.30.1.205","TCP","66","49671 > 35658 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18294","8.292982","172.30.1.205","172.30.1.104","TCP","54","35658 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18295","8.293002","172.30.1.104","172.30.1.205","TCP","54","135 > 43020 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18296","8.293007","172.30.1.205","172.30.1.104","TCP","54","43020 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18297","8.293358","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18298","8.293679","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18299","8.293688","172.30.1.205","172.30.1.104","TCP","54","35658 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18300","8.295584","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18301","8.296007","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18302","8.296014","172.30.1.205","172.30.1.104","TCP","54","35658 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18303","8.297399","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18304","8.299221","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18305","8.299231","172.30.1.205","172.30.1.104","TCP","54","35658 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18306","8.300162","172.30.1.205","172.30.1.104","TCP","74","43024 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911526 TSecr=0 WS=128" "18307","8.300471","172.30.1.104","172.30.1.205","TCP","66","135 > 43024 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18308","8.300484","172.30.1.205","172.30.1.104","TCP","54","43024 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18309","8.300870","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18310","8.301180","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18311","8.301189","172.30.1.205","172.30.1.104","TCP","54","43024 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18312","8.303379","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18313","8.303772","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18314","8.303779","172.30.1.205","172.30.1.104","TCP","54","43024 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18315","8.305607","172.30.1.205","172.30.1.104","TCP","54","43024 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18316","8.305721","172.30.1.205","172.30.1.104","TCP","74","35662 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911532 TSecr=0 WS=128" "18317","8.305878","172.30.1.104","172.30.1.205","TCP","54","135 > 43024 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18318","8.305890","172.30.1.104","172.30.1.205","TCP","54","135 > 43024 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18319","8.305895","172.30.1.205","172.30.1.104","TCP","54","43024 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18320","8.306022","172.30.1.104","172.30.1.205","TCP","66","49671 > 35662 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18321","8.306032","172.30.1.205","172.30.1.104","TCP","54","35662 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18322","8.306378","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18323","8.306667","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18324","8.306675","172.30.1.205","172.30.1.104","TCP","54","35662 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18325","8.308557","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18326","8.308950","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18327","8.308957","172.30.1.205","172.30.1.104","TCP","54","35662 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18328","8.310324","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18329","8.312119","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18330","8.312129","172.30.1.205","172.30.1.104","TCP","54","35662 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18331","8.313097","172.30.1.205","172.30.1.104","TCP","74","43028 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911539 TSecr=0 WS=128" "18332","8.313385","172.30.1.104","172.30.1.205","TCP","66","135 > 43028 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18333","8.313396","172.30.1.205","172.30.1.104","TCP","54","43028 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18334","8.313743","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18335","8.314100","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18336","8.314110","172.30.1.205","172.30.1.104","TCP","54","43028 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18337","8.316303","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18338","8.316710","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18339","8.316717","172.30.1.205","172.30.1.104","TCP","54","43028 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18340","8.318551","172.30.1.205","172.30.1.104","TCP","54","43028 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18341","8.318664","172.30.1.205","172.30.1.104","TCP","74","35666 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911545 TSecr=0 WS=128" "18342","8.318815","172.30.1.104","172.30.1.205","TCP","54","135 > 43028 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18343","8.318823","172.30.1.104","172.30.1.205","TCP","54","135 > 43028 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18344","8.318829","172.30.1.205","172.30.1.104","TCP","54","43028 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18345","8.318931","172.30.1.104","172.30.1.205","TCP","66","49671 > 35666 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18346","8.318940","172.30.1.205","172.30.1.104","TCP","54","35666 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18347","8.319285","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18348","8.319589","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18349","8.319598","172.30.1.205","172.30.1.104","TCP","54","35666 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18350","8.321512","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18351","8.321876","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18352","8.321883","172.30.1.205","172.30.1.104","TCP","54","35666 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18353","8.323230","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18354","8.325230","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18355","8.325240","172.30.1.205","172.30.1.104","TCP","54","35666 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18356","8.326197","172.30.1.205","172.30.1.104","TCP","74","43032 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911552 TSecr=0 WS=128" "18357","8.326522","172.30.1.104","172.30.1.205","TCP","66","135 > 43032 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18358","8.326533","172.30.1.205","172.30.1.104","TCP","54","43032 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18359","8.326882","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18360","8.327188","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18361","8.327197","172.30.1.205","172.30.1.104","TCP","54","43032 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18362","8.329400","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18363","8.329792","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18364","8.329802","172.30.1.205","172.30.1.104","TCP","54","43032 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18365","8.331621","172.30.1.205","172.30.1.104","TCP","54","43032 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18366","8.331734","172.30.1.205","172.30.1.104","TCP","74","35670 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911558 TSecr=0 WS=128" "18367","8.331910","172.30.1.104","172.30.1.205","TCP","54","135 > 43032 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18368","8.331987","172.30.1.104","172.30.1.205","TCP","54","135 > 43032 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18369","8.331992","172.30.1.205","172.30.1.104","TCP","54","43032 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18370","8.332121","172.30.1.104","172.30.1.205","TCP","66","49671 > 35670 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18371","8.332130","172.30.1.205","172.30.1.104","TCP","54","35670 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18372","8.332473","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18373","8.332828","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18374","8.332837","172.30.1.205","172.30.1.104","TCP","54","35670 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18375","8.334700","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18376","8.335070","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18377","8.335076","172.30.1.205","172.30.1.104","TCP","54","35670 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18378","8.336419","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18379","8.338193","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18380","8.338202","172.30.1.205","172.30.1.104","TCP","54","35670 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18381","8.339150","172.30.1.205","172.30.1.104","TCP","74","43036 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911565 TSecr=0 WS=128" "18382","8.339614","172.30.1.104","172.30.1.205","TCP","66","135 > 43036 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18383","8.339624","172.30.1.205","172.30.1.104","TCP","54","43036 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18384","8.339972","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18385","8.340269","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18386","8.340278","172.30.1.205","172.30.1.104","TCP","54","43036 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18387","8.342491","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18388","8.342852","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18389","8.342859","172.30.1.205","172.30.1.104","TCP","54","43036 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18390","8.344680","172.30.1.205","172.30.1.104","TCP","54","43036 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18391","8.344821","172.30.1.205","172.30.1.104","TCP","74","35674 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911571 TSecr=0 WS=128" "18392","8.344943","172.30.1.104","172.30.1.205","TCP","54","135 > 43036 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18393","8.344953","172.30.1.104","172.30.1.205","TCP","54","135 > 43036 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18394","8.344958","172.30.1.205","172.30.1.104","TCP","54","43036 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18395","8.345077","172.30.1.104","172.30.1.205","TCP","66","49671 > 35674 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18396","8.345085","172.30.1.205","172.30.1.104","TCP","54","35674 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18397","8.345430","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18398","8.345721","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18399","8.345728","172.30.1.205","172.30.1.104","TCP","54","35674 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18400","8.347592","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18401","8.347962","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18402","8.347969","172.30.1.205","172.30.1.104","TCP","54","35674 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18403","8.349355","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18404","8.351110","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18405","8.351119","172.30.1.205","172.30.1.104","TCP","54","35674 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18406","8.352069","172.30.1.205","172.30.1.104","TCP","74","43040 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911578 TSecr=0 WS=128" "18407","8.352353","172.30.1.104","172.30.1.205","TCP","66","135 > 43040 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18408","8.352363","172.30.1.205","172.30.1.104","TCP","54","43040 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18409","8.352718","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18410","8.353044","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18411","8.353057","172.30.1.205","172.30.1.104","TCP","54","43040 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18412","8.355441","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18413","8.355831","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18414","8.355840","172.30.1.205","172.30.1.104","TCP","54","43040 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18415","8.357690","172.30.1.205","172.30.1.104","TCP","54","43040 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18416","8.357804","172.30.1.205","172.30.1.104","TCP","74","35678 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911584 TSecr=0 WS=128" "18417","8.357963","172.30.1.104","172.30.1.205","TCP","54","135 > 43040 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18418","8.357974","172.30.1.104","172.30.1.205","TCP","54","135 > 43040 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18419","8.357980","172.30.1.205","172.30.1.104","TCP","54","43040 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18420","8.358060","172.30.1.104","172.30.1.205","TCP","66","49671 > 35678 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18421","8.358069","172.30.1.205","172.30.1.104","TCP","54","35678 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18422","8.358419","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18423","8.359457","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18424","8.359465","172.30.1.205","172.30.1.104","TCP","54","35678 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18425","8.361364","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18426","8.361744","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18427","8.361750","172.30.1.205","172.30.1.104","TCP","54","35678 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18428","8.363121","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18429","8.364897","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18430","8.364907","172.30.1.205","172.30.1.104","TCP","54","35678 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18431","8.365854","172.30.1.205","172.30.1.104","TCP","74","43044 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911592 TSecr=0 WS=128" "18432","8.366138","172.30.1.104","172.30.1.205","TCP","66","135 > 43044 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18433","8.366149","172.30.1.205","172.30.1.104","TCP","54","43044 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18434","8.366496","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18435","8.366779","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18436","8.366788","172.30.1.205","172.30.1.104","TCP","54","43044 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18437","8.368997","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18438","8.369365","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18439","8.369372","172.30.1.205","172.30.1.104","TCP","54","43044 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18440","8.371170","172.30.1.205","172.30.1.104","TCP","54","43044 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18441","8.371280","172.30.1.205","172.30.1.104","TCP","74","35682 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911597 TSecr=0 WS=128" "18442","8.371440","172.30.1.104","172.30.1.205","TCP","54","135 > 43044 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18443","8.371486","172.30.1.104","172.30.1.205","TCP","54","135 > 43044 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18444","8.371492","172.30.1.205","172.30.1.104","TCP","54","43044 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18445","8.371592","172.30.1.104","172.30.1.205","TCP","66","49671 > 35682 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18446","8.371601","172.30.1.205","172.30.1.104","TCP","54","35682 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18447","8.371947","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18448","8.372221","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18449","8.372230","172.30.1.205","172.30.1.104","TCP","54","35682 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18450","8.374136","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18451","8.374528","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18452","8.374535","172.30.1.205","172.30.1.104","TCP","54","35682 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18453","8.375880","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18454","8.377664","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18455","8.377677","172.30.1.205","172.30.1.104","TCP","54","35682 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18456","8.378685","172.30.1.205","172.30.1.104","TCP","74","43048 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911605 TSecr=0 WS=128" "18457","8.378970","172.30.1.104","172.30.1.205","TCP","66","135 > 43048 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18458","8.378981","172.30.1.205","172.30.1.104","TCP","54","43048 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18459","8.379369","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18460","8.379671","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18461","8.379680","172.30.1.205","172.30.1.104","TCP","54","43048 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18462","8.381935","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18463","8.382318","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18464","8.382327","172.30.1.205","172.30.1.104","TCP","54","43048 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18465","8.383269","172.30.1.205","172.30.1.104","TCP","54","35642 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18466","8.383322","172.30.1.205","172.30.1.104","TCP","54","35646 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18467","8.383360","172.30.1.205","172.30.1.104","TCP","54","35650 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18468","8.383394","172.30.1.205","172.30.1.104","TCP","54","35654 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18469","8.383434","172.30.1.205","172.30.1.104","TCP","54","35658 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18470","8.383466","172.30.1.205","172.30.1.104","TCP","54","35662 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18471","8.383493","172.30.1.205","172.30.1.104","TCP","54","35666 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18472","8.383504","172.30.1.104","172.30.1.205","TCP","54","49671 > 35642 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18473","8.383544","172.30.1.205","172.30.1.104","TCP","54","35670 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18474","8.383571","172.30.1.205","172.30.1.104","TCP","54","35674 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18475","8.383594","172.30.1.104","172.30.1.205","TCP","54","49671 > 35646 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18476","8.383617","172.30.1.205","172.30.1.104","TCP","54","35678 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18477","8.383622","172.30.1.104","172.30.1.205","TCP","54","49671 > 35642 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18478","8.383628","172.30.1.205","172.30.1.104","TCP","54","35642 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18479","8.383647","172.30.1.104","172.30.1.205","TCP","54","49671 > 35646 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18480","8.383651","172.30.1.205","172.30.1.104","TCP","54","35646 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18481","8.383675","172.30.1.205","172.30.1.104","TCP","54","35682 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18482","8.383749","172.30.1.205","172.30.1.104","TCP","54","35638 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18483","8.383768","172.30.1.104","172.30.1.205","TCP","54","49671 > 35650 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18484","8.383787","172.30.1.104","172.30.1.205","TCP","54","49671 > 35654 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18485","8.383808","172.30.1.104","172.30.1.205","TCP","54","49671 > 35650 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18486","8.383812","172.30.1.205","172.30.1.104","TCP","54","35650 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18487","8.383829","172.30.1.104","172.30.1.205","TCP","54","49671 > 35654 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18488","8.383832","172.30.1.205","172.30.1.104","TCP","54","35654 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18489","8.383854","172.30.1.104","172.30.1.205","TCP","54","49671 > 35658 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18490","8.383984","172.30.1.104","172.30.1.205","TCP","54","49671 > 35662 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18491","8.383996","172.30.1.104","172.30.1.205","TCP","54","49671 > 35658 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18492","8.384000","172.30.1.205","172.30.1.104","TCP","54","35658 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18493","8.384017","172.30.1.104","172.30.1.205","TCP","54","49671 > 35666 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18494","8.384061","172.30.1.104","172.30.1.205","TCP","54","49671 > 35662 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18495","8.384066","172.30.1.205","172.30.1.104","TCP","54","35662 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18496","8.384078","172.30.1.104","172.30.1.205","TCP","54","49671 > 35666 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18497","8.384081","172.30.1.205","172.30.1.104","TCP","54","35666 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18498","8.384100","172.30.1.104","172.30.1.205","TCP","54","49671 > 35670 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18499","8.384119","172.30.1.104","172.30.1.205","TCP","54","49671 > 35674 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18500","8.384209","172.30.1.104","172.30.1.205","TCP","54","49671 > 35678 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18501","8.384228","172.30.1.104","172.30.1.205","TCP","54","49671 > 35670 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18502","8.384232","172.30.1.205","172.30.1.104","TCP","54","35670 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18503","8.384250","172.30.1.104","172.30.1.205","TCP","54","49671 > 35674 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18504","8.384252","172.30.1.205","172.30.1.104","TCP","54","35674 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18505","8.384271","172.30.1.104","172.30.1.205","TCP","54","49671 > 35678 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18506","8.384274","172.30.1.205","172.30.1.104","TCP","54","35678 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18507","8.384292","172.30.1.104","172.30.1.205","TCP","54","49671 > 35682 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18508","8.384313","172.30.1.104","172.30.1.205","TCP","54","49671 > 35638 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18509","8.384398","172.30.1.104","172.30.1.205","TCP","54","49671 > 35682 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18510","8.384402","172.30.1.205","172.30.1.104","TCP","54","35682 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18511","8.384420","172.30.1.104","172.30.1.205","TCP","54","49671 > 35638 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18512","8.384422","172.30.1.205","172.30.1.104","TCP","54","35638 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18513","8.385304","172.30.1.205","172.30.1.104","TCP","54","43048 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18514","8.385415","172.30.1.205","172.30.1.104","TCP","74","35686 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911611 TSecr=0 WS=128" "18515","8.385569","172.30.1.104","172.30.1.205","TCP","54","135 > 43048 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18516","8.385598","172.30.1.104","172.30.1.205","TCP","54","135 > 43048 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18517","8.385603","172.30.1.205","172.30.1.104","TCP","54","43048 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18518","8.385690","172.30.1.104","172.30.1.205","TCP","66","49671 > 35686 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18519","8.385698","172.30.1.205","172.30.1.104","TCP","54","35686 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18520","8.386054","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18521","8.386348","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18522","8.386357","172.30.1.205","172.30.1.104","TCP","54","35686 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18523","8.388219","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18524","8.388599","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18525","8.388605","172.30.1.205","172.30.1.104","TCP","54","35686 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18526","8.389978","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18527","8.391803","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18528","8.391813","172.30.1.205","172.30.1.104","TCP","54","35686 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18529","8.392729","172.30.1.205","172.30.1.104","TCP","74","43052 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911619 TSecr=0 WS=128" "18530","8.393046","172.30.1.104","172.30.1.205","TCP","66","135 > 43052 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18531","8.393057","172.30.1.205","172.30.1.104","TCP","54","43052 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18532","8.393414","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18533","8.393708","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18534","8.393717","172.30.1.205","172.30.1.104","TCP","54","43052 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18535","8.395874","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18536","8.396245","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18537","8.396252","172.30.1.205","172.30.1.104","TCP","54","43052 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18538","8.398067","172.30.1.205","172.30.1.104","TCP","54","43052 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18539","8.398175","172.30.1.205","172.30.1.104","TCP","74","35690 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911624 TSecr=0 WS=128" "18540","8.398346","172.30.1.104","172.30.1.205","TCP","54","135 > 43052 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18541","8.398361","172.30.1.104","172.30.1.205","TCP","54","135 > 43052 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18542","8.398367","172.30.1.205","172.30.1.104","TCP","54","43052 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18543","8.398455","172.30.1.104","172.30.1.205","TCP","66","49671 > 35690 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18544","8.398463","172.30.1.205","172.30.1.104","TCP","54","35690 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18545","8.398802","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18546","8.399089","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18547","8.399097","172.30.1.205","172.30.1.104","TCP","54","35690 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18548","8.400991","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18549","8.401339","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18550","8.401345","172.30.1.205","172.30.1.104","TCP","54","35690 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18551","8.402679","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18552","8.405000","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18553","8.405010","172.30.1.205","172.30.1.104","TCP","54","35690 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18554","8.405941","172.30.1.205","172.30.1.104","TCP","74","43056 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911632 TSecr=0 WS=128" "18555","8.406229","172.30.1.104","172.30.1.205","TCP","66","135 > 43056 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18556","8.406240","172.30.1.205","172.30.1.104","TCP","54","43056 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18557","8.406586","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18558","8.406877","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18559","8.406887","172.30.1.205","172.30.1.104","TCP","54","43056 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18560","8.409111","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18561","8.409476","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18562","8.409483","172.30.1.205","172.30.1.104","TCP","54","43056 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18563","8.411276","172.30.1.205","172.30.1.104","TCP","54","43056 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18564","8.411389","172.30.1.205","172.30.1.104","TCP","74","35694 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911637 TSecr=0 WS=128" "18565","8.411538","172.30.1.104","172.30.1.205","TCP","54","135 > 43056 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18566","8.411566","172.30.1.104","172.30.1.205","TCP","54","135 > 43056 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18567","8.411571","172.30.1.205","172.30.1.104","TCP","54","43056 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18568","8.411656","172.30.1.104","172.30.1.205","TCP","66","49671 > 35694 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18569","8.411664","172.30.1.205","172.30.1.104","TCP","54","35694 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18570","8.412007","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18571","8.412312","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18572","8.412321","172.30.1.205","172.30.1.104","TCP","54","35694 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18573","8.414229","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18574","8.414572","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18575","8.414579","172.30.1.205","172.30.1.104","TCP","54","35694 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18576","8.415913","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18577","8.417753","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18578","8.417762","172.30.1.205","172.30.1.104","TCP","54","35694 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18579","8.418700","172.30.1.205","172.30.1.104","TCP","74","43060 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911645 TSecr=0 WS=128" "18580","8.418979","172.30.1.104","172.30.1.205","TCP","66","135 > 43060 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18581","8.418989","172.30.1.205","172.30.1.104","TCP","54","43060 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18582","8.419338","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18583","8.419657","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18584","8.419665","172.30.1.205","172.30.1.104","TCP","54","43060 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18585","8.421875","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18586","8.422248","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18587","8.422255","172.30.1.205","172.30.1.104","TCP","54","43060 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18588","8.424066","172.30.1.205","172.30.1.104","TCP","54","43060 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18589","8.424174","172.30.1.205","172.30.1.104","TCP","74","35698 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911650 TSecr=0 WS=128" "18590","8.424334","172.30.1.104","172.30.1.205","TCP","54","135 > 43060 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18591","8.424368","172.30.1.104","172.30.1.205","TCP","54","135 > 43060 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18592","8.424373","172.30.1.205","172.30.1.104","TCP","54","43060 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18593","8.424499","172.30.1.104","172.30.1.205","TCP","66","49671 > 35698 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18594","8.424507","172.30.1.205","172.30.1.104","TCP","54","35698 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18595","8.424882","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18596","8.425175","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18597","8.425183","172.30.1.205","172.30.1.104","TCP","54","35698 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18598","8.427059","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18599","8.427410","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18600","8.427416","172.30.1.205","172.30.1.104","TCP","54","35698 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18601","8.428752","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18602","8.430548","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18603","8.430557","172.30.1.205","172.30.1.104","TCP","54","35698 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18604","8.431494","172.30.1.205","172.30.1.104","TCP","74","43064 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911657 TSecr=0 WS=128" "18605","8.431789","172.30.1.104","172.30.1.205","TCP","66","135 > 43064 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18606","8.431799","172.30.1.205","172.30.1.104","TCP","54","43064 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18607","8.432147","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18608","8.432419","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18609","8.432427","172.30.1.205","172.30.1.104","TCP","54","43064 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18610","8.434610","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18611","8.434963","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18612","8.434970","172.30.1.205","172.30.1.104","TCP","54","43064 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18613","8.436766","172.30.1.205","172.30.1.104","TCP","54","43064 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18614","8.436891","172.30.1.205","172.30.1.104","TCP","74","35702 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911663 TSecr=0 WS=128" "18615","8.437018","172.30.1.104","172.30.1.205","TCP","54","135 > 43064 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18616","8.437039","172.30.1.104","172.30.1.205","TCP","54","135 > 43064 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18617","8.437044","172.30.1.205","172.30.1.104","TCP","54","43064 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18618","8.437177","172.30.1.104","172.30.1.205","TCP","66","49671 > 35702 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18619","8.437186","172.30.1.205","172.30.1.104","TCP","54","35702 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18620","8.437527","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18621","8.437800","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18622","8.437809","172.30.1.205","172.30.1.104","TCP","54","35702 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18623","8.439684","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18624","8.440091","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18625","8.440097","172.30.1.205","172.30.1.104","TCP","54","35702 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18626","8.441469","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18627","8.443290","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18628","8.443301","172.30.1.205","172.30.1.104","TCP","54","35702 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18629","8.444246","172.30.1.205","172.30.1.104","TCP","74","43068 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911670 TSecr=0 WS=128" "18630","8.444552","172.30.1.104","172.30.1.205","TCP","66","135 > 43068 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18631","8.444562","172.30.1.205","172.30.1.104","TCP","54","43068 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18632","8.444942","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18633","8.445222","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18634","8.445231","172.30.1.205","172.30.1.104","TCP","54","43068 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18635","8.447413","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18636","8.447808","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18637","8.447814","172.30.1.205","172.30.1.104","TCP","54","43068 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18638","8.449683","172.30.1.205","172.30.1.104","TCP","54","43068 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18639","8.449792","172.30.1.205","172.30.1.104","TCP","74","35706 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911676 TSecr=0 WS=128" "18640","8.449932","172.30.1.104","172.30.1.205","TCP","54","135 > 43068 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18641","8.449954","172.30.1.104","172.30.1.205","TCP","54","135 > 43068 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18642","8.449959","172.30.1.205","172.30.1.104","TCP","54","43068 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18643","8.450062","172.30.1.104","172.30.1.205","TCP","66","49671 > 35706 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18644","8.450070","172.30.1.205","172.30.1.104","TCP","54","35706 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18645","8.450414","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18646","8.450694","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18647","8.450703","172.30.1.205","172.30.1.104","TCP","54","35706 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18648","8.452569","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18649","8.452924","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18650","8.452933","172.30.1.205","172.30.1.104","TCP","54","35706 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18651","8.454387","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18652","8.456205","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18653","8.456217","172.30.1.205","172.30.1.104","TCP","54","35706 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18654","8.457243","172.30.1.205","172.30.1.104","TCP","74","43072 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911683 TSecr=0 WS=128" "18655","8.457576","172.30.1.104","172.30.1.205","TCP","66","135 > 43072 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18656","8.457588","172.30.1.205","172.30.1.104","TCP","54","43072 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18657","8.457944","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18658","8.458487","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18659","8.458501","172.30.1.205","172.30.1.104","TCP","54","43072 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18660","8.460832","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18661","8.461228","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18662","8.461235","172.30.1.205","172.30.1.104","TCP","54","43072 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18663","8.463082","172.30.1.205","172.30.1.104","TCP","54","43072 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18664","8.463219","172.30.1.205","172.30.1.104","TCP","74","35710 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911689 TSecr=0 WS=128" "18665","8.463417","172.30.1.104","172.30.1.205","TCP","54","135 > 43072 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18666","8.463487","172.30.1.104","172.30.1.205","TCP","54","135 > 43072 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18667","8.463495","172.30.1.205","172.30.1.104","TCP","54","43072 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18668","8.463537","172.30.1.104","172.30.1.205","TCP","66","49671 > 35710 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18669","8.463546","172.30.1.205","172.30.1.104","TCP","54","35710 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18670","8.463906","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18671","8.464197","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18672","8.464206","172.30.1.205","172.30.1.104","TCP","54","35710 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18673","8.466136","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18674","8.466525","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18675","8.466532","172.30.1.205","172.30.1.104","TCP","54","35710 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18676","8.467898","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18677","8.469773","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18678","8.469786","172.30.1.205","172.30.1.104","TCP","54","35710 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18679","8.470800","172.30.1.205","172.30.1.104","TCP","74","43076 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911697 TSecr=0 WS=128" "18680","8.471115","172.30.1.104","172.30.1.205","TCP","66","135 > 43076 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18681","8.471127","172.30.1.205","172.30.1.104","TCP","54","43076 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18682","8.471494","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18683","8.471869","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18684","8.471878","172.30.1.205","172.30.1.104","TCP","54","43076 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18685","8.474135","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18686","8.474507","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18687","8.474513","172.30.1.205","172.30.1.104","TCP","54","43076 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18688","8.476337","172.30.1.205","172.30.1.104","TCP","54","43076 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18689","8.476461","172.30.1.205","172.30.1.104","TCP","74","35714 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911702 TSecr=0 WS=128" "18690","8.476723","172.30.1.104","172.30.1.205","TCP","54","135 > 43076 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18691","8.476732","172.30.1.104","172.30.1.205","TCP","54","135 > 43076 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18692","8.476739","172.30.1.205","172.30.1.104","TCP","54","43076 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18693","8.476772","172.30.1.104","172.30.1.205","TCP","66","49671 > 35714 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18694","8.476791","172.30.1.205","172.30.1.104","TCP","54","35714 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18695","8.477143","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18696","8.477483","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18697","8.477492","172.30.1.205","172.30.1.104","TCP","54","35714 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18698","8.479382","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18699","8.479791","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18700","8.479797","172.30.1.205","172.30.1.104","TCP","54","35714 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18701","8.481196","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18702","8.484268","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18703","8.484278","172.30.1.205","172.30.1.104","TCP","54","35714 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18704","8.485251","172.30.1.205","172.30.1.104","TCP","74","43080 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911711 TSecr=0 WS=128" "18705","8.485571","172.30.1.104","172.30.1.205","TCP","66","135 > 43080 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18706","8.485582","172.30.1.205","172.30.1.104","TCP","54","43080 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18707","8.485941","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18708","8.486251","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18709","8.486265","172.30.1.205","172.30.1.104","TCP","54","43080 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18710","8.488545","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18711","8.488957","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18712","8.488964","172.30.1.205","172.30.1.104","TCP","54","43080 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18713","8.490792","172.30.1.205","172.30.1.104","TCP","54","43080 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18714","8.490909","172.30.1.205","172.30.1.104","TCP","74","35718 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911717 TSecr=0 WS=128" "18715","8.491127","172.30.1.104","172.30.1.205","TCP","54","135 > 43080 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18716","8.491136","172.30.1.104","172.30.1.205","TCP","54","135 > 43080 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18717","8.491142","172.30.1.205","172.30.1.104","TCP","54","43080 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18718","8.491251","172.30.1.104","172.30.1.205","TCP","66","49671 > 35718 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18719","8.491259","172.30.1.205","172.30.1.104","TCP","54","35718 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18720","8.491616","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18721","8.493833","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18722","8.493841","172.30.1.205","172.30.1.104","TCP","54","35718 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18723","8.495724","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18724","8.496161","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18725","8.496168","172.30.1.205","172.30.1.104","TCP","54","35718 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18726","8.497552","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18727","8.499431","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18728","8.499441","172.30.1.205","172.30.1.104","TCP","54","35718 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18729","8.500382","172.30.1.205","172.30.1.104","TCP","74","43084 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911726 TSecr=0 WS=128" "18730","8.500705","172.30.1.104","172.30.1.205","TCP","66","135 > 43084 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18731","8.500716","172.30.1.205","172.30.1.104","TCP","54","43084 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18732","8.501090","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18733","8.501402","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18734","8.501412","172.30.1.205","172.30.1.104","TCP","54","43084 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18735","8.503597","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18736","8.504003","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18737","8.504010","172.30.1.205","172.30.1.104","TCP","54","43084 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18738","8.505863","172.30.1.205","172.30.1.104","TCP","54","43084 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18739","8.505974","172.30.1.205","172.30.1.104","TCP","74","35722 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911732 TSecr=0 WS=128" "18740","8.506160","172.30.1.104","172.30.1.205","TCP","54","135 > 43084 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18741","8.506182","172.30.1.104","172.30.1.205","TCP","54","135 > 43084 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18742","8.506188","172.30.1.205","172.30.1.104","TCP","54","43084 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18743","8.506267","172.30.1.104","172.30.1.205","TCP","66","49671 > 35722 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18744","8.506276","172.30.1.205","172.30.1.104","TCP","54","35722 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18745","8.506631","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18746","8.506955","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18747","8.506964","172.30.1.205","172.30.1.104","TCP","54","35722 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18748","8.508887","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18749","8.509233","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18750","8.509239","172.30.1.205","172.30.1.104","TCP","54","35722 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18751","8.510591","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18752","8.512580","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18753","8.512594","172.30.1.205","172.30.1.104","TCP","54","35722 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18754","8.513628","172.30.1.205","172.30.1.104","TCP","74","43088 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911740 TSecr=0 WS=128" "18755","8.513941","172.30.1.104","172.30.1.205","TCP","66","135 > 43088 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18756","8.513952","172.30.1.205","172.30.1.104","TCP","54","43088 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18757","8.514304","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18758","8.514600","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18759","8.514609","172.30.1.205","172.30.1.104","TCP","54","43088 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18760","8.516825","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18761","8.517337","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18762","8.517344","172.30.1.205","172.30.1.104","TCP","54","43088 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18763","8.519149","172.30.1.205","172.30.1.104","TCP","54","43088 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18764","8.519261","172.30.1.205","172.30.1.104","TCP","74","35726 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911745 TSecr=0 WS=128" "18765","8.519438","172.30.1.104","172.30.1.205","TCP","54","135 > 43088 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18766","8.519450","172.30.1.104","172.30.1.205","TCP","54","135 > 43088 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18767","8.519456","172.30.1.205","172.30.1.104","TCP","54","43088 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18768","8.519547","172.30.1.104","172.30.1.205","TCP","66","49671 > 35726 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18769","8.519555","172.30.1.205","172.30.1.104","TCP","54","35726 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18770","8.519901","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18771","8.520200","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18772","8.520210","172.30.1.205","172.30.1.104","TCP","54","35726 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18773","8.522163","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18774","8.522520","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18775","8.522526","172.30.1.205","172.30.1.104","TCP","54","35726 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18776","8.523874","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18777","8.525725","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18778","8.525734","172.30.1.205","172.30.1.104","TCP","54","35726 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18779","8.526669","172.30.1.205","172.30.1.104","TCP","74","43092 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911753 TSecr=0 WS=128" "18780","8.526979","172.30.1.104","172.30.1.205","TCP","66","135 > 43092 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18781","8.526993","172.30.1.205","172.30.1.104","TCP","54","43092 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18782","8.527372","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18783","8.527798","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18784","8.527809","172.30.1.205","172.30.1.104","TCP","54","43092 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18785","8.530062","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18786","8.530540","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18787","8.530548","172.30.1.205","172.30.1.104","TCP","54","43092 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18788","8.532401","172.30.1.205","172.30.1.104","TCP","54","43092 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18789","8.532514","172.30.1.205","172.30.1.104","TCP","74","35730 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911758 TSecr=0 WS=128" "18790","8.532713","172.30.1.104","172.30.1.205","TCP","54","135 > 43092 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18791","8.532769","172.30.1.104","172.30.1.205","TCP","54","135 > 43092 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18792","8.532785","172.30.1.205","172.30.1.104","TCP","54","43092 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18793","8.532842","172.30.1.104","172.30.1.205","TCP","66","49671 > 35730 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18794","8.532850","172.30.1.205","172.30.1.104","TCP","54","35730 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18795","8.533202","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18796","8.534722","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18797","8.534729","172.30.1.205","172.30.1.104","TCP","54","35730 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18798","8.536591","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18799","8.536980","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18800","8.536987","172.30.1.205","172.30.1.104","TCP","54","35730 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18801","8.538350","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18802","8.540203","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18803","8.540212","172.30.1.205","172.30.1.104","TCP","54","35730 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18804","8.541183","172.30.1.205","172.30.1.104","TCP","74","43096 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911767 TSecr=0 WS=128" "18805","8.541502","172.30.1.104","172.30.1.205","TCP","66","135 > 43096 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18806","8.541513","172.30.1.205","172.30.1.104","TCP","54","43096 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18807","8.541903","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18808","8.542235","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18809","8.542245","172.30.1.205","172.30.1.104","TCP","54","43096 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18810","8.544485","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18811","8.544897","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18812","8.544903","172.30.1.205","172.30.1.104","TCP","54","43096 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18813","8.545791","172.30.1.205","172.30.1.104","TCP","54","35690 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18814","8.545839","172.30.1.205","172.30.1.104","TCP","54","35694 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18815","8.545884","172.30.1.205","172.30.1.104","TCP","54","35698 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18816","8.545921","172.30.1.205","172.30.1.104","TCP","54","35702 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18817","8.545959","172.30.1.205","172.30.1.104","TCP","54","35706 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18818","8.545992","172.30.1.205","172.30.1.104","TCP","54","35710 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18819","8.546025","172.30.1.205","172.30.1.104","TCP","54","35714 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18820","8.546052","172.30.1.205","172.30.1.104","TCP","54","35718 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18821","8.546070","172.30.1.104","172.30.1.205","TCP","54","49671 > 35690 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18822","8.546101","172.30.1.205","172.30.1.104","TCP","54","35722 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18823","8.546135","172.30.1.205","172.30.1.104","TCP","54","35726 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18824","8.546167","172.30.1.205","172.30.1.104","TCP","54","35730 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18825","8.546239","172.30.1.205","172.30.1.104","TCP","54","35686 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "18826","8.546256","172.30.1.104","172.30.1.205","TCP","54","49671 > 35694 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18827","8.546273","172.30.1.104","172.30.1.205","TCP","54","49671 > 35690 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18828","8.546279","172.30.1.205","172.30.1.104","TCP","54","35690 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18829","8.546294","172.30.1.104","172.30.1.205","TCP","54","49671 > 35694 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18830","8.546298","172.30.1.205","172.30.1.104","TCP","54","35694 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18831","8.546315","172.30.1.104","172.30.1.205","TCP","54","49671 > 35698 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18832","8.546342","172.30.1.104","172.30.1.205","TCP","54","49671 > 35702 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18833","8.546366","172.30.1.104","172.30.1.205","TCP","54","49671 > 35698 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18834","8.546370","172.30.1.205","172.30.1.104","TCP","54","35698 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18835","8.546386","172.30.1.104","172.30.1.205","TCP","54","49671 > 35706 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18836","8.546420","172.30.1.104","172.30.1.205","TCP","54","49671 > 35710 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18837","8.546542","172.30.1.104","172.30.1.205","TCP","54","49671 > 35710 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18838","8.546554","172.30.1.205","172.30.1.104","TCP","54","35710 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18839","8.546561","172.30.1.104","172.30.1.205","TCP","54","49671 > 35714 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18840","8.546581","172.30.1.104","172.30.1.205","TCP","54","49671 > 35714 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18841","8.546585","172.30.1.205","172.30.1.104","TCP","54","35714 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18842","8.546617","172.30.1.104","172.30.1.205","TCP","54","49671 > 35702 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18843","8.546621","172.30.1.205","172.30.1.104","TCP","54","35702 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18844","8.546642","172.30.1.104","172.30.1.205","TCP","54","49671 > 35706 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18845","8.546645","172.30.1.205","172.30.1.104","TCP","54","35706 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18846","8.546661","172.30.1.104","172.30.1.205","TCP","54","49671 > 35718 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18847","8.546681","172.30.1.104","172.30.1.205","TCP","54","49671 > 35722 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18848","8.547020","172.30.1.104","172.30.1.205","TCP","54","49671 > 35726 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18849","8.547027","172.30.1.104","172.30.1.205","TCP","54","49671 > 35718 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18850","8.547032","172.30.1.205","172.30.1.104","TCP","54","35718 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18851","8.547038","172.30.1.104","172.30.1.205","TCP","54","49671 > 35730 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18852","8.547042","172.30.1.104","172.30.1.205","TCP","54","49671 > 35730 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18853","8.547044","172.30.1.205","172.30.1.104","TCP","54","35730 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18854","8.547049","172.30.1.104","172.30.1.205","TCP","54","49671 > 35722 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18855","8.547051","172.30.1.205","172.30.1.104","TCP","54","35722 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18856","8.547052","172.30.1.104","172.30.1.205","TCP","54","49671 > 35726 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18857","8.547054","172.30.1.205","172.30.1.104","TCP","54","35726 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18858","8.547055","172.30.1.104","172.30.1.205","TCP","54","49671 > 35686 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18859","8.547058","172.30.1.104","172.30.1.205","TCP","54","49671 > 35686 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "18860","8.547060","172.30.1.205","172.30.1.104","TCP","54","35686 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "18861","8.547896","172.30.1.205","172.30.1.104","TCP","54","43096 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18862","8.548009","172.30.1.205","172.30.1.104","TCP","74","35734 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911774 TSecr=0 WS=128" "18863","8.548188","172.30.1.104","172.30.1.205","TCP","54","135 > 43096 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18864","8.548199","172.30.1.104","172.30.1.205","TCP","54","135 > 43096 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18865","8.548206","172.30.1.205","172.30.1.104","TCP","54","43096 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18866","8.548316","172.30.1.104","172.30.1.205","TCP","66","49671 > 35734 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18867","8.548327","172.30.1.205","172.30.1.104","TCP","54","35734 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18868","8.548729","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18869","8.549040","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18870","8.549049","172.30.1.205","172.30.1.104","TCP","54","35734 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18871","8.550954","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18872","8.551304","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18873","8.551311","172.30.1.205","172.30.1.104","TCP","54","35734 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18874","8.552675","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18875","8.554531","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18876","8.554543","172.30.1.205","172.30.1.104","TCP","54","35734 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18877","8.555514","172.30.1.205","172.30.1.104","TCP","74","43100 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911781 TSecr=0 WS=128" "18878","8.555822","172.30.1.104","172.30.1.205","TCP","66","135 > 43100 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18879","8.555833","172.30.1.205","172.30.1.104","TCP","54","43100 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18880","8.556185","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18881","8.556519","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18882","8.556528","172.30.1.205","172.30.1.104","TCP","54","43100 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18883","8.558751","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18884","8.559149","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18885","8.559156","172.30.1.205","172.30.1.104","TCP","54","43100 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18886","8.561002","172.30.1.205","172.30.1.104","TCP","54","43100 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18887","8.561113","172.30.1.205","172.30.1.104","TCP","74","35738 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911787 TSecr=0 WS=128" "18888","8.561332","172.30.1.104","172.30.1.205","TCP","54","135 > 43100 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18889","8.561353","172.30.1.104","172.30.1.205","TCP","54","135 > 43100 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18890","8.561358","172.30.1.205","172.30.1.104","TCP","54","43100 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18891","8.561365","172.30.1.104","172.30.1.205","TCP","66","49671 > 35738 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18892","8.561376","172.30.1.205","172.30.1.104","TCP","54","35738 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18893","8.561724","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18894","8.562027","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18895","8.562036","172.30.1.205","172.30.1.104","TCP","54","35738 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18896","8.563924","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18897","8.564330","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18898","8.564340","172.30.1.205","172.30.1.104","TCP","54","35738 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18899","8.565728","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18900","8.567566","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18901","8.567574","172.30.1.205","172.30.1.104","TCP","54","35738 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18902","8.568495","172.30.1.205","172.30.1.104","TCP","74","43104 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911794 TSecr=0 WS=128" "18903","8.568799","172.30.1.104","172.30.1.205","TCP","66","135 > 43104 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18904","8.568815","172.30.1.205","172.30.1.104","TCP","54","43104 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18905","8.569176","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18906","8.569471","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18907","8.569480","172.30.1.205","172.30.1.104","TCP","54","43104 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18908","8.571677","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18909","8.572059","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18910","8.572065","172.30.1.205","172.30.1.104","TCP","54","43104 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18911","8.573938","172.30.1.205","172.30.1.104","TCP","54","43104 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18912","8.574052","172.30.1.205","172.30.1.104","TCP","74","35742 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911800 TSecr=0 WS=128" "18913","8.574221","172.30.1.104","172.30.1.205","TCP","54","135 > 43104 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18914","8.574263","172.30.1.104","172.30.1.205","TCP","54","135 > 43104 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18915","8.574269","172.30.1.205","172.30.1.104","TCP","54","43104 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18916","8.574344","172.30.1.104","172.30.1.205","TCP","66","49671 > 35742 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18917","8.574352","172.30.1.205","172.30.1.104","TCP","54","35742 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18918","8.574697","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18919","8.576436","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18920","8.576444","172.30.1.205","172.30.1.104","TCP","54","35742 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18921","8.578367","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18922","8.579752","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18923","8.579758","172.30.1.205","172.30.1.104","TCP","54","35742 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18924","8.581149","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18925","8.583038","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18926","8.583048","172.30.1.205","172.30.1.104","TCP","54","35742 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18927","8.583981","172.30.1.205","172.30.1.104","TCP","74","43108 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911810 TSecr=0 WS=128" "18928","8.584305","172.30.1.104","172.30.1.205","TCP","66","135 > 43108 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18929","8.584316","172.30.1.205","172.30.1.104","TCP","54","43108 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18930","8.584673","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18931","8.584963","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18932","8.584972","172.30.1.205","172.30.1.104","TCP","54","43108 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18933","8.587219","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18934","8.587626","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18935","8.587632","172.30.1.205","172.30.1.104","TCP","54","43108 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18936","8.589483","172.30.1.205","172.30.1.104","TCP","54","43108 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18937","8.589594","172.30.1.205","172.30.1.104","TCP","74","35746 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911816 TSecr=0 WS=128" "18938","8.589868","172.30.1.104","172.30.1.205","TCP","54","135 > 43108 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18939","8.589896","172.30.1.104","172.30.1.205","TCP","66","49671 > 35746 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18940","8.589906","172.30.1.205","172.30.1.104","TCP","54","35746 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18941","8.590253","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18942","8.593293","172.30.1.104","172.30.1.205","TCP","54","135 > 43108 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18943","8.593301","172.30.1.205","172.30.1.104","TCP","54","43108 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18944","8.593399","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18945","8.593407","172.30.1.205","172.30.1.104","TCP","54","35746 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18946","8.595350","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18947","8.595726","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18948","8.595733","172.30.1.205","172.30.1.104","TCP","54","35746 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18949","8.597122","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18950","8.598986","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18951","8.598995","172.30.1.205","172.30.1.104","TCP","54","35746 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18952","8.599927","172.30.1.205","172.30.1.104","TCP","74","43112 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911826 TSecr=0 WS=128" "18953","8.600320","172.30.1.104","172.30.1.205","TCP","66","135 > 43112 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18954","8.600330","172.30.1.205","172.30.1.104","TCP","54","43112 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18955","8.600685","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18956","8.601026","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18957","8.601036","172.30.1.205","172.30.1.104","TCP","54","43112 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18958","8.603232","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18959","8.603677","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18960","8.603683","172.30.1.205","172.30.1.104","TCP","54","43112 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18961","8.605524","172.30.1.205","172.30.1.104","TCP","54","43112 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18962","8.605641","172.30.1.205","172.30.1.104","TCP","74","35750 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911832 TSecr=0 WS=128" "18963","8.605944","172.30.1.104","172.30.1.205","TCP","54","135 > 43112 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18964","8.605953","172.30.1.104","172.30.1.205","TCP","54","135 > 43112 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18965","8.605959","172.30.1.205","172.30.1.104","TCP","54","43112 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18966","8.605965","172.30.1.104","172.30.1.205","TCP","66","49671 > 35750 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18967","8.605972","172.30.1.205","172.30.1.104","TCP","54","35750 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18968","8.606322","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18969","8.606783","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18970","8.606792","172.30.1.205","172.30.1.104","TCP","54","35750 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18971","8.608677","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18972","8.609654","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18973","8.609661","172.30.1.205","172.30.1.104","TCP","54","35750 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18974","8.611032","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "18975","8.612995","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "18976","8.613005","172.30.1.205","172.30.1.104","TCP","54","35750 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "18977","8.613957","172.30.1.205","172.30.1.104","TCP","74","43116 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911840 TSecr=0 WS=128" "18978","8.614260","172.30.1.104","172.30.1.205","TCP","66","135 > 43116 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18979","8.614270","172.30.1.205","172.30.1.104","TCP","54","43116 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18980","8.614617","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "18981","8.614917","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18982","8.614925","172.30.1.205","172.30.1.104","TCP","54","43116 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18983","8.617147","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "18984","8.617621","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "18985","8.617628","172.30.1.205","172.30.1.104","TCP","54","43116 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "18986","8.619445","172.30.1.205","172.30.1.104","TCP","54","43116 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "18987","8.619557","172.30.1.205","172.30.1.104","TCP","74","35754 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911845 TSecr=0 WS=128" "18988","8.619744","172.30.1.104","172.30.1.205","TCP","54","135 > 43116 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18989","8.619787","172.30.1.104","172.30.1.205","TCP","54","135 > 43116 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "18990","8.619793","172.30.1.205","172.30.1.104","TCP","54","43116 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "18991","8.619873","172.30.1.104","172.30.1.205","TCP","66","49671 > 35754 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "18992","8.619882","172.30.1.205","172.30.1.104","TCP","54","35754 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "18993","8.620228","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "18994","8.620535","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "18995","8.620544","172.30.1.205","172.30.1.104","TCP","54","35754 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "18996","8.622456","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "18997","8.622871","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "18998","8.622877","172.30.1.205","172.30.1.104","TCP","54","35754 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "18999","8.624224","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19000","8.626154","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19001","8.626163","172.30.1.205","172.30.1.104","TCP","54","35754 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19002","8.627103","172.30.1.205","172.30.1.104","TCP","74","43120 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911853 TSecr=0 WS=128" "19003","8.627392","172.30.1.104","172.30.1.205","TCP","66","135 > 43120 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19004","8.627403","172.30.1.205","172.30.1.104","TCP","54","43120 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19005","8.627749","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19006","8.628012","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19007","8.628021","172.30.1.205","172.30.1.104","TCP","54","43120 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19008","8.630242","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19009","8.630666","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19010","8.630673","172.30.1.205","172.30.1.104","TCP","54","43120 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19011","8.632527","172.30.1.205","172.30.1.104","TCP","54","43120 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19012","8.632644","172.30.1.205","172.30.1.104","TCP","74","35758 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911859 TSecr=0 WS=128" "19013","8.632816","172.30.1.104","172.30.1.205","TCP","54","135 > 43120 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19014","8.632825","172.30.1.104","172.30.1.205","TCP","54","135 > 43120 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19015","8.632831","172.30.1.205","172.30.1.104","TCP","54","43120 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19016","8.632980","172.30.1.104","172.30.1.205","TCP","66","49671 > 35758 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19017","8.632989","172.30.1.205","172.30.1.104","TCP","54","35758 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19018","8.633343","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19019","8.633704","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19020","8.633713","172.30.1.205","172.30.1.104","TCP","54","35758 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19021","8.635604","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19022","8.635966","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19023","8.635972","172.30.1.205","172.30.1.104","TCP","54","35758 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19024","8.637371","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19025","8.640147","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19026","8.640156","172.30.1.205","172.30.1.104","TCP","54","35758 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19027","8.641133","172.30.1.205","172.30.1.104","TCP","74","43124 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911867 TSecr=0 WS=128" "19028","8.641436","172.30.1.104","172.30.1.205","TCP","66","135 > 43124 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19029","8.641446","172.30.1.205","172.30.1.104","TCP","54","43124 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19030","8.641799","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19031","8.642114","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19032","8.642124","172.30.1.205","172.30.1.104","TCP","54","43124 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19033","8.644312","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19034","8.644700","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19035","8.644706","172.30.1.205","172.30.1.104","TCP","54","43124 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19036","8.646530","172.30.1.205","172.30.1.104","TCP","54","43124 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19037","8.646643","172.30.1.205","172.30.1.104","TCP","74","35762 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911873 TSecr=0 WS=128" "19038","8.646835","172.30.1.104","172.30.1.205","TCP","54","135 > 43124 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19039","8.646865","172.30.1.104","172.30.1.205","TCP","54","135 > 43124 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19040","8.646871","172.30.1.205","172.30.1.104","TCP","54","43124 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19041","8.646905","172.30.1.104","172.30.1.205","TCP","66","49671 > 35762 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19042","8.646914","172.30.1.205","172.30.1.104","TCP","54","35762 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19043","8.647260","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19044","8.647575","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19045","8.647584","172.30.1.205","172.30.1.104","TCP","54","35762 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19046","8.649491","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19047","8.649878","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19048","8.649885","172.30.1.205","172.30.1.104","TCP","54","35762 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19049","8.651237","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19050","8.654035","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19051","8.654046","172.30.1.205","172.30.1.104","TCP","54","35762 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19052","8.654997","172.30.1.205","172.30.1.104","TCP","74","43128 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911881 TSecr=0 WS=128" "19053","8.655334","172.30.1.104","172.30.1.205","TCP","66","135 > 43128 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19054","8.655345","172.30.1.205","172.30.1.104","TCP","54","43128 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19055","8.655691","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19056","8.655992","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19057","8.656000","172.30.1.205","172.30.1.104","TCP","54","43128 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19058","8.658206","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19059","8.658906","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19060","8.658913","172.30.1.205","172.30.1.104","TCP","54","43128 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19061","8.660722","172.30.1.205","172.30.1.104","TCP","54","43128 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19062","8.660856","172.30.1.205","172.30.1.104","TCP","74","35766 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911887 TSecr=0 WS=128" "19063","8.661039","172.30.1.104","172.30.1.205","TCP","54","135 > 43128 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19064","8.661060","172.30.1.104","172.30.1.205","TCP","54","135 > 43128 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19065","8.661066","172.30.1.205","172.30.1.104","TCP","54","43128 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19066","8.661154","172.30.1.104","172.30.1.205","TCP","66","49671 > 35766 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19067","8.661163","172.30.1.205","172.30.1.104","TCP","54","35766 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19068","8.661505","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19069","8.661857","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19070","8.661866","172.30.1.205","172.30.1.104","TCP","54","35766 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19071","8.663716","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19072","8.664101","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19073","8.664105","172.30.1.205","172.30.1.104","TCP","54","35766 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19074","8.665501","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19075","8.667346","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19076","8.667355","172.30.1.205","172.30.1.104","TCP","54","35766 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19077","8.668273","172.30.1.205","172.30.1.104","TCP","74","43132 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911894 TSecr=0 WS=128" "19078","8.668615","172.30.1.104","172.30.1.205","TCP","66","135 > 43132 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19079","8.668626","172.30.1.205","172.30.1.104","TCP","54","43132 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19080","8.669004","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19081","8.669334","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19082","8.669344","172.30.1.205","172.30.1.104","TCP","54","43132 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19083","8.671511","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19084","8.671948","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19085","8.671955","172.30.1.205","172.30.1.104","TCP","54","43132 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19086","8.673782","172.30.1.205","172.30.1.104","TCP","54","43132 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19087","8.673892","172.30.1.205","172.30.1.104","TCP","74","35770 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911900 TSecr=0 WS=128" "19088","8.674041","172.30.1.104","172.30.1.205","TCP","54","135 > 43132 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19089","8.674052","172.30.1.104","172.30.1.205","TCP","54","135 > 43132 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19090","8.674057","172.30.1.205","172.30.1.104","TCP","54","43132 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19091","8.674220","172.30.1.104","172.30.1.205","TCP","66","49671 > 35770 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19092","8.674228","172.30.1.205","172.30.1.104","TCP","54","35770 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19093","8.674572","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19094","8.674876","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19095","8.674885","172.30.1.205","172.30.1.104","TCP","54","35770 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19096","8.676759","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19097","8.677131","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19098","8.677138","172.30.1.205","172.30.1.104","TCP","54","35770 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19099","8.678485","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19100","8.680335","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19101","8.680344","172.30.1.205","172.30.1.104","TCP","54","35770 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19102","8.681299","172.30.1.205","172.30.1.104","TCP","74","43136 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911907 TSecr=0 WS=128" "19103","8.681594","172.30.1.104","172.30.1.205","TCP","66","135 > 43136 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19104","8.681605","172.30.1.205","172.30.1.104","TCP","54","43136 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19105","8.681960","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19106","8.682253","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19107","8.682261","172.30.1.205","172.30.1.104","TCP","54","43136 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19108","8.684441","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19109","8.684857","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19110","8.684864","172.30.1.205","172.30.1.104","TCP","54","43136 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19111","8.686681","172.30.1.205","172.30.1.104","TCP","54","43136 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19112","8.686792","172.30.1.205","172.30.1.104","TCP","74","35774 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911913 TSecr=0 WS=128" "19113","8.686960","172.30.1.104","172.30.1.205","TCP","54","135 > 43136 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19114","8.686999","172.30.1.104","172.30.1.205","TCP","54","135 > 43136 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19115","8.687004","172.30.1.205","172.30.1.104","TCP","54","43136 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19116","8.687095","172.30.1.104","172.30.1.205","TCP","66","49671 > 35774 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19117","8.687103","172.30.1.205","172.30.1.104","TCP","54","35774 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19118","8.687457","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19119","8.688435","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19120","8.688444","172.30.1.205","172.30.1.104","TCP","54","35774 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19121","8.690345","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19122","8.690732","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19123","8.690738","172.30.1.205","172.30.1.104","TCP","54","35774 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19124","8.692092","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19125","8.693901","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19126","8.693910","172.30.1.205","172.30.1.104","TCP","54","35774 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19127","8.694849","172.30.1.205","172.30.1.104","TCP","74","43140 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911921 TSecr=0 WS=128" "19128","8.695161","172.30.1.104","172.30.1.205","TCP","66","135 > 43140 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19129","8.695172","172.30.1.205","172.30.1.104","TCP","54","43140 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19130","8.695520","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19131","8.695829","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19132","8.695838","172.30.1.205","172.30.1.104","TCP","54","43140 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19133","8.698044","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19134","8.698411","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19135","8.698417","172.30.1.205","172.30.1.104","TCP","54","43140 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19136","8.700230","172.30.1.205","172.30.1.104","TCP","54","43140 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19137","8.700341","172.30.1.205","172.30.1.104","TCP","74","35778 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911926 TSecr=0 WS=128" "19138","8.700865","172.30.1.104","172.30.1.205","TCP","54","135 > 43140 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19139","8.700876","172.30.1.104","172.30.1.205","TCP","54","135 > 43140 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19140","8.700882","172.30.1.205","172.30.1.104","TCP","54","43140 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19141","8.701082","172.30.1.104","172.30.1.205","TCP","66","49671 > 35778 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19142","8.701091","172.30.1.205","172.30.1.104","TCP","54","35778 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19143","8.701437","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19144","8.701733","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19145","8.701742","172.30.1.205","172.30.1.104","TCP","54","35778 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19146","8.703601","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19147","8.704017","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19148","8.704021","172.30.1.205","172.30.1.104","TCP","54","35778 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19149","8.705410","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19150","8.707341","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19151","8.707351","172.30.1.205","172.30.1.104","TCP","54","35778 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19152","8.708286","172.30.1.205","172.30.1.104","TCP","74","43144 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911934 TSecr=0 WS=128" "19153","8.708643","172.30.1.104","172.30.1.205","TCP","66","135 > 43144 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19154","8.708654","172.30.1.205","172.30.1.104","TCP","54","43144 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19155","8.709038","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19156","8.709356","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19157","8.709365","172.30.1.205","172.30.1.104","TCP","54","43144 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19158","8.711560","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19159","8.711969","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19160","8.711976","172.30.1.205","172.30.1.104","TCP","54","43144 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19161","8.712852","172.30.1.205","172.30.1.104","TCP","54","35738 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19162","8.712900","172.30.1.205","172.30.1.104","TCP","54","35742 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19163","8.712938","172.30.1.205","172.30.1.104","TCP","54","35746 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19164","8.712967","172.30.1.205","172.30.1.104","TCP","54","35750 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19165","8.712996","172.30.1.205","172.30.1.104","TCP","54","35754 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19166","8.713025","172.30.1.205","172.30.1.104","TCP","54","35758 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19167","8.713053","172.30.1.205","172.30.1.104","TCP","54","35762 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19168","8.713081","172.30.1.205","172.30.1.104","TCP","54","35766 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19169","8.713112","172.30.1.205","172.30.1.104","TCP","54","35770 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19170","8.713144","172.30.1.205","172.30.1.104","TCP","54","35774 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19171","8.713171","172.30.1.205","172.30.1.104","TCP","54","35778 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19172","8.713241","172.30.1.205","172.30.1.104","TCP","54","35734 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19173","8.713309","172.30.1.104","172.30.1.205","TCP","54","49671 > 35738 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19174","8.713318","172.30.1.104","172.30.1.205","TCP","54","49671 > 35742 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19175","8.713322","172.30.1.104","172.30.1.205","TCP","54","49671 > 35738 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19176","8.713328","172.30.1.205","172.30.1.104","TCP","54","35738 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19177","8.713345","172.30.1.104","172.30.1.205","TCP","54","49671 > 35746 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19178","8.713361","172.30.1.104","172.30.1.205","TCP","54","49671 > 35750 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19179","8.713381","172.30.1.104","172.30.1.205","TCP","54","49671 > 35754 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19180","8.713401","172.30.1.104","172.30.1.205","TCP","54","49671 > 35758 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19181","8.713421","172.30.1.104","172.30.1.205","TCP","54","49671 > 35762 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19182","8.713442","172.30.1.104","172.30.1.205","TCP","54","49671 > 35754 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19183","8.713447","172.30.1.205","172.30.1.104","TCP","54","35754 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19184","8.713514","172.30.1.104","172.30.1.205","TCP","54","49671 > 35766 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19185","8.713567","172.30.1.104","172.30.1.205","TCP","54","49671 > 35750 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19186","8.713572","172.30.1.205","172.30.1.104","TCP","54","35750 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19187","8.713574","172.30.1.104","172.30.1.205","TCP","54","49671 > 35766 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19188","8.713576","172.30.1.205","172.30.1.104","TCP","54","35766 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19189","8.713577","172.30.1.104","172.30.1.205","TCP","54","49671 > 35762 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19190","8.713579","172.30.1.205","172.30.1.104","TCP","54","35762 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19191","8.713589","172.30.1.104","172.30.1.205","TCP","54","49671 > 35758 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19192","8.713590","172.30.1.205","172.30.1.104","TCP","54","35758 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19193","8.713609","172.30.1.104","172.30.1.205","TCP","54","49671 > 35742 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19194","8.713612","172.30.1.205","172.30.1.104","TCP","54","35742 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19195","8.713633","172.30.1.104","172.30.1.205","TCP","54","49671 > 35746 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19196","8.713636","172.30.1.205","172.30.1.104","TCP","54","35746 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19197","8.713789","172.30.1.104","172.30.1.205","TCP","54","49671 > 35770 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19198","8.713808","172.30.1.104","172.30.1.205","TCP","54","49671 > 35774 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19199","8.713827","172.30.1.104","172.30.1.205","TCP","54","49671 > 35778 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19200","8.713856","172.30.1.104","172.30.1.205","TCP","54","49671 > 35770 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19201","8.713860","172.30.1.205","172.30.1.104","TCP","54","35770 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19202","8.713863","172.30.1.104","172.30.1.205","TCP","54","49671 > 35774 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19203","8.713865","172.30.1.205","172.30.1.104","TCP","54","35774 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19204","8.713887","172.30.1.104","172.30.1.205","TCP","54","49671 > 35778 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19205","8.713889","172.30.1.205","172.30.1.104","TCP","54","35778 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19206","8.713973","172.30.1.104","172.30.1.205","TCP","54","49671 > 35734 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19207","8.713992","172.30.1.104","172.30.1.205","TCP","54","49671 > 35734 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19208","8.713996","172.30.1.205","172.30.1.104","TCP","54","35734 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19209","8.714776","172.30.1.205","172.30.1.104","TCP","54","43144 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19210","8.714891","172.30.1.205","172.30.1.104","TCP","74","35782 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911941 TSecr=0 WS=128" "19211","8.715095","172.30.1.104","172.30.1.205","TCP","54","135 > 43144 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19212","8.715103","172.30.1.104","172.30.1.205","TCP","54","135 > 43144 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19213","8.715108","172.30.1.205","172.30.1.104","TCP","54","43144 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19214","8.715174","172.30.1.104","172.30.1.205","TCP","66","49671 > 35782 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19215","8.715182","172.30.1.205","172.30.1.104","TCP","54","35782 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19216","8.715533","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19217","8.715829","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19218","8.715838","172.30.1.205","172.30.1.104","TCP","54","35782 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19219","8.717765","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19220","8.718131","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19221","8.718138","172.30.1.205","172.30.1.104","TCP","54","35782 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19222","8.719502","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19223","8.721385","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19224","8.721395","172.30.1.205","172.30.1.104","TCP","54","35782 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19225","8.722363","172.30.1.205","172.30.1.104","TCP","74","43148 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911948 TSecr=0 WS=128" "19226","8.722679","172.30.1.104","172.30.1.205","TCP","66","135 > 43148 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19227","8.722690","172.30.1.205","172.30.1.104","TCP","54","43148 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19228","8.723037","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19229","8.723339","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19230","8.723348","172.30.1.205","172.30.1.104","TCP","54","43148 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19231","8.725564","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19232","8.725951","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19233","8.725958","172.30.1.205","172.30.1.104","TCP","54","43148 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19234","8.727759","172.30.1.205","172.30.1.104","TCP","54","43148 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19235","8.727869","172.30.1.205","172.30.1.104","TCP","74","35786 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911954 TSecr=0 WS=128" "19236","8.728029","172.30.1.104","172.30.1.205","TCP","54","135 > 43148 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19237","8.728061","172.30.1.104","172.30.1.205","TCP","54","135 > 43148 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19238","8.728067","172.30.1.205","172.30.1.104","TCP","54","43148 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19239","8.728140","172.30.1.104","172.30.1.205","TCP","66","49671 > 35786 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19240","8.728148","172.30.1.205","172.30.1.104","TCP","54","35786 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19241","8.728492","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19242","8.728810","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19243","8.728819","172.30.1.205","172.30.1.104","TCP","54","35786 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19244","8.730700","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19245","8.731164","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19246","8.731170","172.30.1.205","172.30.1.104","TCP","54","35786 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19247","8.732507","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19248","8.734446","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19249","8.734455","172.30.1.205","172.30.1.104","TCP","54","35786 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19250","8.735411","172.30.1.205","172.30.1.104","TCP","74","43152 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911961 TSecr=0 WS=128" "19251","8.735697","172.30.1.104","172.30.1.205","TCP","66","135 > 43152 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19252","8.735715","172.30.1.205","172.30.1.104","TCP","54","43152 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19253","8.736064","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19254","8.736347","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19255","8.736356","172.30.1.205","172.30.1.104","TCP","54","43152 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19256","8.738591","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19257","8.738995","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19258","8.739001","172.30.1.205","172.30.1.104","TCP","54","43152 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19259","8.740828","172.30.1.205","172.30.1.104","TCP","54","43152 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19260","8.740942","172.30.1.205","172.30.1.104","TCP","74","35790 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911967 TSecr=0 WS=128" "19261","8.741105","172.30.1.104","172.30.1.205","TCP","54","135 > 43152 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19262","8.741139","172.30.1.104","172.30.1.205","TCP","54","135 > 43152 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19263","8.741145","172.30.1.205","172.30.1.104","TCP","54","43152 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19264","8.741223","172.30.1.104","172.30.1.205","TCP","66","49671 > 35790 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19265","8.741231","172.30.1.205","172.30.1.104","TCP","54","35790 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19266","8.741582","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19267","8.743917","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19268","8.743924","172.30.1.205","172.30.1.104","TCP","54","35790 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19269","8.745822","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19270","8.746253","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19271","8.746260","172.30.1.205","172.30.1.104","TCP","54","35790 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19272","8.747612","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19273","8.749495","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19274","8.749504","172.30.1.205","172.30.1.104","TCP","54","35790 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19275","8.750456","172.30.1.205","172.30.1.104","TCP","74","43156 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911976 TSecr=0 WS=128" "19276","8.750773","172.30.1.104","172.30.1.205","TCP","66","135 > 43156 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19277","8.750790","172.30.1.205","172.30.1.104","TCP","54","43156 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19278","8.751198","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19279","8.751550","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19280","8.751560","172.30.1.205","172.30.1.104","TCP","54","43156 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19281","8.753817","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19282","8.754216","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19283","8.754222","172.30.1.205","172.30.1.104","TCP","54","43156 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19284","8.756053","172.30.1.205","172.30.1.104","TCP","54","43156 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19285","8.756170","172.30.1.205","172.30.1.104","TCP","74","35794 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911982 TSecr=0 WS=128" "19286","8.756387","172.30.1.104","172.30.1.205","TCP","54","135 > 43156 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19287","8.756427","172.30.1.104","172.30.1.205","TCP","54","135 > 43156 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19288","8.756432","172.30.1.205","172.30.1.104","TCP","54","43156 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19289","8.756479","172.30.1.104","172.30.1.205","TCP","66","49671 > 35794 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19290","8.756487","172.30.1.205","172.30.1.104","TCP","54","35794 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19291","8.756862","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19292","8.757216","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19293","8.757224","172.30.1.205","172.30.1.104","TCP","54","35794 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19294","8.759093","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19295","8.760401","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19296","8.760407","172.30.1.205","172.30.1.104","TCP","54","35794 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19297","8.761775","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19298","8.763664","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19299","8.763673","172.30.1.205","172.30.1.104","TCP","54","35794 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19300","8.764611","172.30.1.205","172.30.1.104","TCP","74","43160 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911991 TSecr=0 WS=128" "19301","8.764970","172.30.1.104","172.30.1.205","TCP","66","135 > 43160 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19302","8.764980","172.30.1.205","172.30.1.104","TCP","54","43160 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19303","8.765334","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19304","8.765672","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19305","8.765681","172.30.1.205","172.30.1.104","TCP","54","43160 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19306","8.767848","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19307","8.768241","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19308","8.768247","172.30.1.205","172.30.1.104","TCP","54","43160 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19309","8.770081","172.30.1.205","172.30.1.104","TCP","54","43160 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19310","8.770190","172.30.1.205","172.30.1.104","TCP","74","35798 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499911996 TSecr=0 WS=128" "19311","8.770355","172.30.1.104","172.30.1.205","TCP","54","135 > 43160 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19312","8.770384","172.30.1.104","172.30.1.205","TCP","54","135 > 43160 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19313","8.770390","172.30.1.205","172.30.1.104","TCP","54","43160 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19314","8.770465","172.30.1.104","172.30.1.205","TCP","66","49671 > 35798 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19315","8.770472","172.30.1.205","172.30.1.104","TCP","54","35798 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19316","8.770817","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19317","8.771142","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19318","8.771150","172.30.1.205","172.30.1.104","TCP","54","35798 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19319","8.773032","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19320","8.773405","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19321","8.773411","172.30.1.205","172.30.1.104","TCP","54","35798 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19322","8.774748","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19323","8.776611","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19324","8.776622","172.30.1.205","172.30.1.104","TCP","54","35798 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19325","8.777597","172.30.1.205","172.30.1.104","TCP","74","43164 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912004 TSecr=0 WS=128" "19326","8.777922","172.30.1.104","172.30.1.205","TCP","66","135 > 43164 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19327","8.777932","172.30.1.205","172.30.1.104","TCP","54","43164 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19328","8.778288","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19329","8.778582","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19330","8.778591","172.30.1.205","172.30.1.104","TCP","54","43164 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19331","8.780772","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19332","8.781203","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19333","8.781209","172.30.1.205","172.30.1.104","TCP","54","43164 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19334","8.783094","172.30.1.205","172.30.1.104","TCP","54","43164 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19335","8.783203","172.30.1.205","172.30.1.104","TCP","74","35802 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912009 TSecr=0 WS=128" "19336","8.783364","172.30.1.104","172.30.1.205","TCP","54","135 > 43164 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19337","8.783403","172.30.1.104","172.30.1.205","TCP","54","135 > 43164 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19338","8.783419","172.30.1.205","172.30.1.104","TCP","54","43164 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19339","8.783466","172.30.1.104","172.30.1.205","TCP","66","49671 > 35802 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19340","8.783473","172.30.1.205","172.30.1.104","TCP","54","35802 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19341","8.783838","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19342","8.784133","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19343","8.784140","172.30.1.205","172.30.1.104","TCP","54","35802 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19344","8.786110","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19345","8.787155","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19346","8.787161","172.30.1.205","172.30.1.104","TCP","54","35802 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19347","8.788593","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19348","8.790500","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19349","8.790515","172.30.1.205","172.30.1.104","TCP","54","35802 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19350","8.791539","172.30.1.205","172.30.1.104","TCP","74","43168 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912017 TSecr=0 WS=128" "19351","8.792713","172.30.1.104","172.30.1.205","TCP","66","135 > 43168 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19352","8.792727","172.30.1.205","172.30.1.104","TCP","54","43168 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19353","8.793120","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19354","8.793413","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19355","8.793422","172.30.1.205","172.30.1.104","TCP","54","43168 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19356","8.795656","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19357","8.796049","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19358","8.796056","172.30.1.205","172.30.1.104","TCP","54","43168 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19359","8.797917","172.30.1.205","172.30.1.104","TCP","54","43168 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19360","8.798041","172.30.1.205","172.30.1.104","TCP","74","35806 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912024 TSecr=0 WS=128" "19361","8.798221","172.30.1.104","172.30.1.205","TCP","54","135 > 43168 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19362","8.798234","172.30.1.104","172.30.1.205","TCP","54","135 > 43168 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19363","8.798243","172.30.1.205","172.30.1.104","TCP","54","43168 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19364","8.798360","172.30.1.104","172.30.1.205","TCP","66","49671 > 35806 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19365","8.798377","172.30.1.205","172.30.1.104","TCP","54","35806 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19366","8.799014","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19367","8.799327","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19368","8.799337","172.30.1.205","172.30.1.104","TCP","54","35806 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19369","8.801270","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19370","8.801651","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19371","8.801660","172.30.1.205","172.30.1.104","TCP","54","35806 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19372","8.803114","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19373","8.804997","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19374","8.805008","172.30.1.205","172.30.1.104","TCP","54","35806 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19375","8.806000","172.30.1.205","172.30.1.104","TCP","74","43172 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912032 TSecr=0 WS=128" "19376","8.806298","172.30.1.104","172.30.1.205","TCP","66","135 > 43172 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19377","8.806308","172.30.1.205","172.30.1.104","TCP","54","43172 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19378","8.806665","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19379","8.806943","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19380","8.806952","172.30.1.205","172.30.1.104","TCP","54","43172 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19381","8.809218","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19382","8.809593","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19383","8.809600","172.30.1.205","172.30.1.104","TCP","54","43172 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19384","8.811423","172.30.1.205","172.30.1.104","TCP","54","43172 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19385","8.811535","172.30.1.205","172.30.1.104","TCP","74","35810 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912037 TSecr=0 WS=128" "19386","8.811685","172.30.1.104","172.30.1.205","TCP","54","135 > 43172 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19387","8.811710","172.30.1.104","172.30.1.205","TCP","54","135 > 43172 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19388","8.811716","172.30.1.205","172.30.1.104","TCP","54","43172 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19389","8.811820","172.30.1.104","172.30.1.205","TCP","66","49671 > 35810 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19390","8.811829","172.30.1.205","172.30.1.104","TCP","54","35810 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19391","8.812179","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19392","8.812702","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19393","8.812711","172.30.1.205","172.30.1.104","TCP","54","35810 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19394","8.814631","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19395","8.815006","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19396","8.815012","172.30.1.205","172.30.1.104","TCP","54","35810 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19397","8.816381","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19398","8.818321","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19399","8.818332","172.30.1.205","172.30.1.104","TCP","54","35810 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19400","8.819292","172.30.1.205","172.30.1.104","TCP","74","43176 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912045 TSecr=0 WS=128" "19401","8.819596","172.30.1.104","172.30.1.205","TCP","66","135 > 43176 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19402","8.819607","172.30.1.205","172.30.1.104","TCP","54","43176 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19403","8.819960","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19404","8.820246","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19405","8.820255","172.30.1.205","172.30.1.104","TCP","54","43176 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19406","8.822488","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19407","8.822880","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19408","8.822887","172.30.1.205","172.30.1.104","TCP","54","43176 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19409","8.824721","172.30.1.205","172.30.1.104","TCP","54","43176 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19410","8.824856","172.30.1.205","172.30.1.104","TCP","74","35814 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912051 TSecr=0 WS=128" "19411","8.825023","172.30.1.104","172.30.1.205","TCP","54","135 > 43176 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19412","8.825055","172.30.1.104","172.30.1.205","TCP","54","135 > 43176 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19413","8.825061","172.30.1.205","172.30.1.104","TCP","54","43176 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19414","8.825155","172.30.1.104","172.30.1.205","TCP","66","49671 > 35814 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19415","8.825167","172.30.1.205","172.30.1.104","TCP","54","35814 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19416","8.825514","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19417","8.825846","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19418","8.825855","172.30.1.205","172.30.1.104","TCP","54","35814 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19419","8.827742","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19420","8.828143","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19421","8.828149","172.30.1.205","172.30.1.104","TCP","54","35814 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19422","8.829552","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19423","8.832438","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19424","8.832449","172.30.1.205","172.30.1.104","TCP","54","35814 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19425","8.833425","172.30.1.205","172.30.1.104","TCP","74","43180 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912059 TSecr=0 WS=128" "19426","8.833725","172.30.1.104","172.30.1.205","TCP","66","135 > 43180 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19427","8.833736","172.30.1.205","172.30.1.104","TCP","54","43180 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19428","8.834096","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19429","8.834400","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19430","8.834411","172.30.1.205","172.30.1.104","TCP","54","43180 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19431","8.836625","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19432","8.837041","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19433","8.837048","172.30.1.205","172.30.1.104","TCP","54","43180 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19434","8.838863","172.30.1.205","172.30.1.104","TCP","54","43180 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19435","8.838975","172.30.1.205","172.30.1.104","TCP","74","35818 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912065 TSecr=0 WS=128" "19436","8.839161","172.30.1.104","172.30.1.205","TCP","54","135 > 43180 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19437","8.839305","172.30.1.104","172.30.1.205","TCP","54","135 > 43180 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19438","8.839310","172.30.1.205","172.30.1.104","TCP","54","43180 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19439","8.839331","172.30.1.104","172.30.1.205","TCP","66","49671 > 35818 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19440","8.839339","172.30.1.205","172.30.1.104","TCP","54","35818 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19441","8.839684","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19442","8.839986","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19443","8.839995","172.30.1.205","172.30.1.104","TCP","54","35818 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19444","8.841924","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19445","8.842329","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19446","8.842336","172.30.1.205","172.30.1.104","TCP","54","35818 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19447","8.843694","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19448","8.845678","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19449","8.845688","172.30.1.205","172.30.1.104","TCP","54","35818 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19450","8.846646","172.30.1.205","172.30.1.104","TCP","74","43184 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912073 TSecr=0 WS=128" "19451","8.846973","172.30.1.104","172.30.1.205","TCP","66","135 > 43184 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19452","8.846984","172.30.1.205","172.30.1.104","TCP","54","43184 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19453","8.847343","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19454","8.847635","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19455","8.847645","172.30.1.205","172.30.1.104","TCP","54","43184 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19456","8.849886","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19457","8.850320","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19458","8.850327","172.30.1.205","172.30.1.104","TCP","54","43184 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19459","8.852142","172.30.1.205","172.30.1.104","TCP","54","43184 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19460","8.852255","172.30.1.205","172.30.1.104","TCP","74","35822 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912078 TSecr=0 WS=128" "19461","8.852439","172.30.1.104","172.30.1.205","TCP","54","135 > 43184 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19462","8.852463","172.30.1.104","172.30.1.205","TCP","54","135 > 43184 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19463","8.852469","172.30.1.205","172.30.1.104","TCP","54","43184 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19464","8.852570","172.30.1.104","172.30.1.205","TCP","66","49671 > 35822 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19465","8.852579","172.30.1.205","172.30.1.104","TCP","54","35822 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19466","8.852958","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19467","8.853235","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19468","8.853244","172.30.1.205","172.30.1.104","TCP","54","35822 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19469","8.855153","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19470","8.855595","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19471","8.855602","172.30.1.205","172.30.1.104","TCP","54","35822 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19472","8.856988","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19473","8.858971","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19474","8.858981","172.30.1.205","172.30.1.104","TCP","54","35822 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19475","8.859951","172.30.1.205","172.30.1.104","TCP","74","43188 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912086 TSecr=0 WS=128" "19476","8.860266","172.30.1.104","172.30.1.205","TCP","66","135 > 43188 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19477","8.860277","172.30.1.205","172.30.1.104","TCP","54","43188 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19478","8.860634","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19479","8.860943","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19480","8.860952","172.30.1.205","172.30.1.104","TCP","54","43188 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19481","8.863156","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19482","8.863565","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19483","8.863572","172.30.1.205","172.30.1.104","TCP","54","43188 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19484","8.865410","172.30.1.205","172.30.1.104","TCP","54","43188 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19485","8.865530","172.30.1.205","172.30.1.104","TCP","74","35826 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912091 TSecr=0 WS=128" "19486","8.865693","172.30.1.104","172.30.1.205","TCP","54","135 > 43188 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19487","8.865754","172.30.1.104","172.30.1.205","TCP","54","135 > 43188 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19488","8.865761","172.30.1.205","172.30.1.104","TCP","54","43188 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19489","8.865879","172.30.1.104","172.30.1.205","TCP","66","49671 > 35826 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19490","8.865887","172.30.1.205","172.30.1.104","TCP","54","35826 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19491","8.866233","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19492","8.867750","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19493","8.867757","172.30.1.205","172.30.1.104","TCP","54","35826 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19494","8.869662","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19495","8.870027","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19496","8.870034","172.30.1.205","172.30.1.104","TCP","54","35826 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19497","8.871413","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19498","8.873447","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19499","8.873457","172.30.1.205","172.30.1.104","TCP","54","35826 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19500","8.874427","172.30.1.205","172.30.1.104","TCP","74","43192 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912100 TSecr=0 WS=128" "19501","8.874721","172.30.1.104","172.30.1.205","TCP","66","135 > 43192 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19502","8.874743","172.30.1.205","172.30.1.104","TCP","54","43192 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19503","8.875103","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19504","8.875404","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19505","8.875413","172.30.1.205","172.30.1.104","TCP","54","43192 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19506","8.877710","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19507","8.878138","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19508","8.878144","172.30.1.205","172.30.1.104","TCP","54","43192 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19509","8.878993","172.30.1.205","172.30.1.104","TCP","54","35786 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19510","8.879043","172.30.1.205","172.30.1.104","TCP","54","35790 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19511","8.879081","172.30.1.205","172.30.1.104","TCP","54","35794 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19512","8.879112","172.30.1.205","172.30.1.104","TCP","54","35798 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19513","8.879145","172.30.1.205","172.30.1.104","TCP","54","35802 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19514","8.879181","172.30.1.205","172.30.1.104","TCP","54","35806 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19515","8.879215","172.30.1.205","172.30.1.104","TCP","54","35810 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19516","8.879241","172.30.1.205","172.30.1.104","TCP","54","35814 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19517","8.879268","172.30.1.205","172.30.1.104","TCP","54","35818 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19518","8.879294","172.30.1.205","172.30.1.104","TCP","54","35822 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19519","8.879315","172.30.1.205","172.30.1.104","TCP","54","35826 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19520","8.879337","172.30.1.104","172.30.1.205","TCP","54","49671 > 35786 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19521","8.879355","172.30.1.104","172.30.1.205","TCP","54","49671 > 35790 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19522","8.879384","172.30.1.104","172.30.1.205","TCP","54","49671 > 35786 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19523","8.879390","172.30.1.205","172.30.1.104","TCP","54","35786 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19524","8.879407","172.30.1.104","172.30.1.205","TCP","54","49671 > 35794 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19525","8.879426","172.30.1.104","172.30.1.205","TCP","54","49671 > 35798 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19526","8.879454","172.30.1.205","172.30.1.104","TCP","54","35782 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19527","8.879552","172.30.1.104","172.30.1.205","TCP","54","49671 > 35802 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19528","8.879579","172.30.1.104","172.30.1.205","TCP","54","49671 > 35802 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19529","8.879584","172.30.1.205","172.30.1.104","TCP","54","35802 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19530","8.879601","172.30.1.104","172.30.1.205","TCP","54","49671 > 35798 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19531","8.879604","172.30.1.205","172.30.1.104","TCP","54","35798 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19532","8.879658","172.30.1.104","172.30.1.205","TCP","54","49671 > 35794 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19533","8.879662","172.30.1.205","172.30.1.104","TCP","54","35794 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19534","8.879682","172.30.1.104","172.30.1.205","TCP","54","49671 > 35790 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19535","8.879685","172.30.1.205","172.30.1.104","TCP","54","35790 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19536","8.879703","172.30.1.104","172.30.1.205","TCP","54","49671 > 35806 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19537","8.879767","172.30.1.104","172.30.1.205","TCP","54","49671 > 35810 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19538","8.879772","172.30.1.104","172.30.1.205","TCP","54","49671 > 35814 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19539","8.879860","172.30.1.104","172.30.1.205","TCP","54","49671 > 35806 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19540","8.879866","172.30.1.205","172.30.1.104","TCP","54","35806 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19541","8.879880","172.30.1.104","172.30.1.205","TCP","54","49671 > 35818 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19542","8.879903","172.30.1.104","172.30.1.205","TCP","54","49671 > 35818 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19543","8.879907","172.30.1.205","172.30.1.104","TCP","54","35818 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19544","8.879922","172.30.1.104","172.30.1.205","TCP","54","49671 > 35810 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19545","8.879925","172.30.1.205","172.30.1.104","TCP","54","35810 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19546","8.879943","172.30.1.104","172.30.1.205","TCP","54","49671 > 35814 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19547","8.879947","172.30.1.205","172.30.1.104","TCP","54","35814 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19548","8.879962","172.30.1.104","172.30.1.205","TCP","54","49671 > 35822 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19549","8.879984","172.30.1.104","172.30.1.205","TCP","54","49671 > 35826 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19550","8.880089","172.30.1.104","172.30.1.205","TCP","54","49671 > 35782 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19551","8.880109","172.30.1.104","172.30.1.205","TCP","54","49671 > 35822 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19552","8.880114","172.30.1.205","172.30.1.104","TCP","54","35822 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19553","8.880130","172.30.1.104","172.30.1.205","TCP","54","49671 > 35826 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19554","8.880133","172.30.1.205","172.30.1.104","TCP","54","35826 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19555","8.880153","172.30.1.104","172.30.1.205","TCP","54","49671 > 35782 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19556","8.880156","172.30.1.205","172.30.1.104","TCP","54","35782 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19557","8.881027","172.30.1.205","172.30.1.104","TCP","54","43192 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19558","8.881146","172.30.1.205","172.30.1.104","TCP","74","35830 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912107 TSecr=0 WS=128" "19559","8.881297","172.30.1.104","172.30.1.205","TCP","54","135 > 43192 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19560","8.881311","172.30.1.104","172.30.1.205","TCP","54","135 > 43192 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19561","8.881316","172.30.1.205","172.30.1.104","TCP","54","43192 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19562","8.881409","172.30.1.104","172.30.1.205","TCP","66","49671 > 35830 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19563","8.881418","172.30.1.205","172.30.1.104","TCP","54","35830 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19564","8.881769","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19565","8.882048","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19566","8.882058","172.30.1.205","172.30.1.104","TCP","54","35830 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19567","8.883927","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19568","8.884301","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19569","8.884308","172.30.1.205","172.30.1.104","TCP","54","35830 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19570","8.885693","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19571","8.887765","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19572","8.887775","172.30.1.205","172.30.1.104","TCP","54","35830 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19573","8.888748","172.30.1.205","172.30.1.104","TCP","74","43196 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912115 TSecr=0 WS=128" "19574","8.889045","172.30.1.104","172.30.1.205","TCP","66","135 > 43196 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19575","8.889057","172.30.1.205","172.30.1.104","TCP","54","43196 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19576","8.889423","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19577","8.889724","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19578","8.889738","172.30.1.205","172.30.1.104","TCP","54","43196 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19579","8.892019","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19580","8.892420","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19581","8.892427","172.30.1.205","172.30.1.104","TCP","54","43196 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19582","8.894279","172.30.1.205","172.30.1.104","TCP","54","43196 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19583","8.894404","172.30.1.205","172.30.1.104","TCP","74","35834 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912120 TSecr=0 WS=128" "19584","8.894528","172.30.1.104","172.30.1.205","TCP","54","135 > 43196 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19585","8.894545","172.30.1.104","172.30.1.205","TCP","54","135 > 43196 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19586","8.894552","172.30.1.205","172.30.1.104","TCP","54","43196 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19587","8.894700","172.30.1.104","172.30.1.205","TCP","66","49671 > 35834 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19588","8.894712","172.30.1.205","172.30.1.104","TCP","54","35834 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19589","8.895068","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19590","8.895354","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19591","8.895363","172.30.1.205","172.30.1.104","TCP","54","35834 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19592","8.897297","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19593","8.897653","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19594","8.897660","172.30.1.205","172.30.1.104","TCP","54","35834 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19595","8.899032","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19596","8.900920","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19597","8.900930","172.30.1.205","172.30.1.104","TCP","54","35834 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19598","8.901897","172.30.1.205","172.30.1.104","TCP","74","43200 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912128 TSecr=0 WS=128" "19599","8.902204","172.30.1.104","172.30.1.205","TCP","66","135 > 43200 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19600","8.902220","172.30.1.205","172.30.1.104","TCP","54","43200 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19601","8.902579","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19602","8.902867","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19603","8.902876","172.30.1.205","172.30.1.104","TCP","54","43200 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19604","8.905139","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19605","8.905790","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19606","8.905797","172.30.1.205","172.30.1.104","TCP","54","43200 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19607","8.907634","172.30.1.205","172.30.1.104","TCP","54","43200 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19608","8.907759","172.30.1.205","172.30.1.104","TCP","74","35838 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912134 TSecr=0 WS=128" "19609","8.907946","172.30.1.104","172.30.1.205","TCP","54","135 > 43200 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19610","8.907969","172.30.1.104","172.30.1.205","TCP","54","135 > 43200 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19611","8.907975","172.30.1.205","172.30.1.104","TCP","54","43200 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19612","8.908067","172.30.1.104","172.30.1.205","TCP","66","49671 > 35838 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19613","8.908075","172.30.1.205","172.30.1.104","TCP","54","35838 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19614","8.908429","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19615","8.908718","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19616","8.908726","172.30.1.205","172.30.1.104","TCP","54","35838 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19617","8.910619","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19618","8.910985","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19619","8.910992","172.30.1.205","172.30.1.104","TCP","54","35838 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19620","8.912342","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19621","8.914224","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19622","8.914233","172.30.1.205","172.30.1.104","TCP","54","35838 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19623","8.915194","172.30.1.205","172.30.1.104","TCP","74","43204 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912141 TSecr=0 WS=128" "19624","8.915609","172.30.1.104","172.30.1.205","TCP","66","135 > 43204 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19625","8.915626","172.30.1.205","172.30.1.104","TCP","54","43204 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19626","8.916036","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19627","8.916334","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19628","8.916346","172.30.1.205","172.30.1.104","TCP","54","43204 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19629","8.918657","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19630","8.919061","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19631","8.919068","172.30.1.205","172.30.1.104","TCP","54","43204 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19632","8.920912","172.30.1.205","172.30.1.104","TCP","54","43204 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19633","8.921030","172.30.1.205","172.30.1.104","TCP","74","35842 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912147 TSecr=0 WS=128" "19634","8.921176","172.30.1.104","172.30.1.205","TCP","54","135 > 43204 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19635","8.921187","172.30.1.104","172.30.1.205","TCP","54","135 > 43204 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19636","8.921193","172.30.1.205","172.30.1.104","TCP","54","43204 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19637","8.921365","172.30.1.104","172.30.1.205","TCP","66","49671 > 35842 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19638","8.921374","172.30.1.205","172.30.1.104","TCP","54","35842 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19639","8.921724","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19640","8.923076","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19641","8.923085","172.30.1.205","172.30.1.104","TCP","54","35842 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19642","8.924996","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19643","8.925350","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19644","8.925356","172.30.1.205","172.30.1.104","TCP","54","35842 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19645","8.926725","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19646","8.928642","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19647","8.928651","172.30.1.205","172.30.1.104","TCP","54","35842 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19648","8.929621","172.30.1.205","172.30.1.104","TCP","74","43208 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912156 TSecr=0 WS=128" "19649","8.929939","172.30.1.104","172.30.1.205","TCP","66","135 > 43208 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19650","8.929950","172.30.1.205","172.30.1.104","TCP","54","43208 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19651","8.930309","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19652","8.930671","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19653","8.930679","172.30.1.205","172.30.1.104","TCP","54","43208 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19654","8.932885","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19655","8.933269","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19656","8.933275","172.30.1.205","172.30.1.104","TCP","54","43208 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19657","8.935079","172.30.1.205","172.30.1.104","TCP","54","43208 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19658","8.935190","172.30.1.205","172.30.1.104","TCP","74","35846 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912161 TSecr=0 WS=128" "19659","8.935331","172.30.1.104","172.30.1.205","TCP","54","135 > 43208 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19660","8.935361","172.30.1.104","172.30.1.205","TCP","54","135 > 43208 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19661","8.935367","172.30.1.205","172.30.1.104","TCP","54","43208 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19662","8.935449","172.30.1.104","172.30.1.205","TCP","66","49671 > 35846 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19663","8.935458","172.30.1.205","172.30.1.104","TCP","54","35846 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19664","8.935799","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19665","8.936100","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19666","8.936108","172.30.1.205","172.30.1.104","TCP","54","35846 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19667","8.938021","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19668","8.938396","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19669","8.938402","172.30.1.205","172.30.1.104","TCP","54","35846 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19670","8.939747","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19671","8.941652","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19672","8.941661","172.30.1.205","172.30.1.104","TCP","54","35846 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19673","8.942599","172.30.1.205","172.30.1.104","TCP","74","43212 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912169 TSecr=0 WS=128" "19674","8.942942","172.30.1.104","172.30.1.205","TCP","66","135 > 43212 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19675","8.942958","172.30.1.205","172.30.1.104","TCP","54","43212 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19676","8.943348","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19677","8.943681","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19678","8.943690","172.30.1.205","172.30.1.104","TCP","54","43212 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19679","8.945936","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19680","8.946376","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19681","8.946383","172.30.1.205","172.30.1.104","TCP","54","43212 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19682","8.948219","172.30.1.205","172.30.1.104","TCP","54","43212 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19683","8.948338","172.30.1.205","172.30.1.104","TCP","74","35850 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912174 TSecr=0 WS=128" "19684","8.948492","172.30.1.104","172.30.1.205","TCP","54","135 > 43212 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19685","8.948504","172.30.1.104","172.30.1.205","TCP","54","135 > 43212 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19686","8.948509","172.30.1.205","172.30.1.104","TCP","54","43212 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19687","8.948610","172.30.1.104","172.30.1.205","TCP","66","49671 > 35850 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19688","8.948618","172.30.1.205","172.30.1.104","TCP","54","35850 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19689","8.948999","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19690","8.949305","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19691","8.949315","172.30.1.205","172.30.1.104","TCP","54","35850 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19692","8.951216","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19693","8.951584","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19694","8.951590","172.30.1.205","172.30.1.104","TCP","54","35850 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19695","8.952988","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19696","8.954964","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19697","8.954976","172.30.1.205","172.30.1.104","TCP","54","35850 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19698","8.955951","172.30.1.205","172.30.1.104","TCP","74","43216 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912182 TSecr=0 WS=128" "19699","8.956286","172.30.1.104","172.30.1.205","TCP","66","135 > 43216 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19700","8.956297","172.30.1.205","172.30.1.104","TCP","54","43216 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19701","8.956654","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19702","8.956955","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19703","8.956965","172.30.1.205","172.30.1.104","TCP","54","43216 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19704","8.959208","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19705","8.959603","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19706","8.959609","172.30.1.205","172.30.1.104","TCP","54","43216 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19707","8.961447","172.30.1.205","172.30.1.104","TCP","54","43216 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19708","8.961564","172.30.1.205","172.30.1.104","TCP","74","35854 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912187 TSecr=0 WS=128" "19709","8.961724","172.30.1.104","172.30.1.205","TCP","54","135 > 43216 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19710","8.961733","172.30.1.104","172.30.1.205","TCP","54","135 > 43216 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19711","8.961743","172.30.1.205","172.30.1.104","TCP","54","43216 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19712","8.961835","172.30.1.104","172.30.1.205","TCP","66","49671 > 35854 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19713","8.961852","172.30.1.205","172.30.1.104","TCP","54","35854 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19714","8.962198","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19715","8.962503","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19716","8.962512","172.30.1.205","172.30.1.104","TCP","54","35854 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19717","8.964383","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19718","8.964792","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19719","8.964799","172.30.1.205","172.30.1.104","TCP","54","35854 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19720","8.966194","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19721","8.968136","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19722","8.968145","172.30.1.205","172.30.1.104","TCP","54","35854 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19723","8.969144","172.30.1.205","172.30.1.104","TCP","74","43220 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912195 TSecr=0 WS=128" "19724","8.969454","172.30.1.104","172.30.1.205","TCP","66","135 > 43220 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19725","8.969464","172.30.1.205","172.30.1.104","TCP","54","43220 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19726","8.969818","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19727","8.970159","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19728","8.970168","172.30.1.205","172.30.1.104","TCP","54","43220 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19729","8.972368","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19730","8.972755","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19731","8.972761","172.30.1.205","172.30.1.104","TCP","54","43220 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19732","8.974592","172.30.1.205","172.30.1.104","TCP","54","43220 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19733","8.974709","172.30.1.205","172.30.1.104","TCP","74","35858 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912201 TSecr=0 WS=128" "19734","8.974864","172.30.1.104","172.30.1.205","TCP","54","135 > 43220 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19735","8.974888","172.30.1.104","172.30.1.205","TCP","54","135 > 43220 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19736","8.974895","172.30.1.205","172.30.1.104","TCP","54","43220 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19737","8.974982","172.30.1.104","172.30.1.205","TCP","66","49671 > 35858 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19738","8.974991","172.30.1.205","172.30.1.104","TCP","54","35858 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19739","8.975343","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19740","8.976821","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19741","8.976831","172.30.1.205","172.30.1.104","TCP","54","35858 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19742","8.978737","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19743","8.979120","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19744","8.979127","172.30.1.205","172.30.1.104","TCP","54","35858 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19745","8.980482","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19746","8.982361","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19747","8.982371","172.30.1.205","172.30.1.104","TCP","54","35858 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19748","8.983340","172.30.1.205","172.30.1.104","TCP","74","43224 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912209 TSecr=0 WS=128" "19749","8.983656","172.30.1.104","172.30.1.205","TCP","66","135 > 43224 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19750","8.983666","172.30.1.205","172.30.1.104","TCP","54","43224 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19751","8.984013","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19752","8.984390","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19753","8.984399","172.30.1.205","172.30.1.104","TCP","54","43224 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19754","8.986608","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19755","8.987028","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19756","8.987035","172.30.1.205","172.30.1.104","TCP","54","43224 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19757","8.988867","172.30.1.205","172.30.1.104","TCP","54","43224 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19758","8.988979","172.30.1.205","172.30.1.104","TCP","74","35862 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912215 TSecr=0 WS=128" "19759","8.989168","172.30.1.104","172.30.1.205","TCP","54","135 > 43224 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19760","8.989193","172.30.1.104","172.30.1.205","TCP","54","135 > 43224 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19761","8.989199","172.30.1.205","172.30.1.104","TCP","54","43224 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19762","8.989273","172.30.1.104","172.30.1.205","TCP","66","49671 > 35862 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19763","8.989282","172.30.1.205","172.30.1.104","TCP","54","35862 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19764","8.989634","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19765","8.989961","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19766","8.989969","172.30.1.205","172.30.1.104","TCP","54","35862 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19767","8.991847","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19768","8.992233","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19769","8.992239","172.30.1.205","172.30.1.104","TCP","54","35862 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19770","8.993610","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19771","8.995488","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19772","8.995497","172.30.1.205","172.30.1.104","TCP","54","35862 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19773","8.996424","172.30.1.205","172.30.1.104","TCP","74","43228 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912222 TSecr=0 WS=128" "19774","8.996718","172.30.1.104","172.30.1.205","TCP","66","135 > 43228 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19775","8.996728","172.30.1.205","172.30.1.104","TCP","54","43228 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19776","8.997101","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19777","8.997404","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19778","8.997413","172.30.1.205","172.30.1.104","TCP","54","43228 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19779","8.999628","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19780","9.000009","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19781","9.000016","172.30.1.205","172.30.1.104","TCP","54","43228 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19782","9.001871","172.30.1.205","172.30.1.104","TCP","54","43228 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19783","9.002004","172.30.1.205","172.30.1.104","TCP","74","35866 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912228 TSecr=0 WS=128" "19784","9.002146","172.30.1.104","172.30.1.205","TCP","54","135 > 43228 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19785","9.002154","172.30.1.104","172.30.1.205","TCP","54","135 > 43228 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19786","9.002159","172.30.1.205","172.30.1.104","TCP","54","43228 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19787","9.002310","172.30.1.104","172.30.1.205","TCP","66","49671 > 35866 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19788","9.002330","172.30.1.205","172.30.1.104","TCP","54","35866 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19789","9.002685","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19790","9.004846","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19791","9.004854","172.30.1.205","172.30.1.104","TCP","54","35866 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19792","9.006720","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19793","9.007132","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19794","9.007139","172.30.1.205","172.30.1.104","TCP","54","35866 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19795","9.008503","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19796","9.011991","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19797","9.012002","172.30.1.205","172.30.1.104","TCP","54","35866 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19798","9.013035","172.30.1.205","172.30.1.104","TCP","74","43232 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912239 TSecr=0 WS=128" "19799","9.013351","172.30.1.104","172.30.1.205","TCP","66","135 > 43232 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19800","9.013363","172.30.1.205","172.30.1.104","TCP","54","43232 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19801","9.013724","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19802","9.013999","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19803","9.014009","172.30.1.205","172.30.1.104","TCP","54","43232 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19804","9.016227","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19805","9.016613","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19806","9.016620","172.30.1.205","172.30.1.104","TCP","54","43232 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19807","9.018461","172.30.1.205","172.30.1.104","TCP","54","43232 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19808","9.018582","172.30.1.205","172.30.1.104","TCP","74","35870 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912245 TSecr=0 WS=128" "19809","9.018784","172.30.1.104","172.30.1.205","TCP","54","135 > 43232 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19810","9.018885","172.30.1.104","172.30.1.205","TCP","54","135 > 43232 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19811","9.018893","172.30.1.205","172.30.1.104","TCP","54","43232 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19812","9.018898","172.30.1.104","172.30.1.205","TCP","66","49671 > 35870 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19813","9.018909","172.30.1.205","172.30.1.104","TCP","54","35870 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19814","9.019266","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19815","9.019545","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19816","9.019554","172.30.1.205","172.30.1.104","TCP","54","35870 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19817","9.021492","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19818","9.021839","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19819","9.021845","172.30.1.205","172.30.1.104","TCP","54","35870 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19820","9.023198","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19821","9.025073","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19822","9.025082","172.30.1.205","172.30.1.104","TCP","54","35870 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19823","9.026040","172.30.1.205","172.30.1.104","TCP","74","43236 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912252 TSecr=0 WS=128" "19824","9.026334","172.30.1.104","172.30.1.205","TCP","66","135 > 43236 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19825","9.026344","172.30.1.205","172.30.1.104","TCP","54","43236 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19826","9.026695","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19827","9.026950","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19828","9.026958","172.30.1.205","172.30.1.104","TCP","54","43236 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19829","9.029172","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19830","9.029517","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19831","9.029523","172.30.1.205","172.30.1.104","TCP","54","43236 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19832","9.031339","172.30.1.205","172.30.1.104","TCP","54","43236 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19833","9.031451","172.30.1.205","172.30.1.104","TCP","74","35874 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912257 TSecr=0 WS=128" "19834","9.031638","172.30.1.104","172.30.1.205","TCP","54","135 > 43236 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19835","9.031647","172.30.1.104","172.30.1.205","TCP","54","135 > 43236 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19836","9.031652","172.30.1.205","172.30.1.104","TCP","54","43236 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19837","9.031729","172.30.1.104","172.30.1.205","TCP","66","49671 > 35874 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19838","9.031737","172.30.1.205","172.30.1.104","TCP","54","35874 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19839","9.032085","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19840","9.032383","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19841","9.032391","172.30.1.205","172.30.1.104","TCP","54","35874 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19842","9.034316","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19843","9.034657","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19844","9.034664","172.30.1.205","172.30.1.104","TCP","54","35874 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19845","9.036016","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19846","9.039194","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19847","9.039203","172.30.1.205","172.30.1.104","TCP","54","35874 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19848","9.040149","172.30.1.205","172.30.1.104","TCP","74","43240 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912266 TSecr=0 WS=128" "19849","9.040460","172.30.1.104","172.30.1.205","TCP","66","135 > 43240 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19850","9.040473","172.30.1.205","172.30.1.104","TCP","54","43240 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19851","9.040860","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19852","9.041126","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19853","9.041135","172.30.1.205","172.30.1.104","TCP","54","43240 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19854","9.043331","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19855","9.043704","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19856","9.043710","172.30.1.205","172.30.1.104","TCP","54","43240 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19857","9.044573","172.30.1.205","172.30.1.104","TCP","54","35830 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19858","9.044621","172.30.1.205","172.30.1.104","TCP","54","35834 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19859","9.044654","172.30.1.205","172.30.1.104","TCP","54","35838 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19860","9.044682","172.30.1.205","172.30.1.104","TCP","54","35842 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19861","9.044711","172.30.1.205","172.30.1.104","TCP","54","35846 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19862","9.044739","172.30.1.205","172.30.1.104","TCP","54","35850 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19863","9.044766","172.30.1.205","172.30.1.104","TCP","54","35854 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19864","9.044822","172.30.1.205","172.30.1.104","TCP","54","35858 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19865","9.044847","172.30.1.205","172.30.1.104","TCP","54","35862 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19866","9.044869","172.30.1.205","172.30.1.104","TCP","54","35866 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19867","9.044902","172.30.1.104","172.30.1.205","TCP","54","49671 > 35830 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19868","9.044929","172.30.1.205","172.30.1.104","TCP","54","35870 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19869","9.044948","172.30.1.104","172.30.1.205","TCP","54","49671 > 35830 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19870","9.044957","172.30.1.205","172.30.1.104","TCP","54","35830 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19871","9.044983","172.30.1.205","172.30.1.104","TCP","54","35874 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "19872","9.045084","172.30.1.104","172.30.1.205","TCP","54","49671 > 35834 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19873","9.045106","172.30.1.104","172.30.1.205","TCP","54","49671 > 35838 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19874","9.045127","172.30.1.104","172.30.1.205","TCP","54","49671 > 35842 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19875","9.045196","172.30.1.104","172.30.1.205","TCP","54","49671 > 35846 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19876","9.045215","172.30.1.104","172.30.1.205","TCP","54","49671 > 35850 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19877","9.045236","172.30.1.104","172.30.1.205","TCP","54","49671 > 35854 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19878","9.045256","172.30.1.104","172.30.1.205","TCP","54","49671 > 35854 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19879","9.045262","172.30.1.205","172.30.1.104","TCP","54","35854 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19880","9.045277","172.30.1.104","172.30.1.205","TCP","54","49671 > 35850 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19881","9.045279","172.30.1.205","172.30.1.104","TCP","54","35850 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19882","9.045300","172.30.1.104","172.30.1.205","TCP","54","49671 > 35846 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19883","9.045304","172.30.1.205","172.30.1.104","TCP","54","35846 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19884","9.045322","172.30.1.104","172.30.1.205","TCP","54","49671 > 35834 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19885","9.045324","172.30.1.205","172.30.1.104","TCP","54","35834 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19886","9.045341","172.30.1.104","172.30.1.205","TCP","54","49671 > 35838 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19887","9.045344","172.30.1.205","172.30.1.104","TCP","54","35838 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19888","9.045370","172.30.1.104","172.30.1.205","TCP","54","49671 > 35842 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19889","9.045374","172.30.1.205","172.30.1.104","TCP","54","35842 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19890","9.045500","172.30.1.104","172.30.1.205","TCP","54","49671 > 35858 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19891","9.045520","172.30.1.104","172.30.1.205","TCP","54","49671 > 35862 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19892","9.045540","172.30.1.104","172.30.1.205","TCP","54","49671 > 35866 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19893","9.045559","172.30.1.104","172.30.1.205","TCP","54","49671 > 35870 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19894","9.045721","172.30.1.104","172.30.1.205","TCP","54","49671 > 35874 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19895","9.045741","172.30.1.104","172.30.1.205","TCP","54","49671 > 35874 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19896","9.045746","172.30.1.205","172.30.1.104","TCP","54","35874 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19897","9.045760","172.30.1.104","172.30.1.205","TCP","54","49671 > 35870 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19898","9.045762","172.30.1.205","172.30.1.104","TCP","54","35870 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19899","9.045784","172.30.1.104","172.30.1.205","TCP","54","49671 > 35858 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19900","9.045787","172.30.1.205","172.30.1.104","TCP","54","35858 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19901","9.045805","172.30.1.104","172.30.1.205","TCP","54","49671 > 35862 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19902","9.045807","172.30.1.205","172.30.1.104","TCP","54","35862 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19903","9.045825","172.30.1.104","172.30.1.205","TCP","54","49671 > 35866 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "19904","9.045827","172.30.1.205","172.30.1.104","TCP","54","35866 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "19905","9.046559","172.30.1.205","172.30.1.104","TCP","54","43240 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19906","9.046670","172.30.1.205","172.30.1.104","TCP","74","35878 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912273 TSecr=0 WS=128" "19907","9.046798","172.30.1.104","172.30.1.205","TCP","54","135 > 43240 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19908","9.046827","172.30.1.104","172.30.1.205","TCP","54","135 > 43240 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19909","9.046832","172.30.1.205","172.30.1.104","TCP","54","43240 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19910","9.046955","172.30.1.104","172.30.1.205","TCP","66","49671 > 35878 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19911","9.046963","172.30.1.205","172.30.1.104","TCP","54","35878 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19912","9.047323","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19913","9.047594","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19914","9.047602","172.30.1.205","172.30.1.104","TCP","54","35878 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19915","9.049512","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19916","9.049846","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19917","9.049853","172.30.1.205","172.30.1.104","TCP","54","35878 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19918","9.051230","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19919","9.053095","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19920","9.053105","172.30.1.205","172.30.1.104","TCP","54","35878 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19921","9.054050","172.30.1.205","172.30.1.104","TCP","74","43244 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912280 TSecr=0 WS=128" "19922","9.054351","172.30.1.104","172.30.1.205","TCP","66","135 > 43244 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19923","9.054361","172.30.1.205","172.30.1.104","TCP","54","43244 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19924","9.054715","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19925","9.055003","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19926","9.055013","172.30.1.205","172.30.1.104","TCP","54","43244 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19927","9.057231","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19928","9.057616","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19929","9.057623","172.30.1.205","172.30.1.104","TCP","54","43244 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19930","9.059434","172.30.1.205","172.30.1.104","TCP","54","43244 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19931","9.059543","172.30.1.205","172.30.1.104","TCP","74","35882 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912285 TSecr=0 WS=128" "19932","9.059688","172.30.1.104","172.30.1.205","TCP","54","135 > 43244 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19933","9.059747","172.30.1.104","172.30.1.205","TCP","54","135 > 43244 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19934","9.059753","172.30.1.205","172.30.1.104","TCP","54","43244 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19935","9.059841","172.30.1.104","172.30.1.205","TCP","66","49671 > 35882 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19936","9.059849","172.30.1.205","172.30.1.104","TCP","54","35882 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19937","9.060189","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19938","9.060458","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19939","9.060467","172.30.1.205","172.30.1.104","TCP","54","35882 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19940","9.062371","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19941","9.062737","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19942","9.062743","172.30.1.205","172.30.1.104","TCP","54","35882 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19943","9.064086","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19944","9.065964","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19945","9.065973","172.30.1.205","172.30.1.104","TCP","54","35882 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19946","9.066916","172.30.1.205","172.30.1.104","TCP","74","43248 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912293 TSecr=0 WS=128" "19947","9.067205","172.30.1.104","172.30.1.205","TCP","66","135 > 43248 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19948","9.067215","172.30.1.205","172.30.1.104","TCP","54","43248 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19949","9.067567","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19950","9.067855","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19951","9.067864","172.30.1.205","172.30.1.104","TCP","54","43248 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19952","9.070084","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19953","9.070495","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19954","9.070502","172.30.1.205","172.30.1.104","TCP","54","43248 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19955","9.072311","172.30.1.205","172.30.1.104","TCP","54","43248 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19956","9.072424","172.30.1.205","172.30.1.104","TCP","74","35886 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912298 TSecr=0 WS=128" "19957","9.072587","172.30.1.104","172.30.1.205","TCP","54","135 > 43248 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19958","9.072610","172.30.1.104","172.30.1.205","TCP","54","135 > 43248 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19959","9.072616","172.30.1.205","172.30.1.104","TCP","54","43248 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19960","9.072728","172.30.1.104","172.30.1.205","TCP","66","49671 > 35886 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19961","9.072740","172.30.1.205","172.30.1.104","TCP","54","35886 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19962","9.073133","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19963","9.073418","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19964","9.073426","172.30.1.205","172.30.1.104","TCP","54","35886 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19965","9.075295","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19966","9.075652","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19967","9.075658","172.30.1.205","172.30.1.104","TCP","54","35886 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19968","9.077039","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19969","9.078959","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19970","9.078968","172.30.1.205","172.30.1.104","TCP","54","35886 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19971","9.079915","172.30.1.205","172.30.1.104","TCP","74","43252 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912306 TSecr=0 WS=128" "19972","9.080204","172.30.1.104","172.30.1.205","TCP","66","135 > 43252 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19973","9.080215","172.30.1.205","172.30.1.104","TCP","54","43252 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19974","9.080581","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "19975","9.080885","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19976","9.080894","172.30.1.205","172.30.1.104","TCP","54","43252 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19977","9.083091","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "19978","9.083454","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "19979","9.083462","172.30.1.205","172.30.1.104","TCP","54","43252 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "19980","9.085303","172.30.1.205","172.30.1.104","TCP","54","43252 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "19981","9.085414","172.30.1.205","172.30.1.104","TCP","74","35890 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912311 TSecr=0 WS=128" "19982","9.085572","172.30.1.104","172.30.1.205","TCP","54","135 > 43252 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19983","9.085583","172.30.1.104","172.30.1.205","TCP","54","135 > 43252 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "19984","9.085588","172.30.1.205","172.30.1.104","TCP","54","43252 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "19985","9.085725","172.30.1.104","172.30.1.205","TCP","66","49671 > 35890 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19986","9.085733","172.30.1.205","172.30.1.104","TCP","54","35890 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19987","9.086085","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "19988","9.086395","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "19989","9.086403","172.30.1.205","172.30.1.104","TCP","54","35890 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "19990","9.088291","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "19991","9.088666","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "19992","9.088673","172.30.1.205","172.30.1.104","TCP","54","35890 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "19993","9.090072","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "19994","9.091976","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "19995","9.091988","172.30.1.205","172.30.1.104","TCP","54","35890 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "19996","9.092961","172.30.1.205","172.30.1.104","TCP","74","43256 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912319 TSecr=0 WS=128" "19997","9.093257","172.30.1.104","172.30.1.205","TCP","66","135 > 43256 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "19998","9.093270","172.30.1.205","172.30.1.104","TCP","54","43256 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "19999","9.093628","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20000","9.093938","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20001","9.093949","172.30.1.205","172.30.1.104","TCP","54","43256 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20002","9.096128","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20003","9.096493","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20004","9.096499","172.30.1.205","172.30.1.104","TCP","54","43256 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20005","9.098334","172.30.1.205","172.30.1.104","TCP","54","43256 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20006","9.098446","172.30.1.205","172.30.1.104","TCP","74","35894 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912324 TSecr=0 WS=128" "20007","9.098602","172.30.1.104","172.30.1.205","TCP","54","135 > 43256 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20008","9.098617","172.30.1.104","172.30.1.205","TCP","54","135 > 43256 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20009","9.098623","172.30.1.205","172.30.1.104","TCP","54","43256 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20010","9.098760","172.30.1.104","172.30.1.205","TCP","66","49671 > 35894 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20011","9.098768","172.30.1.205","172.30.1.104","TCP","54","35894 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20012","9.099118","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20013","9.100081","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20014","9.100088","172.30.1.205","172.30.1.104","TCP","54","35894 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20015","9.102014","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20016","9.102376","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20017","9.102383","172.30.1.205","172.30.1.104","TCP","54","35894 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20018","9.103733","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20019","9.105769","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20020","9.105778","172.30.1.205","172.30.1.104","TCP","54","35894 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20021","9.106722","172.30.1.205","172.30.1.104","TCP","74","43260 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912333 TSecr=0 WS=128" "20022","9.106999","172.30.1.104","172.30.1.205","TCP","66","135 > 43260 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20023","9.107010","172.30.1.205","172.30.1.104","TCP","54","43260 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20024","9.107364","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20025","9.107654","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20026","9.107663","172.30.1.205","172.30.1.104","TCP","54","43260 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20027","9.109885","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20028","9.110262","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20029","9.110269","172.30.1.205","172.30.1.104","TCP","54","43260 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20030","9.112097","172.30.1.205","172.30.1.104","TCP","54","43260 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20031","9.112209","172.30.1.205","172.30.1.104","TCP","74","35898 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912338 TSecr=0 WS=128" "20032","9.112359","172.30.1.104","172.30.1.205","TCP","54","135 > 43260 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20033","9.112374","172.30.1.104","172.30.1.205","TCP","54","135 > 43260 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20034","9.112379","172.30.1.205","172.30.1.104","TCP","54","43260 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20035","9.112458","172.30.1.104","172.30.1.205","TCP","66","49671 > 35898 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20036","9.112466","172.30.1.205","172.30.1.104","TCP","54","35898 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20037","9.112838","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20038","9.114176","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20039","9.114183","172.30.1.205","172.30.1.104","TCP","54","35898 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20040","9.116056","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20041","9.116440","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20042","9.116446","172.30.1.205","172.30.1.104","TCP","54","35898 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20043","9.117833","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20044","9.119832","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20045","9.119844","172.30.1.205","172.30.1.104","TCP","54","35898 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20046","9.120847","172.30.1.205","172.30.1.104","TCP","74","43264 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912347 TSecr=0 WS=128" "20047","9.121191","172.30.1.104","172.30.1.205","TCP","66","135 > 43264 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20048","9.121202","172.30.1.205","172.30.1.104","TCP","54","43264 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20049","9.121554","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20050","9.121849","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20051","9.121858","172.30.1.205","172.30.1.104","TCP","54","43264 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20052","9.124047","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20053","9.124438","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20054","9.124451","172.30.1.205","172.30.1.104","TCP","54","43264 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20055","9.126283","172.30.1.205","172.30.1.104","TCP","54","43264 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20056","9.126395","172.30.1.205","172.30.1.104","TCP","74","35902 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912352 TSecr=0 WS=128" "20057","9.126575","172.30.1.104","172.30.1.205","TCP","54","135 > 43264 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20058","9.126583","172.30.1.104","172.30.1.205","TCP","54","135 > 43264 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20059","9.126588","172.30.1.205","172.30.1.104","TCP","54","43264 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20060","9.126687","172.30.1.104","172.30.1.205","TCP","66","49671 > 35902 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20061","9.126696","172.30.1.205","172.30.1.104","TCP","54","35902 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20062","9.127040","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20063","9.127369","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20064","9.127377","172.30.1.205","172.30.1.104","TCP","54","35902 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20065","9.129280","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20066","9.129646","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20067","9.129653","172.30.1.205","172.30.1.104","TCP","54","35902 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20068","9.131024","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20069","9.132950","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20070","9.132959","172.30.1.205","172.30.1.104","TCP","54","35902 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20071","9.133910","172.30.1.205","172.30.1.104","TCP","74","43268 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912360 TSecr=0 WS=128" "20072","9.134226","172.30.1.104","172.30.1.205","TCP","66","135 > 43268 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20073","9.134237","172.30.1.205","172.30.1.104","TCP","54","43268 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20074","9.134584","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20075","9.134971","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20076","9.134981","172.30.1.205","172.30.1.104","TCP","54","43268 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20077","9.137203","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20078","9.137610","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20079","9.137616","172.30.1.205","172.30.1.104","TCP","54","43268 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20080","9.139429","172.30.1.205","172.30.1.104","TCP","54","43268 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20081","9.139540","172.30.1.205","172.30.1.104","TCP","74","35906 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912365 TSecr=0 WS=128" "20082","9.139741","172.30.1.104","172.30.1.205","TCP","54","135 > 43268 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20083","9.139773","172.30.1.104","172.30.1.205","TCP","54","135 > 43268 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20084","9.139778","172.30.1.205","172.30.1.104","TCP","54","43268 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20085","9.139815","172.30.1.104","172.30.1.205","TCP","66","49671 > 35906 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20086","9.139823","172.30.1.205","172.30.1.104","TCP","54","35906 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20087","9.140164","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20088","9.140484","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20089","9.140493","172.30.1.205","172.30.1.104","TCP","54","35906 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20090","9.142400","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20091","9.144053","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20092","9.144063","172.30.1.205","172.30.1.104","TCP","54","35906 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20093","9.145539","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20094","9.147546","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20095","9.147557","172.30.1.205","172.30.1.104","TCP","54","35906 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20096","9.148529","172.30.1.205","172.30.1.104","TCP","74","43272 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912374 TSecr=0 WS=128" "20097","9.148875","172.30.1.104","172.30.1.205","TCP","66","135 > 43272 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20098","9.148886","172.30.1.205","172.30.1.104","TCP","54","43272 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20099","9.149247","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20100","9.149546","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20101","9.149556","172.30.1.205","172.30.1.104","TCP","54","43272 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20102","9.151749","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20103","9.152139","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20104","9.152146","172.30.1.205","172.30.1.104","TCP","54","43272 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20105","9.153977","172.30.1.205","172.30.1.104","TCP","54","43272 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20106","9.154087","172.30.1.205","172.30.1.104","TCP","74","35910 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912380 TSecr=0 WS=128" "20107","9.154288","172.30.1.104","172.30.1.205","TCP","54","135 > 43272 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20108","9.154300","172.30.1.104","172.30.1.205","TCP","54","135 > 43272 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20109","9.154306","172.30.1.205","172.30.1.104","TCP","54","43272 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20110","9.154401","172.30.1.104","172.30.1.205","TCP","66","49671 > 35910 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20111","9.154410","172.30.1.205","172.30.1.104","TCP","54","35910 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20112","9.154764","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20113","9.155075","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20114","9.155089","172.30.1.205","172.30.1.104","TCP","54","35910 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20115","9.157094","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20116","9.157465","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20117","9.157471","172.30.1.205","172.30.1.104","TCP","54","35910 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20118","9.158826","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20119","9.161718","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20120","9.161728","172.30.1.205","172.30.1.104","TCP","54","35910 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20121","9.162685","172.30.1.205","172.30.1.104","TCP","74","43276 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912389 TSecr=0 WS=128" "20122","9.163002","172.30.1.104","172.30.1.205","TCP","66","135 > 43276 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20123","9.163015","172.30.1.205","172.30.1.104","TCP","54","43276 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20124","9.163371","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20125","9.163683","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20126","9.163696","172.30.1.205","172.30.1.104","TCP","54","43276 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20127","9.166009","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20128","9.166454","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20129","9.166461","172.30.1.205","172.30.1.104","TCP","54","43276 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20130","9.168297","172.30.1.205","172.30.1.104","TCP","54","43276 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20131","9.168416","172.30.1.205","172.30.1.104","TCP","74","35914 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912394 TSecr=0 WS=128" "20132","9.168623","172.30.1.104","172.30.1.205","TCP","54","135 > 43276 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20133","9.168634","172.30.1.104","172.30.1.205","TCP","54","135 > 43276 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20134","9.168640","172.30.1.205","172.30.1.104","TCP","54","43276 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20135","9.168726","172.30.1.104","172.30.1.205","TCP","66","49671 > 35914 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20136","9.168734","172.30.1.205","172.30.1.104","TCP","54","35914 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20137","9.169099","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20138","9.169447","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20139","9.169456","172.30.1.205","172.30.1.104","TCP","54","35914 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20140","9.171336","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20141","9.171748","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20142","9.171754","172.30.1.205","172.30.1.104","TCP","54","35914 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20143","9.173131","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20144","9.175036","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20145","9.175045","172.30.1.205","172.30.1.104","TCP","54","35914 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20146","9.175971","172.30.1.205","172.30.1.104","TCP","74","43280 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912402 TSecr=0 WS=128" "20147","9.176278","172.30.1.104","172.30.1.205","TCP","66","135 > 43280 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20148","9.176289","172.30.1.205","172.30.1.104","TCP","54","43280 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20149","9.176649","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20150","9.176940","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20151","9.176950","172.30.1.205","172.30.1.104","TCP","54","43280 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20152","9.179165","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20153","9.179592","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20154","9.179599","172.30.1.205","172.30.1.104","TCP","54","43280 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20155","9.181427","172.30.1.205","172.30.1.104","TCP","54","43280 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20156","9.181538","172.30.1.205","172.30.1.104","TCP","74","35918 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912407 TSecr=0 WS=128" "20157","9.181697","172.30.1.104","172.30.1.205","TCP","54","135 > 43280 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20158","9.181705","172.30.1.104","172.30.1.205","TCP","54","135 > 43280 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20159","9.181711","172.30.1.205","172.30.1.104","TCP","54","43280 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20160","9.181813","172.30.1.104","172.30.1.205","TCP","66","49671 > 35918 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20161","9.181821","172.30.1.205","172.30.1.104","TCP","54","35918 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20162","9.182167","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20163","9.182475","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20164","9.182484","172.30.1.205","172.30.1.104","TCP","54","35918 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20165","9.184377","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20166","9.184832","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20167","9.184839","172.30.1.205","172.30.1.104","TCP","54","35918 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20168","9.186193","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20169","9.188087","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20170","9.188098","172.30.1.205","172.30.1.104","TCP","54","35918 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20171","9.189072","172.30.1.205","172.30.1.104","TCP","74","43284 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912415 TSecr=0 WS=128" "20172","9.189390","172.30.1.104","172.30.1.205","TCP","66","135 > 43284 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20173","9.189401","172.30.1.205","172.30.1.104","TCP","54","43284 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20174","9.189761","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20175","9.190049","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20176","9.190058","172.30.1.205","172.30.1.104","TCP","54","43284 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20177","9.192230","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20178","9.192638","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20179","9.192645","172.30.1.205","172.30.1.104","TCP","54","43284 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20180","9.194469","172.30.1.205","172.30.1.104","TCP","54","43284 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20181","9.194577","172.30.1.205","172.30.1.104","TCP","74","35922 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912421 TSecr=0 WS=128" "20182","9.194788","172.30.1.104","172.30.1.205","TCP","54","135 > 43284 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20183","9.194797","172.30.1.104","172.30.1.205","TCP","54","135 > 43284 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20184","9.194802","172.30.1.205","172.30.1.104","TCP","54","43284 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20185","9.194878","172.30.1.104","172.30.1.205","TCP","66","49671 > 35922 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20186","9.194886","172.30.1.205","172.30.1.104","TCP","54","35922 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20187","9.195228","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20188","9.196250","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20189","9.196259","172.30.1.205","172.30.1.104","TCP","54","35922 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20190","9.198159","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20191","9.198540","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20192","9.198546","172.30.1.205","172.30.1.104","TCP","54","35922 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20193","9.199877","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20194","9.201810","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20195","9.201819","172.30.1.205","172.30.1.104","TCP","54","35922 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20196","9.202746","172.30.1.205","172.30.1.104","TCP","74","43288 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912429 TSecr=0 WS=128" "20197","9.203038","172.30.1.104","172.30.1.205","TCP","66","135 > 43288 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20198","9.203049","172.30.1.205","172.30.1.104","TCP","54","43288 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20199","9.203410","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20200","9.203717","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20201","9.203726","172.30.1.205","172.30.1.104","TCP","54","43288 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20202","9.205925","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20203","9.206352","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20204","9.206359","172.30.1.205","172.30.1.104","TCP","54","43288 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20205","9.207199","172.30.1.205","172.30.1.104","TCP","54","35882 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20206","9.207246","172.30.1.205","172.30.1.104","TCP","54","35886 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20207","9.207284","172.30.1.205","172.30.1.104","TCP","54","35890 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20208","9.207313","172.30.1.205","172.30.1.104","TCP","54","35894 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20209","9.207342","172.30.1.205","172.30.1.104","TCP","54","35898 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20210","9.207369","172.30.1.205","172.30.1.104","TCP","54","35902 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20211","9.207397","172.30.1.205","172.30.1.104","TCP","54","35906 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20212","9.207428","172.30.1.205","172.30.1.104","TCP","54","35910 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20213","9.207451","172.30.1.205","172.30.1.104","TCP","54","35914 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20214","9.207472","172.30.1.104","172.30.1.205","TCP","54","49671 > 35882 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20215","9.207486","172.30.1.104","172.30.1.205","TCP","54","49671 > 35886 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20216","9.207497","172.30.1.205","172.30.1.104","TCP","54","35918 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20217","9.207531","172.30.1.205","172.30.1.104","TCP","54","35922 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20218","9.207599","172.30.1.205","172.30.1.104","TCP","54","35878 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20219","9.207615","172.30.1.104","172.30.1.205","TCP","54","49671 > 35890 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20220","9.207638","172.30.1.104","172.30.1.205","TCP","54","49671 > 35882 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20221","9.207644","172.30.1.205","172.30.1.104","TCP","54","35882 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20222","9.207661","172.30.1.104","172.30.1.205","TCP","54","49671 > 35886 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20223","9.207664","172.30.1.205","172.30.1.104","TCP","54","35886 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20224","9.207682","172.30.1.104","172.30.1.205","TCP","54","49671 > 35890 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20225","9.207685","172.30.1.205","172.30.1.104","TCP","54","35890 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20226","9.207703","172.30.1.104","172.30.1.205","TCP","54","49671 > 35894 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20227","9.207723","172.30.1.104","172.30.1.205","TCP","54","49671 > 35898 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20228","9.207747","172.30.1.104","172.30.1.205","TCP","54","49671 > 35902 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20229","9.207864","172.30.1.104","172.30.1.205","TCP","54","49671 > 35894 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20230","9.207869","172.30.1.205","172.30.1.104","TCP","54","35894 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20231","9.207884","172.30.1.104","172.30.1.205","TCP","54","49671 > 35906 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20232","9.207908","172.30.1.104","172.30.1.205","TCP","54","49671 > 35906 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20233","9.207912","172.30.1.205","172.30.1.104","TCP","54","35906 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20234","9.207928","172.30.1.104","172.30.1.205","TCP","54","49671 > 35898 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20235","9.207931","172.30.1.205","172.30.1.104","TCP","54","35898 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20236","9.207949","172.30.1.104","172.30.1.205","TCP","54","49671 > 35902 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20237","9.207952","172.30.1.205","172.30.1.104","TCP","54","35902 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20238","9.207968","172.30.1.104","172.30.1.205","TCP","54","49671 > 35910 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20239","9.207990","172.30.1.104","172.30.1.205","TCP","54","49671 > 35914 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20240","9.208012","172.30.1.104","172.30.1.205","TCP","54","49671 > 35918 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20241","9.208116","172.30.1.104","172.30.1.205","TCP","54","49671 > 35910 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20242","9.208121","172.30.1.205","172.30.1.104","TCP","54","35910 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20243","9.208134","172.30.1.104","172.30.1.205","TCP","54","49671 > 35922 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20244","9.208158","172.30.1.104","172.30.1.205","TCP","54","49671 > 35922 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20245","9.208161","172.30.1.205","172.30.1.104","TCP","54","35922 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20246","9.208180","172.30.1.104","172.30.1.205","TCP","54","49671 > 35914 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20247","9.208182","172.30.1.205","172.30.1.104","TCP","54","35914 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20248","9.208199","172.30.1.104","172.30.1.205","TCP","54","49671 > 35918 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20249","9.208201","172.30.1.205","172.30.1.104","TCP","54","35918 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20250","9.208219","172.30.1.104","172.30.1.205","TCP","54","49671 > 35878 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20251","9.208350","172.30.1.104","172.30.1.205","TCP","54","49671 > 35878 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20252","9.208354","172.30.1.205","172.30.1.104","TCP","54","35878 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20253","9.209175","172.30.1.205","172.30.1.104","TCP","54","43288 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20254","9.209283","172.30.1.205","172.30.1.104","TCP","74","35926 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912435 TSecr=0 WS=128" "20255","9.209429","172.30.1.104","172.30.1.205","TCP","54","135 > 43288 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20256","9.209450","172.30.1.104","172.30.1.205","TCP","54","135 > 43288 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20257","9.209455","172.30.1.205","172.30.1.104","TCP","54","43288 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20258","9.209553","172.30.1.104","172.30.1.205","TCP","66","49671 > 35926 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20259","9.209561","172.30.1.205","172.30.1.104","TCP","54","35926 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20260","9.209917","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20261","9.210190","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20262","9.210199","172.30.1.205","172.30.1.104","TCP","54","35926 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20263","9.212083","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20264","9.212521","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20265","9.212527","172.30.1.205","172.30.1.104","TCP","54","35926 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20266","9.213901","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20267","9.215969","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20268","9.215978","172.30.1.205","172.30.1.104","TCP","54","35926 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20269","9.216933","172.30.1.205","172.30.1.104","TCP","74","43292 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912443 TSecr=0 WS=128" "20270","9.217275","172.30.1.104","172.30.1.205","TCP","66","135 > 43292 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20271","9.217285","172.30.1.205","172.30.1.104","TCP","54","43292 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20272","9.217635","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20273","9.217935","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20274","9.217944","172.30.1.205","172.30.1.104","TCP","54","43292 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20275","9.220109","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20276","9.220489","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20277","9.220496","172.30.1.205","172.30.1.104","TCP","54","43292 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20278","9.222308","172.30.1.205","172.30.1.104","TCP","54","43292 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20279","9.222418","172.30.1.205","172.30.1.104","TCP","74","35930 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912448 TSecr=0 WS=128" "20280","9.222601","172.30.1.104","172.30.1.205","TCP","54","135 > 43292 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20281","9.222623","172.30.1.104","172.30.1.205","TCP","54","135 > 43292 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20282","9.222628","172.30.1.205","172.30.1.104","TCP","54","43292 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20283","9.222722","172.30.1.104","172.30.1.205","TCP","66","49671 > 35930 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20284","9.222730","172.30.1.205","172.30.1.104","TCP","54","35930 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20285","9.223071","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20286","9.223401","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20287","9.223409","172.30.1.205","172.30.1.104","TCP","54","35930 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20288","9.225307","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20289","9.225695","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20290","9.225700","172.30.1.205","172.30.1.104","TCP","54","35930 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20291","9.227035","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20292","9.228959","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20293","9.228968","172.30.1.205","172.30.1.104","TCP","54","35930 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20294","9.229902","172.30.1.205","172.30.1.104","TCP","74","43296 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912456 TSecr=0 WS=128" "20295","9.230222","172.30.1.104","172.30.1.205","TCP","66","135 > 43296 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20296","9.230233","172.30.1.205","172.30.1.104","TCP","54","43296 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20297","9.230581","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20298","9.230895","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20299","9.230903","172.30.1.205","172.30.1.104","TCP","54","43296 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20300","9.233117","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20301","9.233497","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20302","9.233503","172.30.1.205","172.30.1.104","TCP","54","43296 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20303","9.235314","172.30.1.205","172.30.1.104","TCP","54","43296 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20304","9.235422","172.30.1.205","172.30.1.104","TCP","74","35934 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912461 TSecr=0 WS=128" "20305","9.235588","172.30.1.104","172.30.1.205","TCP","54","135 > 43296 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20306","9.235609","172.30.1.104","172.30.1.205","TCP","54","135 > 43296 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20307","9.235615","172.30.1.205","172.30.1.104","TCP","54","43296 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20308","9.235710","172.30.1.104","172.30.1.205","TCP","66","49671 > 35934 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20309","9.235718","172.30.1.205","172.30.1.104","TCP","54","35934 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20310","9.236062","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20311","9.236337","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20312","9.236345","172.30.1.205","172.30.1.104","TCP","54","35934 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20313","9.238244","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20314","9.238601","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20315","9.238605","172.30.1.205","172.30.1.104","TCP","54","35934 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20316","9.239953","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20317","9.241877","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20318","9.241891","172.30.1.205","172.30.1.104","TCP","54","35934 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20319","9.242926","172.30.1.205","172.30.1.104","TCP","74","43300 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912469 TSecr=0 WS=128" "20320","9.243243","172.30.1.104","172.30.1.205","TCP","66","135 > 43300 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20321","9.243256","172.30.1.205","172.30.1.104","TCP","54","43300 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20322","9.243620","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20323","9.243950","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20324","9.243959","172.30.1.205","172.30.1.104","TCP","54","43300 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20325","9.246205","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20326","9.246628","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20327","9.246635","172.30.1.205","172.30.1.104","TCP","54","43300 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20328","9.248469","172.30.1.205","172.30.1.104","TCP","54","43300 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20329","9.248587","172.30.1.205","172.30.1.104","TCP","74","35938 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912475 TSecr=0 WS=128" "20330","9.248771","172.30.1.104","172.30.1.205","TCP","54","135 > 43300 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20331","9.248790","172.30.1.104","172.30.1.205","TCP","54","135 > 43300 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20332","9.248795","172.30.1.205","172.30.1.104","TCP","54","43300 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20333","9.248889","172.30.1.104","172.30.1.205","TCP","66","49671 > 35938 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20334","9.248903","172.30.1.205","172.30.1.104","TCP","54","35938 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20335","9.249259","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20336","9.250774","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20337","9.250782","172.30.1.205","172.30.1.104","TCP","54","35938 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20338","9.252668","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20339","9.253019","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20340","9.253026","172.30.1.205","172.30.1.104","TCP","54","35938 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20341","9.254393","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20342","9.257665","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20343","9.257676","172.30.1.205","172.30.1.104","TCP","54","35938 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20344","9.258652","172.30.1.205","172.30.1.104","TCP","74","43304 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912485 TSecr=0 WS=128" "20345","9.258936","172.30.1.104","172.30.1.205","TCP","66","135 > 43304 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20346","9.258947","172.30.1.205","172.30.1.104","TCP","54","43304 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20347","9.259309","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20348","9.259575","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20349","9.259584","172.30.1.205","172.30.1.104","TCP","54","43304 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20350","9.261802","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20351","9.262205","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20352","9.262212","172.30.1.205","172.30.1.104","TCP","54","43304 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20353","9.264027","172.30.1.205","172.30.1.104","TCP","54","43304 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20354","9.264138","172.30.1.205","172.30.1.104","TCP","74","35942 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912490 TSecr=0 WS=128" "20355","9.264311","172.30.1.104","172.30.1.205","TCP","54","135 > 43304 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20356","9.264336","172.30.1.104","172.30.1.205","TCP","54","135 > 43304 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20357","9.264342","172.30.1.205","172.30.1.104","TCP","54","43304 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20358","9.264453","172.30.1.104","172.30.1.205","TCP","66","49671 > 35942 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20359","9.264462","172.30.1.205","172.30.1.104","TCP","54","35942 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20360","9.264835","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20361","9.265233","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20362","9.265242","172.30.1.205","172.30.1.104","TCP","54","35942 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20363","9.267109","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20364","9.267513","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20365","9.267520","172.30.1.205","172.30.1.104","TCP","54","35942 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20366","9.268919","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20367","9.270840","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20368","9.270850","172.30.1.205","172.30.1.104","TCP","54","35942 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20369","9.271789","172.30.1.205","172.30.1.104","TCP","74","43308 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912498 TSecr=0 WS=128" "20370","9.272088","172.30.1.104","172.30.1.205","TCP","66","135 > 43308 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20371","9.272099","172.30.1.205","172.30.1.104","TCP","54","43308 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20372","9.272452","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20373","9.272765","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20374","9.272784","172.30.1.205","172.30.1.104","TCP","54","43308 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20375","9.274985","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20376","9.275396","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20377","9.275403","172.30.1.205","172.30.1.104","TCP","54","43308 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20378","9.277261","172.30.1.205","172.30.1.104","TCP","54","43308 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20379","9.277406","172.30.1.205","172.30.1.104","TCP","74","35946 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912503 TSecr=0 WS=128" "20380","9.277558","172.30.1.104","172.30.1.205","TCP","54","135 > 43308 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20381","9.277568","172.30.1.104","172.30.1.205","TCP","54","135 > 43308 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20382","9.277580","172.30.1.205","172.30.1.104","TCP","54","43308 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20383","9.277731","172.30.1.104","172.30.1.205","TCP","66","49671 > 35946 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20384","9.277739","172.30.1.205","172.30.1.104","TCP","54","35946 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20385","9.278089","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20386","9.278380","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20387","9.278389","172.30.1.205","172.30.1.104","TCP","54","35946 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20388","9.280285","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20389","9.280644","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20390","9.280650","172.30.1.205","172.30.1.104","TCP","54","35946 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20391","9.282047","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20392","9.284023","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20393","9.284032","172.30.1.205","172.30.1.104","TCP","54","35946 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20394","9.285015","172.30.1.205","172.30.1.104","TCP","74","43312 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912511 TSecr=0 WS=128" "20395","9.285332","172.30.1.104","172.30.1.205","TCP","66","135 > 43312 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20396","9.285342","172.30.1.205","172.30.1.104","TCP","54","43312 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20397","9.285691","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20398","9.285986","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20399","9.285994","172.30.1.205","172.30.1.104","TCP","54","43312 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20400","9.288185","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20401","9.288590","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20402","9.288597","172.30.1.205","172.30.1.104","TCP","54","43312 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20403","9.290439","172.30.1.205","172.30.1.104","TCP","54","43312 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20404","9.290552","172.30.1.205","172.30.1.104","TCP","74","35950 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912516 TSecr=0 WS=128" "20405","9.290697","172.30.1.104","172.30.1.205","TCP","54","135 > 43312 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20406","9.290727","172.30.1.104","172.30.1.205","TCP","54","135 > 43312 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20407","9.290732","172.30.1.205","172.30.1.104","TCP","54","43312 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20408","9.290836","172.30.1.104","172.30.1.205","TCP","66","49671 > 35950 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20409","9.290844","172.30.1.205","172.30.1.104","TCP","54","35950 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20410","9.291198","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20411","9.291602","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20412","9.291609","172.30.1.205","172.30.1.104","TCP","54","35950 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20413","9.293509","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20414","9.294002","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20415","9.294009","172.30.1.205","172.30.1.104","TCP","54","35950 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20416","9.295386","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20417","9.297339","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20418","9.297349","172.30.1.205","172.30.1.104","TCP","54","35950 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20419","9.298304","172.30.1.205","172.30.1.104","TCP","74","43316 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912524 TSecr=0 WS=128" "20420","9.298619","172.30.1.104","172.30.1.205","TCP","66","135 > 43316 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20421","9.298629","172.30.1.205","172.30.1.104","TCP","54","43316 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20422","9.298980","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20423","9.299266","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20424","9.299274","172.30.1.205","172.30.1.104","TCP","54","43316 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20425","9.301490","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20426","9.301951","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20427","9.301958","172.30.1.205","172.30.1.104","TCP","54","43316 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20428","9.303766","172.30.1.205","172.30.1.104","TCP","54","43316 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20429","9.303877","172.30.1.205","172.30.1.104","TCP","74","35954 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912530 TSecr=0 WS=128" "20430","9.304088","172.30.1.104","172.30.1.205","TCP","54","135 > 43316 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20431","9.304097","172.30.1.104","172.30.1.205","TCP","54","135 > 43316 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20432","9.304103","172.30.1.205","172.30.1.104","TCP","54","43316 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20433","9.304180","172.30.1.104","172.30.1.205","TCP","66","49671 > 35954 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20434","9.304189","172.30.1.205","172.30.1.104","TCP","54","35954 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20435","9.304539","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20436","9.304833","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20437","9.304842","172.30.1.205","172.30.1.104","TCP","54","35954 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20438","9.306730","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20439","9.307143","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20440","9.307149","172.30.1.205","172.30.1.104","TCP","54","35954 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20441","9.308501","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20442","9.310448","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20443","9.310458","172.30.1.205","172.30.1.104","TCP","54","35954 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20444","9.311401","172.30.1.205","172.30.1.104","TCP","74","43320 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912537 TSecr=0 WS=128" "20445","9.311701","172.30.1.104","172.30.1.205","TCP","66","135 > 43320 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20446","9.311711","172.30.1.205","172.30.1.104","TCP","54","43320 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20447","9.312056","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20448","9.312364","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20449","9.312372","172.30.1.205","172.30.1.104","TCP","54","43320 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20450","9.314572","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20451","9.314965","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20452","9.314972","172.30.1.205","172.30.1.104","TCP","54","43320 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20453","9.316795","172.30.1.205","172.30.1.104","TCP","54","43320 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20454","9.316904","172.30.1.205","172.30.1.104","TCP","74","35958 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912543 TSecr=0 WS=128" "20455","9.317066","172.30.1.104","172.30.1.205","TCP","54","135 > 43320 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20456","9.317088","172.30.1.104","172.30.1.205","TCP","54","135 > 43320 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20457","9.317093","172.30.1.205","172.30.1.104","TCP","54","43320 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20458","9.317188","172.30.1.104","172.30.1.205","TCP","66","49671 > 35958 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20459","9.317197","172.30.1.205","172.30.1.104","TCP","54","35958 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20460","9.317540","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20461","9.317849","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20462","9.317860","172.30.1.205","172.30.1.104","TCP","54","35958 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20463","9.319720","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20464","9.320096","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20465","9.320103","172.30.1.205","172.30.1.104","TCP","54","35958 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20466","9.321503","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20467","9.323465","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20468","9.323476","172.30.1.205","172.30.1.104","TCP","54","35958 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20469","9.324416","172.30.1.205","172.30.1.104","TCP","74","43324 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912550 TSecr=0 WS=128" "20470","9.324730","172.30.1.104","172.30.1.205","TCP","66","135 > 43324 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20471","9.324741","172.30.1.205","172.30.1.104","TCP","54","43324 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20472","9.325109","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20473","9.325461","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20474","9.325469","172.30.1.205","172.30.1.104","TCP","54","43324 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20475","9.327650","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20476","9.328052","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20477","9.328058","172.30.1.205","172.30.1.104","TCP","54","43324 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20478","9.329901","172.30.1.205","172.30.1.104","TCP","54","43324 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20479","9.330012","172.30.1.205","172.30.1.104","TCP","74","35962 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912556 TSecr=0 WS=128" "20480","9.330190","172.30.1.104","172.30.1.205","TCP","54","135 > 43324 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20481","9.330199","172.30.1.104","172.30.1.205","TCP","54","135 > 43324 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20482","9.330204","172.30.1.205","172.30.1.104","TCP","54","43324 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20483","9.330327","172.30.1.104","172.30.1.205","TCP","66","49671 > 35962 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20484","9.330335","172.30.1.205","172.30.1.104","TCP","54","35962 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20485","9.330681","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20486","9.331022","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20487","9.331029","172.30.1.205","172.30.1.104","TCP","54","35962 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20488","9.332932","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20489","9.333317","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20490","9.333326","172.30.1.205","172.30.1.104","TCP","54","35962 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20491","9.334747","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20492","9.337683","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20493","9.337694","172.30.1.205","172.30.1.104","TCP","54","35962 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20494","9.338632","172.30.1.205","172.30.1.104","TCP","74","43328 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912565 TSecr=0 WS=128" "20495","9.338944","172.30.1.104","172.30.1.205","TCP","66","135 > 43328 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20496","9.338954","172.30.1.205","172.30.1.104","TCP","54","43328 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20497","9.339314","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20498","9.339616","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20499","9.339625","172.30.1.205","172.30.1.104","TCP","54","43328 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20500","9.341837","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20501","9.342245","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20502","9.342257","172.30.1.205","172.30.1.104","TCP","54","43328 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20503","9.344061","172.30.1.205","172.30.1.104","TCP","54","43328 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20504","9.344171","172.30.1.205","172.30.1.104","TCP","74","35966 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912570 TSecr=0 WS=128" "20505","9.344338","172.30.1.104","172.30.1.205","TCP","54","135 > 43328 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20506","9.344362","172.30.1.104","172.30.1.205","TCP","54","135 > 43328 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20507","9.344368","172.30.1.205","172.30.1.104","TCP","54","43328 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20508","9.344487","172.30.1.104","172.30.1.205","TCP","66","49671 > 35966 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20509","9.344498","172.30.1.205","172.30.1.104","TCP","54","35966 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20510","9.344870","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20511","9.345176","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20512","9.345185","172.30.1.205","172.30.1.104","TCP","54","35966 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20513","9.347040","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20514","9.347427","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20515","9.347433","172.30.1.205","172.30.1.104","TCP","54","35966 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20516","9.348805","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20517","9.350695","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20518","9.350704","172.30.1.205","172.30.1.104","TCP","54","35966 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20519","9.351638","172.30.1.205","172.30.1.104","TCP","74","43332 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912578 TSecr=0 WS=128" "20520","9.351929","172.30.1.104","172.30.1.205","TCP","66","135 > 43332 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20521","9.351946","172.30.1.205","172.30.1.104","TCP","54","43332 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20522","9.352291","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20523","9.352574","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20524","9.352582","172.30.1.205","172.30.1.104","TCP","54","43332 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20525","9.354763","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20526","9.355157","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20527","9.355164","172.30.1.205","172.30.1.104","TCP","54","43332 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20528","9.356988","172.30.1.205","172.30.1.104","TCP","54","43332 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20529","9.357104","172.30.1.205","172.30.1.104","TCP","74","35970 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912583 TSecr=0 WS=128" "20530","9.357271","172.30.1.104","172.30.1.205","TCP","54","135 > 43332 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20531","9.357292","172.30.1.104","172.30.1.205","TCP","54","135 > 43332 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20532","9.357297","172.30.1.205","172.30.1.104","TCP","54","43332 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20533","9.357375","172.30.1.104","172.30.1.205","TCP","66","49671 > 35970 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20534","9.357383","172.30.1.205","172.30.1.104","TCP","54","35970 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20535","9.357729","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20536","9.358015","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20537","9.358023","172.30.1.205","172.30.1.104","TCP","54","35970 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20538","9.359883","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20539","9.360240","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20540","9.360246","172.30.1.205","172.30.1.104","TCP","54","35970 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20541","9.361621","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20542","9.363552","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20543","9.363561","172.30.1.205","172.30.1.104","TCP","54","35970 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20544","9.364486","172.30.1.205","172.30.1.104","TCP","74","43336 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912590 TSecr=0 WS=128" "20545","9.364821","172.30.1.104","172.30.1.205","TCP","66","135 > 43336 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20546","9.364832","172.30.1.205","172.30.1.104","TCP","54","43336 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20547","9.365178","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20548","9.365488","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20549","9.365498","172.30.1.205","172.30.1.104","TCP","54","43336 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20550","9.367660","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20551","9.368086","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20552","9.368093","172.30.1.205","172.30.1.104","TCP","54","43336 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20553","9.368958","172.30.1.205","172.30.1.104","TCP","54","35930 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20554","9.369005","172.30.1.205","172.30.1.104","TCP","54","35934 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20555","9.369036","172.30.1.205","172.30.1.104","TCP","54","35938 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20556","9.369064","172.30.1.205","172.30.1.104","TCP","54","35942 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20557","9.369087","172.30.1.205","172.30.1.104","TCP","54","35946 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20558","9.369113","172.30.1.205","172.30.1.104","TCP","54","35950 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20559","9.369141","172.30.1.205","172.30.1.104","TCP","54","35954 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20560","9.369167","172.30.1.205","172.30.1.104","TCP","54","35958 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20561","9.369190","172.30.1.205","172.30.1.104","TCP","54","35962 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20562","9.369216","172.30.1.205","172.30.1.104","TCP","54","35966 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20563","9.369237","172.30.1.205","172.30.1.104","TCP","54","35970 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20564","9.369272","172.30.1.104","172.30.1.205","TCP","54","49671 > 35930 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20565","9.369327","172.30.1.205","172.30.1.104","TCP","54","35926 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20566","9.369452","172.30.1.104","172.30.1.205","TCP","54","49671 > 35934 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20567","9.369482","172.30.1.104","172.30.1.205","TCP","54","49671 > 35938 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20568","9.369511","172.30.1.104","172.30.1.205","TCP","54","49671 > 35930 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20569","9.369517","172.30.1.205","172.30.1.104","TCP","54","35930 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20570","9.369542","172.30.1.104","172.30.1.205","TCP","54","49671 > 35934 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20571","9.369545","172.30.1.205","172.30.1.104","TCP","54","35934 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20572","9.369584","172.30.1.104","172.30.1.205","TCP","54","49671 > 35938 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20573","9.369589","172.30.1.205","172.30.1.104","TCP","54","35938 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20574","9.369617","172.30.1.104","172.30.1.205","TCP","54","49671 > 35942 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20575","9.369649","172.30.1.104","172.30.1.205","TCP","54","49671 > 35946 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20576","9.369680","172.30.1.104","172.30.1.205","TCP","54","49671 > 35950 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20577","9.369711","172.30.1.104","172.30.1.205","TCP","54","49671 > 35942 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20578","9.369716","172.30.1.205","172.30.1.104","TCP","54","35942 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20579","9.369744","172.30.1.104","172.30.1.205","TCP","54","49671 > 35954 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20580","9.369776","172.30.1.104","172.30.1.205","TCP","54","49671 > 35954 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20581","9.369781","172.30.1.205","172.30.1.104","TCP","54","35954 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20582","9.369807","172.30.1.104","172.30.1.205","TCP","54","49671 > 35946 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20583","9.369811","172.30.1.205","172.30.1.104","TCP","54","35946 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20584","9.369838","172.30.1.104","172.30.1.205","TCP","54","49671 > 35950 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20585","9.369841","172.30.1.205","172.30.1.104","TCP","54","35950 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20586","9.369868","172.30.1.104","172.30.1.205","TCP","54","49671 > 35958 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20587","9.369899","172.30.1.104","172.30.1.205","TCP","54","49671 > 35962 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20588","9.369929","172.30.1.104","172.30.1.205","TCP","54","49671 > 35958 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20589","9.369934","172.30.1.205","172.30.1.104","TCP","54","35958 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20590","9.369959","172.30.1.104","172.30.1.205","TCP","54","49671 > 35966 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20591","9.369990","172.30.1.104","172.30.1.205","TCP","54","49671 > 35970 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20592","9.370020","172.30.1.104","172.30.1.205","TCP","54","49671 > 35970 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20593","9.370024","172.30.1.205","172.30.1.104","TCP","54","35970 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20594","9.370051","172.30.1.104","172.30.1.205","TCP","54","49671 > 35962 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20595","9.370055","172.30.1.205","172.30.1.104","TCP","54","35962 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20596","9.370081","172.30.1.104","172.30.1.205","TCP","54","49671 > 35966 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20597","9.370084","172.30.1.205","172.30.1.104","TCP","54","35966 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20598","9.370625","172.30.1.104","172.30.1.205","TCP","54","49671 > 35926 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20599","9.370656","172.30.1.104","172.30.1.205","TCP","54","49671 > 35926 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20600","9.370661","172.30.1.205","172.30.1.104","TCP","54","35926 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20601","9.370955","172.30.1.205","172.30.1.104","TCP","54","43336 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20602","9.371064","172.30.1.205","172.30.1.104","TCP","74","35974 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912597 TSecr=0 WS=128" "20603","9.371249","172.30.1.104","172.30.1.205","TCP","54","135 > 43336 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20604","9.371277","172.30.1.104","172.30.1.205","TCP","54","135 > 43336 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20605","9.371282","172.30.1.205","172.30.1.104","TCP","54","43336 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20606","9.371394","172.30.1.104","172.30.1.205","TCP","66","49671 > 35974 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20607","9.371402","172.30.1.205","172.30.1.104","TCP","54","35974 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20608","9.371751","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20609","9.372065","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20610","9.372074","172.30.1.205","172.30.1.104","TCP","54","35974 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20611","9.373970","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20612","9.374356","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20613","9.374362","172.30.1.205","172.30.1.104","TCP","54","35974 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20614","9.375730","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20615","9.377691","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20616","9.377700","172.30.1.205","172.30.1.104","TCP","54","35974 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20617","9.378627","172.30.1.205","172.30.1.104","TCP","74","43340 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912605 TSecr=0 WS=128" "20618","9.378941","172.30.1.104","172.30.1.205","TCP","66","135 > 43340 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20619","9.378951","172.30.1.205","172.30.1.104","TCP","54","43340 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20620","9.379302","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20621","9.379622","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20622","9.379631","172.30.1.205","172.30.1.104","TCP","54","43340 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20623","9.381824","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20624","9.382208","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20625","9.382215","172.30.1.205","172.30.1.104","TCP","54","43340 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20626","9.384025","172.30.1.205","172.30.1.104","TCP","54","43340 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20627","9.384133","172.30.1.205","172.30.1.104","TCP","74","35978 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912610 TSecr=0 WS=128" "20628","9.384332","172.30.1.104","172.30.1.205","TCP","54","135 > 43340 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20629","9.384343","172.30.1.104","172.30.1.205","TCP","54","135 > 43340 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20630","9.384351","172.30.1.205","172.30.1.104","TCP","54","43340 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20631","9.384420","172.30.1.104","172.30.1.205","TCP","66","49671 > 35978 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20632","9.384431","172.30.1.205","172.30.1.104","TCP","54","35978 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20633","9.384846","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20634","9.385169","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20635","9.385178","172.30.1.205","172.30.1.104","TCP","54","35978 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20636","9.387078","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20637","9.387461","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20638","9.387466","172.30.1.205","172.30.1.104","TCP","54","35978 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20639","9.388835","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20640","9.390773","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20641","9.390783","172.30.1.205","172.30.1.104","TCP","54","35978 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20642","9.391724","172.30.1.205","172.30.1.104","TCP","74","43344 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912618 TSecr=0 WS=128" "20643","9.392063","172.30.1.104","172.30.1.205","TCP","66","135 > 43344 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20644","9.392077","172.30.1.205","172.30.1.104","TCP","54","43344 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20645","9.392471","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20646","9.392892","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20647","9.392902","172.30.1.205","172.30.1.104","TCP","54","43344 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20648","9.395133","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20649","9.395532","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20650","9.395539","172.30.1.205","172.30.1.104","TCP","54","43344 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20651","9.397381","172.30.1.205","172.30.1.104","TCP","54","43344 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20652","9.397498","172.30.1.205","172.30.1.104","TCP","74","35982 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912623 TSecr=0 WS=128" "20653","9.397679","172.30.1.104","172.30.1.205","TCP","54","135 > 43344 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20654","9.397745","172.30.1.104","172.30.1.205","TCP","54","135 > 43344 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20655","9.397751","172.30.1.205","172.30.1.104","TCP","54","43344 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20656","9.397770","172.30.1.104","172.30.1.205","TCP","66","49671 > 35982 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20657","9.397778","172.30.1.205","172.30.1.104","TCP","54","35982 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20658","9.398120","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20659","9.398397","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20660","9.398406","172.30.1.205","172.30.1.104","TCP","54","35982 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20661","9.400261","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20662","9.400695","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20663","9.400699","172.30.1.205","172.30.1.104","TCP","54","35982 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20664","9.402066","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20665","9.404042","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20666","9.404051","172.30.1.205","172.30.1.104","TCP","54","35982 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20667","9.405013","172.30.1.205","172.30.1.104","TCP","74","43348 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912631 TSecr=0 WS=128" "20668","9.405302","172.30.1.104","172.30.1.205","TCP","66","135 > 43348 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20669","9.405312","172.30.1.205","172.30.1.104","TCP","54","43348 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20670","9.405662","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20671","9.405933","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20672","9.405942","172.30.1.205","172.30.1.104","TCP","54","43348 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20673","9.408140","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20674","9.408580","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20675","9.408587","172.30.1.205","172.30.1.104","TCP","54","43348 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20676","9.410425","172.30.1.205","172.30.1.104","TCP","54","43348 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20677","9.410539","172.30.1.205","172.30.1.104","TCP","74","35986 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912636 TSecr=0 WS=128" "20678","9.410806","172.30.1.104","172.30.1.205","TCP","54","135 > 43348 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20679","9.410815","172.30.1.104","172.30.1.205","TCP","66","49671 > 35986 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20680","9.410824","172.30.1.205","172.30.1.104","TCP","54","35986 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20681","9.410837","172.30.1.104","172.30.1.205","TCP","54","135 > 43348 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20682","9.410845","172.30.1.205","172.30.1.104","TCP","54","43348 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20683","9.411191","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20684","9.411520","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20685","9.411528","172.30.1.205","172.30.1.104","TCP","54","35986 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20686","9.413422","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20687","9.413788","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20688","9.413795","172.30.1.205","172.30.1.104","TCP","54","35986 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20689","9.415153","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20690","9.417099","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20691","9.417108","172.30.1.205","172.30.1.104","TCP","54","35986 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20692","9.418065","172.30.1.205","172.30.1.104","TCP","74","43352 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912644 TSecr=0 WS=128" "20693","9.418429","172.30.1.104","172.30.1.205","TCP","66","135 > 43352 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20694","9.418439","172.30.1.205","172.30.1.104","TCP","54","43352 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20695","9.418785","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20696","9.419106","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20697","9.419115","172.30.1.205","172.30.1.104","TCP","54","43352 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20698","9.421310","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20699","9.421698","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20700","9.421705","172.30.1.205","172.30.1.104","TCP","54","43352 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20701","9.423501","172.30.1.205","172.30.1.104","TCP","54","43352 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20702","9.423610","172.30.1.205","172.30.1.104","TCP","74","35990 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912650 TSecr=0 WS=128" "20703","9.423789","172.30.1.104","172.30.1.205","TCP","54","135 > 43352 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20704","9.423811","172.30.1.104","172.30.1.205","TCP","54","135 > 43352 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20705","9.423817","172.30.1.205","172.30.1.104","TCP","54","43352 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20706","9.423928","172.30.1.104","172.30.1.205","TCP","66","49671 > 35990 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20707","9.423937","172.30.1.205","172.30.1.104","TCP","54","35990 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20708","9.424279","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20709","9.425828","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20710","9.425835","172.30.1.205","172.30.1.104","TCP","54","35990 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20711","9.427697","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20712","9.428066","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20713","9.428072","172.30.1.205","172.30.1.104","TCP","54","35990 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20714","9.429440","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20715","9.431460","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20716","9.431469","172.30.1.205","172.30.1.104","TCP","54","35990 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20717","9.432396","172.30.1.205","172.30.1.104","TCP","74","43356 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912658 TSecr=0 WS=128" "20718","9.432692","172.30.1.104","172.30.1.205","TCP","66","135 > 43356 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20719","9.432703","172.30.1.205","172.30.1.104","TCP","54","43356 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20720","9.433074","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20721","9.433358","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20722","9.433366","172.30.1.205","172.30.1.104","TCP","54","43356 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20723","9.435550","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20724","9.435969","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20725","9.435975","172.30.1.205","172.30.1.104","TCP","54","43356 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20726","9.437813","172.30.1.205","172.30.1.104","TCP","54","43356 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20727","9.437923","172.30.1.205","172.30.1.104","TCP","74","35994 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912664 TSecr=0 WS=128" "20728","9.438080","172.30.1.104","172.30.1.205","TCP","54","135 > 43356 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20729","9.438115","172.30.1.104","172.30.1.205","TCP","54","135 > 43356 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20730","9.438121","172.30.1.205","172.30.1.104","TCP","54","43356 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20731","9.438216","172.30.1.104","172.30.1.205","TCP","66","49671 > 35994 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20732","9.438233","172.30.1.205","172.30.1.104","TCP","54","35994 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20733","9.438640","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20734","9.438917","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20735","9.438927","172.30.1.205","172.30.1.104","TCP","54","35994 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20736","9.440868","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20737","9.441228","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20738","9.441236","172.30.1.205","172.30.1.104","TCP","54","35994 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20739","9.442668","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20740","9.444677","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20741","9.444688","172.30.1.205","172.30.1.104","TCP","54","35994 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20742","9.445677","172.30.1.205","172.30.1.104","TCP","74","43360 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912672 TSecr=0 WS=128" "20743","9.445965","172.30.1.104","172.30.1.205","TCP","66","135 > 43360 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20744","9.445976","172.30.1.205","172.30.1.104","TCP","54","43360 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20745","9.446328","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20746","9.446576","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20747","9.446584","172.30.1.205","172.30.1.104","TCP","54","43360 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20748","9.448829","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20749","9.449308","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20750","9.449315","172.30.1.205","172.30.1.104","TCP","54","43360 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20751","9.451155","172.30.1.205","172.30.1.104","TCP","54","43360 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20752","9.451269","172.30.1.205","172.30.1.104","TCP","74","35998 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912677 TSecr=0 WS=128" "20753","9.451423","172.30.1.104","172.30.1.205","TCP","54","135 > 43360 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20754","9.451432","172.30.1.104","172.30.1.205","TCP","54","135 > 43360 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20755","9.451437","172.30.1.205","172.30.1.104","TCP","54","43360 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20756","9.451567","172.30.1.104","172.30.1.205","TCP","66","49671 > 35998 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20757","9.451575","172.30.1.205","172.30.1.104","TCP","54","35998 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20758","9.451927","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20759","9.452219","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20760","9.452228","172.30.1.205","172.30.1.104","TCP","54","35998 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20761","9.454146","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20762","9.454520","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20763","9.454527","172.30.1.205","172.30.1.104","TCP","54","35998 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20764","9.455935","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20765","9.457983","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20766","9.457992","172.30.1.205","172.30.1.104","TCP","54","35998 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20767","9.458938","172.30.1.205","172.30.1.104","TCP","74","43364 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912685 TSecr=0 WS=128" "20768","9.459242","172.30.1.104","172.30.1.205","TCP","66","135 > 43364 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20769","9.459253","172.30.1.205","172.30.1.104","TCP","54","43364 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20770","9.459611","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20771","9.459903","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20772","9.459913","172.30.1.205","172.30.1.104","TCP","54","43364 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20773","9.462145","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20774","9.462522","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20775","9.462528","172.30.1.205","172.30.1.104","TCP","54","43364 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20776","9.464338","172.30.1.205","172.30.1.104","TCP","54","43364 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20777","9.464453","172.30.1.205","172.30.1.104","TCP","74","36002 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912690 TSecr=0 WS=128" "20778","9.464591","172.30.1.104","172.30.1.205","TCP","54","135 > 43364 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20779","9.464615","172.30.1.104","172.30.1.205","TCP","54","135 > 43364 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20780","9.464621","172.30.1.205","172.30.1.104","TCP","54","43364 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20781","9.464717","172.30.1.104","172.30.1.205","TCP","66","49671 > 36002 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20782","9.464725","172.30.1.205","172.30.1.104","TCP","54","36002 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20783","9.465102","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20784","9.465401","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20785","9.465410","172.30.1.205","172.30.1.104","TCP","54","36002 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20786","9.467298","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20787","9.467661","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20788","9.467667","172.30.1.205","172.30.1.104","TCP","54","36002 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20789","9.469082","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20790","9.471032","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20791","9.471041","172.30.1.205","172.30.1.104","TCP","54","36002 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20792","9.471987","172.30.1.205","172.30.1.104","TCP","74","43368 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912698 TSecr=0 WS=128" "20793","9.472294","172.30.1.104","172.30.1.205","TCP","66","135 > 43368 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20794","9.472304","172.30.1.205","172.30.1.104","TCP","54","43368 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20795","9.472657","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20796","9.472938","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20797","9.472947","172.30.1.205","172.30.1.104","TCP","54","43368 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20798","9.475174","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20799","9.475571","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20800","9.475578","172.30.1.205","172.30.1.104","TCP","54","43368 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20801","9.477413","172.30.1.205","172.30.1.104","TCP","54","43368 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20802","9.477525","172.30.1.205","172.30.1.104","TCP","74","36006 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912703 TSecr=0 WS=128" "20803","9.477692","172.30.1.104","172.30.1.205","TCP","54","135 > 43368 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20804","9.477757","172.30.1.104","172.30.1.205","TCP","54","135 > 43368 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20805","9.477762","172.30.1.205","172.30.1.104","TCP","54","43368 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20806","9.477836","172.30.1.104","172.30.1.205","TCP","66","49671 > 36006 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20807","9.477848","172.30.1.205","172.30.1.104","TCP","54","36006 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20808","9.478197","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20809","9.478477","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20810","9.478485","172.30.1.205","172.30.1.104","TCP","54","36006 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20811","9.480367","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20812","9.480709","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20813","9.480715","172.30.1.205","172.30.1.104","TCP","54","36006 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20814","9.482100","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20815","9.484043","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20816","9.484053","172.30.1.205","172.30.1.104","TCP","54","36006 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20817","9.485012","172.30.1.205","172.30.1.104","TCP","74","43372 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912711 TSecr=0 WS=128" "20818","9.485299","172.30.1.104","172.30.1.205","TCP","66","135 > 43372 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20819","9.485309","172.30.1.205","172.30.1.104","TCP","54","43372 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20820","9.485658","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20821","9.485954","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20822","9.485963","172.30.1.205","172.30.1.104","TCP","54","43372 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20823","9.488139","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20824","9.488532","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20825","9.488538","172.30.1.205","172.30.1.104","TCP","54","43372 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20826","9.490390","172.30.1.205","172.30.1.104","TCP","54","43372 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20827","9.490502","172.30.1.205","172.30.1.104","TCP","74","36010 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912716 TSecr=0 WS=128" "20828","9.490634","172.30.1.104","172.30.1.205","TCP","54","135 > 43372 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20829","9.490662","172.30.1.104","172.30.1.205","TCP","54","135 > 43372 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20830","9.490668","172.30.1.205","172.30.1.104","TCP","54","43372 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20831","9.490749","172.30.1.104","172.30.1.205","TCP","66","49671 > 36010 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20832","9.490757","172.30.1.205","172.30.1.104","TCP","54","36010 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20833","9.491108","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20834","9.491373","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20835","9.491384","172.30.1.205","172.30.1.104","TCP","54","36010 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20836","9.493581","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20837","9.493932","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20838","9.493938","172.30.1.205","172.30.1.104","TCP","54","36010 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20839","9.495297","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20840","9.497347","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20841","9.497356","172.30.1.205","172.30.1.104","TCP","54","36010 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20842","9.498302","172.30.1.205","172.30.1.104","TCP","74","43376 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912724 TSecr=0 WS=128" "20843","9.498587","172.30.1.104","172.30.1.205","TCP","66","135 > 43376 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20844","9.498598","172.30.1.205","172.30.1.104","TCP","54","43376 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20845","9.498949","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20846","9.501544","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20847","9.501553","172.30.1.205","172.30.1.104","TCP","54","43376 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20848","9.503764","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20849","9.504593","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20850","9.504600","172.30.1.205","172.30.1.104","TCP","54","43376 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20851","9.506453","172.30.1.205","172.30.1.104","TCP","54","43376 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20852","9.506565","172.30.1.205","172.30.1.104","TCP","74","36014 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912732 TSecr=0 WS=128" "20853","9.506720","172.30.1.104","172.30.1.205","TCP","54","135 > 43376 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20854","9.506731","172.30.1.104","172.30.1.205","TCP","54","135 > 43376 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20855","9.506736","172.30.1.205","172.30.1.104","TCP","54","43376 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20856","9.506816","172.30.1.104","172.30.1.205","TCP","66","49671 > 36014 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20857","9.506824","172.30.1.205","172.30.1.104","TCP","54","36014 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20858","9.507179","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20859","9.507477","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20860","9.507486","172.30.1.205","172.30.1.104","TCP","54","36014 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20861","9.509390","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20862","9.509736","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20863","9.509743","172.30.1.205","172.30.1.104","TCP","54","36014 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20864","9.511105","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20865","9.513225","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20866","9.513235","172.30.1.205","172.30.1.104","TCP","54","36014 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20867","9.514184","172.30.1.205","172.30.1.104","TCP","74","43380 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912740 TSecr=0 WS=128" "20868","9.514490","172.30.1.104","172.30.1.205","TCP","66","135 > 43380 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20869","9.514508","172.30.1.205","172.30.1.104","TCP","54","43380 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20870","9.514908","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20871","9.515196","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20872","9.515205","172.30.1.205","172.30.1.104","TCP","54","43380 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20873","9.517438","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20874","9.517926","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20875","9.517933","172.30.1.205","172.30.1.104","TCP","54","43380 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20876","9.519735","172.30.1.205","172.30.1.104","TCP","54","43380 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20877","9.519851","172.30.1.205","172.30.1.104","TCP","74","36018 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912746 TSecr=0 WS=128" "20878","9.520021","172.30.1.104","172.30.1.205","TCP","54","135 > 43380 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20879","9.520032","172.30.1.104","172.30.1.205","TCP","54","135 > 43380 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20880","9.520037","172.30.1.205","172.30.1.104","TCP","54","43380 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20881","9.520148","172.30.1.104","172.30.1.205","TCP","66","49671 > 36018 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20882","9.520156","172.30.1.205","172.30.1.104","TCP","54","36018 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20883","9.520502","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20884","9.520807","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20885","9.520818","172.30.1.205","172.30.1.104","TCP","54","36018 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20886","9.522712","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20887","9.523088","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20888","9.523096","172.30.1.205","172.30.1.104","TCP","54","36018 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20889","9.524458","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20890","9.526464","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20891","9.526473","172.30.1.205","172.30.1.104","TCP","54","36018 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20892","9.527417","172.30.1.205","172.30.1.104","TCP","74","43384 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912753 TSecr=0 WS=128" "20893","9.527717","172.30.1.104","172.30.1.205","TCP","66","135 > 43384 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20894","9.527728","172.30.1.205","172.30.1.104","TCP","54","43384 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20895","9.528082","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20896","9.528368","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20897","9.528376","172.30.1.205","172.30.1.104","TCP","54","43384 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20898","9.530570","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20899","9.530954","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20900","9.530960","172.30.1.205","172.30.1.104","TCP","54","43384 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20901","9.531807","172.30.1.205","172.30.1.104","TCP","54","35978 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20902","9.531855","172.30.1.205","172.30.1.104","TCP","54","35982 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20903","9.531890","172.30.1.205","172.30.1.104","TCP","54","35986 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20904","9.531918","172.30.1.205","172.30.1.104","TCP","54","35990 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20905","9.531946","172.30.1.205","172.30.1.104","TCP","54","35994 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20906","9.531973","172.30.1.205","172.30.1.104","TCP","54","35998 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20907","9.532000","172.30.1.205","172.30.1.104","TCP","54","36002 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20908","9.532026","172.30.1.205","172.30.1.104","TCP","54","36006 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20909","9.532053","172.30.1.205","172.30.1.104","TCP","54","36010 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20910","9.532085","172.30.1.205","172.30.1.104","TCP","54","36014 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20911","9.532118","172.30.1.205","172.30.1.104","TCP","54","36018 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20912","9.532155","172.30.1.104","172.30.1.205","TCP","54","49671 > 35978 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20913","9.532173","172.30.1.104","172.30.1.205","TCP","54","49671 > 35978 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20914","9.532179","172.30.1.205","172.30.1.104","TCP","54","35978 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20915","9.532194","172.30.1.104","172.30.1.205","TCP","54","49671 > 35982 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20916","9.532217","172.30.1.104","172.30.1.205","TCP","54","49671 > 35986 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20917","9.532238","172.30.1.104","172.30.1.205","TCP","54","49671 > 35990 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20918","9.532245","172.30.1.205","172.30.1.104","TCP","54","35974 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "20919","9.532258","172.30.1.104","172.30.1.205","TCP","54","49671 > 35994 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20920","9.532378","172.30.1.104","172.30.1.205","TCP","54","49671 > 35998 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20921","9.532394","172.30.1.104","172.30.1.205","TCP","54","49671 > 35998 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20922","9.532399","172.30.1.205","172.30.1.104","TCP","54","35998 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20923","9.532415","172.30.1.104","172.30.1.205","TCP","54","49671 > 35994 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20924","9.532419","172.30.1.205","172.30.1.104","TCP","54","35994 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20925","9.532438","172.30.1.104","172.30.1.205","TCP","54","49671 > 35990 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20926","9.532441","172.30.1.205","172.30.1.104","TCP","54","35990 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20927","9.532458","172.30.1.104","172.30.1.205","TCP","54","49671 > 35982 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20928","9.532461","172.30.1.205","172.30.1.104","TCP","54","35982 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20929","9.532479","172.30.1.104","172.30.1.205","TCP","54","49671 > 35986 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20930","9.532482","172.30.1.205","172.30.1.104","TCP","54","35986 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20931","9.532499","172.30.1.104","172.30.1.205","TCP","54","49671 > 36002 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20932","9.532519","172.30.1.104","172.30.1.205","TCP","54","49671 > 36006 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20933","9.532543","172.30.1.104","172.30.1.205","TCP","54","49671 > 36010 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20934","9.532669","172.30.1.104","172.30.1.205","TCP","54","49671 > 36002 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20935","9.532674","172.30.1.205","172.30.1.104","TCP","54","36002 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20936","9.532689","172.30.1.104","172.30.1.205","TCP","54","49671 > 36014 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20937","9.532713","172.30.1.104","172.30.1.205","TCP","54","49671 > 36014 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20938","9.532717","172.30.1.205","172.30.1.104","TCP","54","36014 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20939","9.532732","172.30.1.104","172.30.1.205","TCP","54","49671 > 36006 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20940","9.532735","172.30.1.205","172.30.1.104","TCP","54","36006 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20941","9.532753","172.30.1.104","172.30.1.205","TCP","54","49671 > 36010 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20942","9.532756","172.30.1.205","172.30.1.104","TCP","54","36010 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20943","9.532786","172.30.1.104","172.30.1.205","TCP","54","49671 > 36018 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20944","9.532881","172.30.1.104","172.30.1.205","TCP","54","49671 > 35974 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20945","9.532900","172.30.1.104","172.30.1.205","TCP","54","49671 > 36018 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20946","9.532905","172.30.1.205","172.30.1.104","TCP","54","36018 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20947","9.533000","172.30.1.104","172.30.1.205","TCP","54","49671 > 35974 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "20948","9.533005","172.30.1.205","172.30.1.104","TCP","54","35974 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "20949","9.533788","172.30.1.205","172.30.1.104","TCP","54","43384 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20950","9.533898","172.30.1.205","172.30.1.104","TCP","74","36022 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912760 TSecr=0 WS=128" "20951","9.534035","172.30.1.104","172.30.1.205","TCP","54","135 > 43384 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20952","9.534069","172.30.1.104","172.30.1.205","TCP","54","135 > 43384 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20953","9.534074","172.30.1.205","172.30.1.104","TCP","54","43384 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20954","9.534169","172.30.1.104","172.30.1.205","TCP","66","49671 > 36022 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20955","9.534177","172.30.1.205","172.30.1.104","TCP","54","36022 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20956","9.534544","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20957","9.534845","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20958","9.534853","172.30.1.205","172.30.1.104","TCP","54","36022 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20959","9.536846","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20960","9.537205","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20961","9.537211","172.30.1.205","172.30.1.104","TCP","54","36022 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20962","9.538557","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20963","9.540605","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20964","9.540615","172.30.1.205","172.30.1.104","TCP","54","36022 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20965","9.541564","172.30.1.205","172.30.1.104","TCP","74","43388 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912767 TSecr=0 WS=128" "20966","9.541866","172.30.1.104","172.30.1.205","TCP","66","135 > 43388 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20967","9.541877","172.30.1.205","172.30.1.104","TCP","54","43388 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20968","9.542223","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20969","9.542509","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20970","9.542518","172.30.1.205","172.30.1.104","TCP","54","43388 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20971","9.544683","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20972","9.545047","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20973","9.545053","172.30.1.205","172.30.1.104","TCP","54","43388 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20974","9.546856","172.30.1.205","172.30.1.104","TCP","54","43388 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "20975","9.546965","172.30.1.205","172.30.1.104","TCP","74","36026 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912773 TSecr=0 WS=128" "20976","9.547146","172.30.1.104","172.30.1.205","TCP","54","135 > 43388 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20977","9.547176","172.30.1.104","172.30.1.205","TCP","54","135 > 43388 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "20978","9.547182","172.30.1.205","172.30.1.104","TCP","54","43388 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "20979","9.547254","172.30.1.104","172.30.1.205","TCP","66","49671 > 36026 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20980","9.547262","172.30.1.205","172.30.1.104","TCP","54","36026 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20981","9.547605","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "20982","9.547937","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20983","9.547946","172.30.1.205","172.30.1.104","TCP","54","36026 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20984","9.549839","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "20985","9.550207","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "20986","9.550213","172.30.1.205","172.30.1.104","TCP","54","36026 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "20987","9.551550","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "20988","9.553492","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "20989","9.553501","172.30.1.205","172.30.1.104","TCP","54","36026 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "20990","9.554433","172.30.1.205","172.30.1.104","TCP","74","43392 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912780 TSecr=0 WS=128" "20991","9.554735","172.30.1.104","172.30.1.205","TCP","66","135 > 43392 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "20992","9.554745","172.30.1.205","172.30.1.104","TCP","54","43392 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "20993","9.555098","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "20994","9.555370","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "20995","9.555378","172.30.1.205","172.30.1.104","TCP","54","43392 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "20996","9.557589","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "20997","9.557944","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "20998","9.557950","172.30.1.205","172.30.1.104","TCP","54","43392 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "20999","9.559743","172.30.1.205","172.30.1.104","TCP","54","43392 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21000","9.559862","172.30.1.205","172.30.1.104","TCP","74","36030 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912786 TSecr=0 WS=128" "21001","9.559997","172.30.1.104","172.30.1.205","TCP","54","135 > 43392 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21002","9.560019","172.30.1.104","172.30.1.205","TCP","54","135 > 43392 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21003","9.560024","172.30.1.205","172.30.1.104","TCP","54","43392 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21004","9.560125","172.30.1.104","172.30.1.205","TCP","66","49671 > 36030 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21005","9.560133","172.30.1.205","172.30.1.104","TCP","54","36030 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21006","9.560481","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21007","9.560756","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21008","9.560765","172.30.1.205","172.30.1.104","TCP","54","36030 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21009","9.562634","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21010","9.562977","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21011","9.562984","172.30.1.205","172.30.1.104","TCP","54","36030 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21012","9.564324","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21013","9.566236","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21014","9.566245","172.30.1.205","172.30.1.104","TCP","54","36030 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21015","9.567185","172.30.1.205","172.30.1.104","TCP","74","43396 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912793 TSecr=0 WS=128" "21016","9.567473","172.30.1.104","172.30.1.205","TCP","66","135 > 43396 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21017","9.567483","172.30.1.205","172.30.1.104","TCP","54","43396 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21018","9.567829","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21019","9.568098","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21020","9.568106","172.30.1.205","172.30.1.104","TCP","54","43396 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21021","9.570321","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21022","9.570675","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21023","9.570682","172.30.1.205","172.30.1.104","TCP","54","43396 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21024","9.572487","172.30.1.205","172.30.1.104","TCP","54","43396 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21025","9.572595","172.30.1.205","172.30.1.104","TCP","74","36034 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912799 TSecr=0 WS=128" "21026","9.572755","172.30.1.104","172.30.1.205","TCP","54","135 > 43396 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21027","9.572764","172.30.1.104","172.30.1.205","TCP","54","135 > 43396 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21028","9.572769","172.30.1.205","172.30.1.104","TCP","54","43396 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21029","9.572849","172.30.1.104","172.30.1.205","TCP","66","49671 > 36034 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21030","9.572857","172.30.1.205","172.30.1.104","TCP","54","36034 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21031","9.573219","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21032","9.573479","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21033","9.573489","172.30.1.205","172.30.1.104","TCP","54","36034 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21034","9.575371","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21035","9.575739","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21036","9.575746","172.30.1.205","172.30.1.104","TCP","54","36034 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21037","9.577125","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21038","9.579099","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21039","9.579109","172.30.1.205","172.30.1.104","TCP","54","36034 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21040","9.580034","172.30.1.205","172.30.1.104","TCP","74","43400 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912806 TSecr=0 WS=128" "21041","9.580332","172.30.1.104","172.30.1.205","TCP","66","135 > 43400 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21042","9.580343","172.30.1.205","172.30.1.104","TCP","54","43400 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21043","9.580687","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21044","9.580953","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21045","9.580963","172.30.1.205","172.30.1.104","TCP","54","43400 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21046","9.583150","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21047","9.583528","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21048","9.583534","172.30.1.205","172.30.1.104","TCP","54","43400 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21049","9.585368","172.30.1.205","172.30.1.104","TCP","54","43400 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21050","9.585477","172.30.1.205","172.30.1.104","TCP","74","36038 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912811 TSecr=0 WS=128" "21051","9.585646","172.30.1.104","172.30.1.205","TCP","54","135 > 43400 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21052","9.585654","172.30.1.104","172.30.1.205","TCP","54","135 > 43400 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21053","9.585658","172.30.1.205","172.30.1.104","TCP","54","43400 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21054","9.585756","172.30.1.104","172.30.1.205","TCP","66","49671 > 36038 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21055","9.585764","172.30.1.205","172.30.1.104","TCP","54","36038 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21056","9.586104","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21057","9.586367","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21058","9.586375","172.30.1.205","172.30.1.104","TCP","54","36038 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21059","9.588251","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21060","9.588610","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21061","9.588616","172.30.1.205","172.30.1.104","TCP","54","36038 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21062","9.589984","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21063","9.591964","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21064","9.591973","172.30.1.205","172.30.1.104","TCP","54","36038 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21065","9.592913","172.30.1.205","172.30.1.104","TCP","74","43404 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912819 TSecr=0 WS=128" "21066","9.593224","172.30.1.104","172.30.1.205","TCP","66","135 > 43404 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21067","9.593234","172.30.1.205","172.30.1.104","TCP","54","43404 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21068","9.593584","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21069","9.593882","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21070","9.593890","172.30.1.205","172.30.1.104","TCP","54","43404 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21071","9.596047","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21072","9.596423","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21073","9.596429","172.30.1.205","172.30.1.104","TCP","54","43404 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21074","9.598256","172.30.1.205","172.30.1.104","TCP","54","43404 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21075","9.598365","172.30.1.205","172.30.1.104","TCP","74","36042 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912824 TSecr=0 WS=128" "21076","9.598559","172.30.1.104","172.30.1.205","TCP","54","135 > 43404 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21077","9.598567","172.30.1.104","172.30.1.205","TCP","54","135 > 43404 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21078","9.598572","172.30.1.205","172.30.1.104","TCP","54","43404 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21079","9.598660","172.30.1.104","172.30.1.205","TCP","66","49671 > 36042 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21080","9.598668","172.30.1.205","172.30.1.104","TCP","54","36042 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21081","9.599014","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21082","9.600892","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21083","9.600899","172.30.1.205","172.30.1.104","TCP","54","36042 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21084","9.602760","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21085","9.603102","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21086","9.603108","172.30.1.205","172.30.1.104","TCP","54","36042 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21087","9.604438","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21088","9.607272","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21089","9.607281","172.30.1.205","172.30.1.104","TCP","54","36042 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21090","9.608205","172.30.1.205","172.30.1.104","TCP","74","43408 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912834 TSecr=0 WS=128" "21091","9.608710","172.30.1.104","172.30.1.205","TCP","66","135 > 43408 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21092","9.608721","172.30.1.205","172.30.1.104","TCP","54","43408 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21093","9.609091","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21094","9.609437","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21095","9.609446","172.30.1.205","172.30.1.104","TCP","54","43408 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21096","9.611615","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21097","9.612025","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21098","9.612031","172.30.1.205","172.30.1.104","TCP","54","43408 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21099","9.613853","172.30.1.205","172.30.1.104","TCP","54","43408 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21100","9.613964","172.30.1.205","172.30.1.104","TCP","74","36046 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912840 TSecr=0 WS=128" "21101","9.614116","172.30.1.104","172.30.1.205","TCP","54","135 > 43408 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21102","9.614148","172.30.1.104","172.30.1.205","TCP","54","135 > 43408 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21103","9.614153","172.30.1.205","172.30.1.104","TCP","54","43408 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21104","9.614252","172.30.1.104","172.30.1.205","TCP","66","49671 > 36046 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21105","9.614261","172.30.1.205","172.30.1.104","TCP","54","36046 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21106","9.614601","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21107","9.616135","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21108","9.616142","172.30.1.205","172.30.1.104","TCP","54","36046 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21109","9.618027","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21110","9.619325","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21111","9.619331","172.30.1.205","172.30.1.104","TCP","54","36046 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21112","9.620671","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21113","9.622724","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21114","9.622734","172.30.1.205","172.30.1.104","TCP","54","36046 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21115","9.623695","172.30.1.205","172.30.1.104","TCP","74","43412 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912850 TSecr=0 WS=128" "21116","9.623981","172.30.1.104","172.30.1.205","TCP","66","135 > 43412 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21117","9.623996","172.30.1.205","172.30.1.104","TCP","54","43412 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21118","9.624346","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21119","9.624640","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21120","9.624649","172.30.1.205","172.30.1.104","TCP","54","43412 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21121","9.626857","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21122","9.627272","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21123","9.627279","172.30.1.205","172.30.1.104","TCP","54","43412 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21124","9.629106","172.30.1.205","172.30.1.104","TCP","54","43412 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21125","9.629220","172.30.1.205","172.30.1.104","TCP","74","36050 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912855 TSecr=0 WS=128" "21126","9.629434","172.30.1.104","172.30.1.205","TCP","54","135 > 43412 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21127","9.629449","172.30.1.104","172.30.1.205","TCP","54","135 > 43412 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21128","9.629456","172.30.1.205","172.30.1.104","TCP","54","43412 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21129","9.629528","172.30.1.104","172.30.1.205","TCP","66","49671 > 36050 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21130","9.629537","172.30.1.205","172.30.1.104","TCP","54","36050 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21131","9.629884","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21132","9.630166","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21133","9.630175","172.30.1.205","172.30.1.104","TCP","54","36050 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21134","9.632048","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21135","9.632416","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21136","9.632422","172.30.1.205","172.30.1.104","TCP","54","36050 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21137","9.633801","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21138","9.635772","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21139","9.635781","172.30.1.205","172.30.1.104","TCP","54","36050 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21140","9.636769","172.30.1.205","172.30.1.104","TCP","74","43416 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912863 TSecr=0 WS=128" "21141","9.637045","172.30.1.104","172.30.1.205","TCP","66","135 > 43416 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21142","9.637056","172.30.1.205","172.30.1.104","TCP","54","43416 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21143","9.637402","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21144","9.637670","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21145","9.637679","172.30.1.205","172.30.1.104","TCP","54","43416 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21146","9.639860","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21147","9.640234","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21148","9.640240","172.30.1.205","172.30.1.104","TCP","54","43416 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21149","9.642085","172.30.1.205","172.30.1.104","TCP","54","43416 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21150","9.642205","172.30.1.205","172.30.1.104","TCP","74","36054 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912868 TSecr=0 WS=128" "21151","9.642348","172.30.1.104","172.30.1.205","TCP","54","135 > 43416 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21152","9.642374","172.30.1.104","172.30.1.205","TCP","54","135 > 43416 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21153","9.642381","172.30.1.205","172.30.1.104","TCP","54","43416 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21154","9.642479","172.30.1.104","172.30.1.205","TCP","66","49671 > 36054 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21155","9.642487","172.30.1.205","172.30.1.104","TCP","54","36054 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21156","9.642829","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21157","9.643118","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21158","9.643125","172.30.1.205","172.30.1.104","TCP","54","36054 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21159","9.645009","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21160","9.645447","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21161","9.645454","172.30.1.205","172.30.1.104","TCP","54","36054 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21162","9.646804","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21163","9.648710","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21164","9.648719","172.30.1.205","172.30.1.104","TCP","54","36054 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21165","9.649686","172.30.1.205","172.30.1.104","TCP","74","43420 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912876 TSecr=0 WS=128" "21166","9.649996","172.30.1.104","172.30.1.205","TCP","66","135 > 43420 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21167","9.650007","172.30.1.205","172.30.1.104","TCP","54","43420 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21168","9.650352","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21169","9.650667","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21170","9.650676","172.30.1.205","172.30.1.104","TCP","54","43420 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21171","9.652876","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21172","9.653280","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21173","9.653293","172.30.1.205","172.30.1.104","TCP","54","43420 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21174","9.655100","172.30.1.205","172.30.1.104","TCP","54","43420 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21175","9.655212","172.30.1.205","172.30.1.104","TCP","74","36058 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912881 TSecr=0 WS=128" "21176","9.655369","172.30.1.104","172.30.1.205","TCP","54","135 > 43420 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21177","9.655407","172.30.1.104","172.30.1.205","TCP","54","135 > 43420 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21178","9.655414","172.30.1.205","172.30.1.104","TCP","54","43420 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21179","9.655503","172.30.1.104","172.30.1.205","TCP","66","49671 > 36058 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21180","9.655511","172.30.1.205","172.30.1.104","TCP","54","36058 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21181","9.655854","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21182","9.656215","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21183","9.656224","172.30.1.205","172.30.1.104","TCP","54","36058 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21184","9.658120","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21185","9.658651","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21186","9.658658","172.30.1.205","172.30.1.104","TCP","54","36058 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21187","9.659996","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21188","9.661891","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21189","9.661901","172.30.1.205","172.30.1.104","TCP","54","36058 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21190","9.662850","172.30.1.205","172.30.1.104","TCP","74","43424 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912889 TSecr=0 WS=128" "21191","9.663171","172.30.1.104","172.30.1.205","TCP","66","135 > 43424 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21192","9.663182","172.30.1.205","172.30.1.104","TCP","54","43424 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21193","9.663528","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21194","9.663894","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21195","9.663902","172.30.1.205","172.30.1.104","TCP","54","43424 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21196","9.666117","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21197","9.666684","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21198","9.666690","172.30.1.205","172.30.1.104","TCP","54","43424 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21199","9.668504","172.30.1.205","172.30.1.104","TCP","54","43424 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21200","9.668621","172.30.1.205","172.30.1.104","TCP","74","36062 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912895 TSecr=0 WS=128" "21201","9.668793","172.30.1.104","172.30.1.205","TCP","54","135 > 43424 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21202","9.668846","172.30.1.104","172.30.1.205","TCP","54","135 > 43424 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21203","9.668854","172.30.1.205","172.30.1.104","TCP","54","43424 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21204","9.668925","172.30.1.104","172.30.1.205","TCP","66","49671 > 36062 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21205","9.668933","172.30.1.205","172.30.1.104","TCP","54","36062 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21206","9.669286","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21207","9.669660","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21208","9.669669","172.30.1.205","172.30.1.104","TCP","54","36062 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21209","9.671557","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21210","9.671888","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21211","9.671894","172.30.1.205","172.30.1.104","TCP","54","36062 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21212","9.673266","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21213","9.675212","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21214","9.675222","172.30.1.205","172.30.1.104","TCP","54","36062 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21215","9.676173","172.30.1.205","172.30.1.104","TCP","74","43428 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912902 TSecr=0 WS=128" "21216","9.676481","172.30.1.104","172.30.1.205","TCP","66","135 > 43428 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21217","9.676492","172.30.1.205","172.30.1.104","TCP","54","43428 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21218","9.676863","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21219","9.677161","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21220","9.677170","172.30.1.205","172.30.1.104","TCP","54","43428 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21221","9.679359","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21222","9.679827","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21223","9.679834","172.30.1.205","172.30.1.104","TCP","54","43428 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21224","9.681659","172.30.1.205","172.30.1.104","TCP","54","43428 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21225","9.681776","172.30.1.205","172.30.1.104","TCP","74","36066 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912908 TSecr=0 WS=128" "21226","9.681946","172.30.1.104","172.30.1.205","TCP","54","135 > 43428 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21227","9.681958","172.30.1.104","172.30.1.205","TCP","54","135 > 43428 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21228","9.681965","172.30.1.205","172.30.1.104","TCP","54","43428 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21229","9.682043","172.30.1.104","172.30.1.205","TCP","66","49671 > 36066 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21230","9.682052","172.30.1.205","172.30.1.104","TCP","54","36066 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21231","9.682392","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21232","9.682676","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21233","9.682684","172.30.1.205","172.30.1.104","TCP","54","36066 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21234","9.684550","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21235","9.684904","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21236","9.684910","172.30.1.205","172.30.1.104","TCP","54","36066 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21237","9.686263","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21238","9.688269","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21239","9.688278","172.30.1.205","172.30.1.104","TCP","54","36066 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21240","9.689252","172.30.1.205","172.30.1.104","TCP","74","43432 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912915 TSecr=0 WS=128" "21241","9.689704","172.30.1.104","172.30.1.205","TCP","66","135 > 43432 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21242","9.689714","172.30.1.205","172.30.1.104","TCP","54","43432 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21243","9.690058","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21244","9.690360","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21245","9.690369","172.30.1.205","172.30.1.104","TCP","54","43432 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21246","9.692528","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21247","9.692905","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21248","9.692912","172.30.1.205","172.30.1.104","TCP","54","43432 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21249","9.693768","172.30.1.205","172.30.1.104","TCP","54","36026 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21250","9.693816","172.30.1.205","172.30.1.104","TCP","54","36030 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21251","9.693856","172.30.1.205","172.30.1.104","TCP","54","36034 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21252","9.693886","172.30.1.205","172.30.1.104","TCP","54","36038 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21253","9.693914","172.30.1.205","172.30.1.104","TCP","54","36042 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21254","9.693937","172.30.1.205","172.30.1.104","TCP","54","36046 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21255","9.693959","172.30.1.205","172.30.1.104","TCP","54","36050 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21256","9.693986","172.30.1.205","172.30.1.104","TCP","54","36054 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21257","9.694011","172.30.1.205","172.30.1.104","TCP","54","36058 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21258","9.694033","172.30.1.205","172.30.1.104","TCP","54","36062 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21259","9.694060","172.30.1.205","172.30.1.104","TCP","54","36066 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21260","9.694125","172.30.1.205","172.30.1.104","TCP","54","36022 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21261","9.694128","172.30.1.104","172.30.1.205","TCP","54","49671 > 36026 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21262","9.694162","172.30.1.104","172.30.1.205","TCP","54","49671 > 36030 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21263","9.694199","172.30.1.104","172.30.1.205","TCP","54","49671 > 36026 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21264","9.694206","172.30.1.205","172.30.1.104","TCP","54","36026 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21265","9.694232","172.30.1.104","172.30.1.205","TCP","54","49671 > 36030 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21266","9.694239","172.30.1.205","172.30.1.104","TCP","54","36030 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21267","9.694441","172.30.1.104","172.30.1.205","TCP","54","49671 > 36034 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21268","9.694464","172.30.1.104","172.30.1.205","TCP","54","49671 > 36038 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21269","9.694491","172.30.1.104","172.30.1.205","TCP","54","49671 > 36038 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21270","9.694497","172.30.1.205","172.30.1.104","TCP","54","36038 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21271","9.694517","172.30.1.104","172.30.1.205","TCP","54","49671 > 36034 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21272","9.694520","172.30.1.205","172.30.1.104","TCP","54","36034 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21273","9.694544","172.30.1.104","172.30.1.205","TCP","54","49671 > 36042 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21274","9.694571","172.30.1.104","172.30.1.205","TCP","54","49671 > 36046 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21275","9.694660","172.30.1.104","172.30.1.205","TCP","54","49671 > 36046 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21276","9.694665","172.30.1.205","172.30.1.104","TCP","54","36046 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21277","9.694685","172.30.1.104","172.30.1.205","TCP","54","49671 > 36050 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21278","9.694721","172.30.1.104","172.30.1.205","TCP","54","49671 > 36042 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21279","9.694724","172.30.1.205","172.30.1.104","TCP","54","36042 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21280","9.694750","172.30.1.104","172.30.1.205","TCP","54","49671 > 36050 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21281","9.694754","172.30.1.205","172.30.1.104","TCP","54","36050 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21282","9.694826","172.30.1.104","172.30.1.205","TCP","54","49671 > 36054 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21283","9.694832","172.30.1.104","172.30.1.205","TCP","54","49671 > 36058 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21284","9.694843","172.30.1.104","172.30.1.205","TCP","54","49671 > 36054 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21285","9.694848","172.30.1.205","172.30.1.104","TCP","54","36054 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21286","9.694897","172.30.1.104","172.30.1.205","TCP","54","49671 > 36062 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21287","9.694902","172.30.1.104","172.30.1.205","TCP","54","49671 > 36062 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21288","9.694906","172.30.1.205","172.30.1.104","TCP","54","36062 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21289","9.694921","172.30.1.104","172.30.1.205","TCP","54","49671 > 36066 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21290","9.694949","172.30.1.104","172.30.1.205","TCP","54","49671 > 36066 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21291","9.694953","172.30.1.205","172.30.1.104","TCP","54","36066 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21292","9.694985","172.30.1.104","172.30.1.205","TCP","54","49671 > 36022 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21293","9.695021","172.30.1.104","172.30.1.205","TCP","54","49671 > 36022 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21294","9.695025","172.30.1.205","172.30.1.104","TCP","54","36022 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21295","9.695057","172.30.1.104","172.30.1.205","TCP","54","49671 > 36058 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21296","9.695060","172.30.1.205","172.30.1.104","TCP","54","36058 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21297","9.695750","172.30.1.205","172.30.1.104","TCP","54","43432 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21298","9.695860","172.30.1.205","172.30.1.104","TCP","74","36070 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912922 TSecr=0 WS=128" "21299","9.696021","172.30.1.104","172.30.1.205","TCP","54","135 > 43432 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21300","9.696050","172.30.1.104","172.30.1.205","TCP","54","135 > 43432 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21301","9.696055","172.30.1.205","172.30.1.104","TCP","54","43432 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21302","9.696191","172.30.1.104","172.30.1.205","TCP","66","49671 > 36070 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21303","9.696199","172.30.1.205","172.30.1.104","TCP","54","36070 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21304","9.696552","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21305","9.696826","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21306","9.696835","172.30.1.205","172.30.1.104","TCP","54","36070 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21307","9.698706","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21308","9.699060","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21309","9.699066","172.30.1.205","172.30.1.104","TCP","54","36070 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21310","9.700408","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21311","9.702309","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21312","9.702318","172.30.1.205","172.30.1.104","TCP","54","36070 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21313","9.703266","172.30.1.205","172.30.1.104","TCP","74","43436 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912929 TSecr=0 WS=128" "21314","9.703567","172.30.1.104","172.30.1.205","TCP","66","135 > 43436 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21315","9.703577","172.30.1.205","172.30.1.104","TCP","54","43436 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21316","9.703922","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21317","9.704236","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21318","9.704245","172.30.1.205","172.30.1.104","TCP","54","43436 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21319","9.706444","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21320","9.706819","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21321","9.706825","172.30.1.205","172.30.1.104","TCP","54","43436 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21322","9.708667","172.30.1.205","172.30.1.104","TCP","54","43436 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21323","9.708792","172.30.1.205","172.30.1.104","TCP","74","36074 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912935 TSecr=0 WS=128" "21324","9.708994","172.30.1.104","172.30.1.205","TCP","54","135 > 43436 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21325","9.709005","172.30.1.104","172.30.1.205","TCP","54","135 > 43436 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21326","9.709010","172.30.1.205","172.30.1.104","TCP","54","43436 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21327","9.709084","172.30.1.104","172.30.1.205","TCP","66","49671 > 36074 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21328","9.709092","172.30.1.205","172.30.1.104","TCP","54","36074 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21329","9.709434","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21330","9.709752","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21331","9.709760","172.30.1.205","172.30.1.104","TCP","54","36074 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21332","9.711603","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21333","9.712030","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21334","9.712036","172.30.1.205","172.30.1.104","TCP","54","36074 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21335","9.713402","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21336","9.715316","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21337","9.715325","172.30.1.205","172.30.1.104","TCP","54","36074 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21338","9.716247","172.30.1.205","172.30.1.104","TCP","74","43440 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912942 TSecr=0 WS=128" "21339","9.716559","172.30.1.104","172.30.1.205","TCP","66","135 > 43440 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21340","9.716579","172.30.1.205","172.30.1.104","TCP","54","43440 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21341","9.717166","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21342","9.717576","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21343","9.717585","172.30.1.205","172.30.1.104","TCP","54","43440 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21344","9.719764","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21345","9.720183","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21346","9.720189","172.30.1.205","172.30.1.104","TCP","54","43440 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21347","9.722008","172.30.1.205","172.30.1.104","TCP","54","43440 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21348","9.722117","172.30.1.205","172.30.1.104","TCP","74","36078 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912948 TSecr=0 WS=128" "21349","9.722375","172.30.1.104","172.30.1.205","TCP","54","135 > 43440 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21350","9.722421","172.30.1.104","172.30.1.205","TCP","66","49671 > 36078 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21351","9.722430","172.30.1.205","172.30.1.104","TCP","54","36078 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21352","9.722451","172.30.1.104","172.30.1.205","TCP","54","135 > 43440 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21353","9.722455","172.30.1.205","172.30.1.104","TCP","54","43440 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21354","9.722804","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21355","9.723108","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21356","9.723117","172.30.1.205","172.30.1.104","TCP","54","36078 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21357","9.725009","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21358","9.725382","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21359","9.725388","172.30.1.205","172.30.1.104","TCP","54","36078 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21360","9.726720","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21361","9.728762","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21362","9.728771","172.30.1.205","172.30.1.104","TCP","54","36078 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21363","9.729716","172.30.1.205","172.30.1.104","TCP","74","43444 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912956 TSecr=0 WS=128" "21364","9.730034","172.30.1.104","172.30.1.205","TCP","66","135 > 43444 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21365","9.730044","172.30.1.205","172.30.1.104","TCP","54","43444 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21366","9.730391","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21367","9.730776","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21368","9.730785","172.30.1.205","172.30.1.104","TCP","54","43444 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21369","9.733013","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21370","9.733452","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21371","9.733459","172.30.1.205","172.30.1.104","TCP","54","43444 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21372","9.735288","172.30.1.205","172.30.1.104","TCP","54","43444 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21373","9.735395","172.30.1.205","172.30.1.104","TCP","74","36082 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912961 TSecr=0 WS=128" "21374","9.735573","172.30.1.104","172.30.1.205","TCP","54","135 > 43444 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21375","9.735600","172.30.1.104","172.30.1.205","TCP","54","135 > 43444 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21376","9.735605","172.30.1.205","172.30.1.104","TCP","54","43444 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21377","9.735719","172.30.1.104","172.30.1.205","TCP","66","49671 > 36082 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21378","9.735727","172.30.1.205","172.30.1.104","TCP","54","36082 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21379","9.736072","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21380","9.736409","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21381","9.736418","172.30.1.205","172.30.1.104","TCP","54","36082 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21382","9.738666","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21383","9.739101","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21384","9.739108","172.30.1.205","172.30.1.104","TCP","54","36082 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21385","9.740468","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21386","9.742469","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21387","9.742478","172.30.1.205","172.30.1.104","TCP","54","36082 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21388","9.743418","172.30.1.205","172.30.1.104","TCP","74","43448 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912969 TSecr=0 WS=128" "21389","9.743846","172.30.1.104","172.30.1.205","TCP","66","135 > 43448 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21390","9.743856","172.30.1.205","172.30.1.104","TCP","54","43448 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21391","9.744202","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21392","9.744572","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21393","9.744580","172.30.1.205","172.30.1.104","TCP","54","43448 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21394","9.746759","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21395","9.747155","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21396","9.747161","172.30.1.205","172.30.1.104","TCP","54","43448 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21397","9.748980","172.30.1.205","172.30.1.104","TCP","54","43448 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21398","9.749089","172.30.1.205","172.30.1.104","TCP","74","36086 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912975 TSecr=0 WS=128" "21399","9.749286","172.30.1.104","172.30.1.205","TCP","54","135 > 43448 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21400","9.749358","172.30.1.104","172.30.1.205","TCP","54","135 > 43448 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21401","9.749363","172.30.1.205","172.30.1.104","TCP","54","43448 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21402","9.749475","172.30.1.104","172.30.1.205","TCP","66","49671 > 36086 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21403","9.749483","172.30.1.205","172.30.1.104","TCP","54","36086 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21404","9.749830","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21405","9.750338","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21406","9.750347","172.30.1.205","172.30.1.104","TCP","54","36086 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21407","9.752216","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21408","9.752606","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21409","9.752612","172.30.1.205","172.30.1.104","TCP","54","36086 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21410","9.753976","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21411","9.756012","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21412","9.756039","172.30.1.205","172.30.1.104","TCP","54","36086 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21413","9.756999","172.30.1.205","172.30.1.104","TCP","74","43452 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912983 TSecr=0 WS=128" "21414","9.757370","172.30.1.104","172.30.1.205","TCP","66","135 > 43452 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21415","9.757380","172.30.1.205","172.30.1.104","TCP","54","43452 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21416","9.757731","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21417","9.758057","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21418","9.758065","172.30.1.205","172.30.1.104","TCP","54","43452 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21419","9.760236","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21420","9.760674","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21421","9.760680","172.30.1.205","172.30.1.104","TCP","54","43452 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21422","9.762510","172.30.1.205","172.30.1.104","TCP","54","43452 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21423","9.762619","172.30.1.205","172.30.1.104","TCP","74","36090 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912989 TSecr=0 WS=128" "21424","9.762810","172.30.1.104","172.30.1.205","TCP","54","135 > 43452 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21425","9.762841","172.30.1.104","172.30.1.205","TCP","54","135 > 43452 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21426","9.762847","172.30.1.205","172.30.1.104","TCP","54","43452 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21427","9.762964","172.30.1.104","172.30.1.205","TCP","66","49671 > 36090 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21428","9.762972","172.30.1.205","172.30.1.104","TCP","54","36090 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21429","9.763317","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21430","9.763660","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21431","9.763668","172.30.1.205","172.30.1.104","TCP","54","36090 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21432","9.765557","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21433","9.765979","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21434","9.765985","172.30.1.205","172.30.1.104","TCP","54","36090 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21435","9.767355","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21436","9.769403","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21437","9.769412","172.30.1.205","172.30.1.104","TCP","54","36090 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21438","9.770363","172.30.1.205","172.30.1.104","TCP","74","43456 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499912996 TSecr=0 WS=128" "21439","9.770671","172.30.1.104","172.30.1.205","TCP","66","135 > 43456 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21440","9.770681","172.30.1.205","172.30.1.104","TCP","54","43456 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21441","9.771029","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21442","9.771351","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21443","9.771360","172.30.1.205","172.30.1.104","TCP","54","43456 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21444","9.773570","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21445","9.773970","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21446","9.773977","172.30.1.205","172.30.1.104","TCP","54","43456 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21447","9.775792","172.30.1.205","172.30.1.104","TCP","54","43456 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21448","9.775912","172.30.1.205","172.30.1.104","TCP","74","36094 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913002 TSecr=0 WS=128" "21449","9.776088","172.30.1.104","172.30.1.205","TCP","54","135 > 43456 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21450","9.776120","172.30.1.104","172.30.1.205","TCP","54","135 > 43456 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21451","9.776125","172.30.1.205","172.30.1.104","TCP","54","43456 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21452","9.776226","172.30.1.104","172.30.1.205","TCP","66","49671 > 36094 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21453","9.776234","172.30.1.205","172.30.1.104","TCP","54","36094 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21454","9.776574","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21455","9.776881","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21456","9.776890","172.30.1.205","172.30.1.104","TCP","54","36094 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21457","9.778753","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21458","9.779194","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21459","9.779199","172.30.1.205","172.30.1.104","TCP","54","36094 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21460","9.780544","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21461","9.782560","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21462","9.782569","172.30.1.205","172.30.1.104","TCP","54","36094 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21463","9.783507","172.30.1.205","172.30.1.104","TCP","74","43460 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913009 TSecr=0 WS=128" "21464","9.783837","172.30.1.104","172.30.1.205","TCP","66","135 > 43460 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21465","9.783847","172.30.1.205","172.30.1.104","TCP","54","43460 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21466","9.784201","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21467","9.784511","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21468","9.784519","172.30.1.205","172.30.1.104","TCP","54","43460 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21469","9.786714","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21470","9.787123","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21471","9.787129","172.30.1.205","172.30.1.104","TCP","54","43460 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21472","9.788949","172.30.1.205","172.30.1.104","TCP","54","43460 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21473","9.789057","172.30.1.205","172.30.1.104","TCP","74","36098 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913015 TSecr=0 WS=128" "21474","9.789284","172.30.1.104","172.30.1.205","TCP","54","135 > 43460 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21475","9.789315","172.30.1.104","172.30.1.205","TCP","66","49671 > 36098 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21476","9.789323","172.30.1.205","172.30.1.104","TCP","54","36098 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21477","9.789345","172.30.1.104","172.30.1.205","TCP","54","135 > 43460 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21478","9.789349","172.30.1.205","172.30.1.104","TCP","54","43460 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21479","9.789686","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21480","9.790009","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21481","9.790018","172.30.1.205","172.30.1.104","TCP","54","36098 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21482","9.791868","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21483","9.792236","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21484","9.792242","172.30.1.205","172.30.1.104","TCP","54","36098 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21485","9.793621","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21486","9.795610","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21487","9.795619","172.30.1.205","172.30.1.104","TCP","54","36098 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21488","9.796550","172.30.1.205","172.30.1.104","TCP","74","43464 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913022 TSecr=0 WS=128" "21489","9.796854","172.30.1.104","172.30.1.205","TCP","66","135 > 43464 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21490","9.796864","172.30.1.205","172.30.1.104","TCP","54","43464 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21491","9.797217","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21492","9.797524","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21493","9.797532","172.30.1.205","172.30.1.104","TCP","54","43464 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21494","9.799704","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21495","9.800125","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21496","9.800132","172.30.1.205","172.30.1.104","TCP","54","43464 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21497","9.801958","172.30.1.205","172.30.1.104","TCP","54","43464 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21498","9.802067","172.30.1.205","172.30.1.104","TCP","74","36102 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913028 TSecr=0 WS=128" "21499","9.802213","172.30.1.104","172.30.1.205","TCP","54","135 > 43464 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21500","9.802240","172.30.1.104","172.30.1.205","TCP","54","135 > 43464 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21501","9.802245","172.30.1.205","172.30.1.104","TCP","54","43464 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21502","9.802350","172.30.1.104","172.30.1.205","TCP","66","49671 > 36102 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21503","9.802358","172.30.1.205","172.30.1.104","TCP","54","36102 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21504","9.802710","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21505","9.802992","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21506","9.803001","172.30.1.205","172.30.1.104","TCP","54","36102 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21507","9.804868","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21508","9.805241","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21509","9.805249","172.30.1.205","172.30.1.104","TCP","54","36102 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21510","9.806627","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21511","9.808677","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21512","9.808686","172.30.1.205","172.30.1.104","TCP","54","36102 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21513","9.809642","172.30.1.205","172.30.1.104","TCP","74","43468 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913036 TSecr=0 WS=128" "21514","9.809964","172.30.1.104","172.30.1.205","TCP","66","135 > 43468 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21515","9.809974","172.30.1.205","172.30.1.104","TCP","54","43468 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21516","9.810328","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21517","9.810641","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21518","9.810649","172.30.1.205","172.30.1.104","TCP","54","43468 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21519","9.812843","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21520","9.813208","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21521","9.813214","172.30.1.205","172.30.1.104","TCP","54","43468 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21522","9.815022","172.30.1.205","172.30.1.104","TCP","54","43468 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21523","9.815130","172.30.1.205","172.30.1.104","TCP","74","36106 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913041 TSecr=0 WS=128" "21524","9.815295","172.30.1.104","172.30.1.205","TCP","54","135 > 43468 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21525","9.815322","172.30.1.104","172.30.1.205","TCP","54","135 > 43468 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21526","9.815327","172.30.1.205","172.30.1.104","TCP","54","43468 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21527","9.815409","172.30.1.104","172.30.1.205","TCP","66","49671 > 36106 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21528","9.815418","172.30.1.205","172.30.1.104","TCP","54","36106 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21529","9.815765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21530","9.816100","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21531","9.816108","172.30.1.205","172.30.1.104","TCP","54","36106 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21532","9.818013","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21533","9.818364","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21534","9.818370","172.30.1.205","172.30.1.104","TCP","54","36106 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21535","9.819707","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21536","9.821672","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21537","9.821681","172.30.1.205","172.30.1.104","TCP","54","36106 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21538","9.822610","172.30.1.205","172.30.1.104","TCP","74","43472 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913049 TSecr=0 WS=128" "21539","9.822969","172.30.1.104","172.30.1.205","TCP","66","135 > 43472 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21540","9.822979","172.30.1.205","172.30.1.104","TCP","54","43472 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21541","9.823327","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21542","9.823656","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21543","9.823665","172.30.1.205","172.30.1.104","TCP","54","43472 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21544","9.825902","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21545","9.826314","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21546","9.826320","172.30.1.205","172.30.1.104","TCP","54","43472 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21547","9.828160","172.30.1.205","172.30.1.104","TCP","54","43472 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21548","9.828273","172.30.1.205","172.30.1.104","TCP","74","36110 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913054 TSecr=0 WS=128" "21549","9.828434","172.30.1.104","172.30.1.205","TCP","54","135 > 43472 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21550","9.828454","172.30.1.104","172.30.1.205","TCP","54","135 > 43472 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21551","9.828460","172.30.1.205","172.30.1.104","TCP","54","43472 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21552","9.828591","172.30.1.104","172.30.1.205","TCP","66","49671 > 36110 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21553","9.828605","172.30.1.205","172.30.1.104","TCP","54","36110 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21554","9.828979","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21555","9.829328","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21556","9.829343","172.30.1.205","172.30.1.104","TCP","54","36110 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21557","9.831333","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21558","9.833357","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21559","9.833371","172.30.1.205","172.30.1.104","TCP","54","36110 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21560","9.834787","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21561","9.836856","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21562","9.836875","172.30.1.205","172.30.1.104","TCP","54","36110 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21563","9.838051","172.30.1.205","172.30.1.104","TCP","74","43476 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913064 TSecr=0 WS=128" "21564","9.838396","172.30.1.104","172.30.1.205","TCP","66","135 > 43476 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21565","9.838408","172.30.1.205","172.30.1.104","TCP","54","43476 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21566","9.838758","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21567","9.839098","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21568","9.839107","172.30.1.205","172.30.1.104","TCP","54","43476 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21569","9.841319","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21570","9.841737","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21571","9.841744","172.30.1.205","172.30.1.104","TCP","54","43476 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21572","9.843619","172.30.1.205","172.30.1.104","TCP","54","43476 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21573","9.843744","172.30.1.205","172.30.1.104","TCP","74","36114 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913070 TSecr=0 WS=128" "21574","9.843945","172.30.1.104","172.30.1.205","TCP","54","135 > 43476 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21575","9.843973","172.30.1.104","172.30.1.205","TCP","54","135 > 43476 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21576","9.843979","172.30.1.205","172.30.1.104","TCP","54","43476 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21577","9.844022","172.30.1.104","172.30.1.205","TCP","66","49671 > 36114 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21578","9.844030","172.30.1.205","172.30.1.104","TCP","54","36114 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21579","9.844380","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21580","9.844716","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21581","9.844725","172.30.1.205","172.30.1.104","TCP","54","36114 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21582","9.846616","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21583","9.847027","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21584","9.847031","172.30.1.205","172.30.1.104","TCP","54","36114 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21585","9.848392","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21586","9.850476","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21587","9.850486","172.30.1.205","172.30.1.104","TCP","54","36114 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21588","9.851431","172.30.1.205","172.30.1.104","TCP","74","43480 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913077 TSecr=0 WS=128" "21589","9.851774","172.30.1.104","172.30.1.205","TCP","66","135 > 43480 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21590","9.851795","172.30.1.205","172.30.1.104","TCP","54","43480 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21591","9.852337","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21592","9.852662","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21593","9.852672","172.30.1.205","172.30.1.104","TCP","54","43480 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21594","9.854876","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21595","9.855305","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21596","9.855312","172.30.1.205","172.30.1.104","TCP","54","43480 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21597","9.856158","172.30.1.205","172.30.1.104","TCP","54","36074 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21598","9.856207","172.30.1.205","172.30.1.104","TCP","54","36078 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21599","9.856234","172.30.1.205","172.30.1.104","TCP","54","36082 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21600","9.856267","172.30.1.205","172.30.1.104","TCP","54","36086 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21601","9.856295","172.30.1.205","172.30.1.104","TCP","54","36090 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21602","9.856318","172.30.1.205","172.30.1.104","TCP","54","36094 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21603","9.856345","172.30.1.205","172.30.1.104","TCP","54","36098 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21604","9.856372","172.30.1.205","172.30.1.104","TCP","54","36102 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21605","9.856399","172.30.1.205","172.30.1.104","TCP","54","36106 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21606","9.856426","172.30.1.205","172.30.1.104","TCP","54","36110 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21607","9.856448","172.30.1.205","172.30.1.104","TCP","54","36114 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21608","9.856519","172.30.1.104","172.30.1.205","TCP","54","49671 > 36074 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21609","9.856534","172.30.1.205","172.30.1.104","TCP","54","36070 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21610","9.856655","172.30.1.104","172.30.1.205","TCP","54","49671 > 36078 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21611","9.856677","172.30.1.104","172.30.1.205","TCP","54","49671 > 36082 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21612","9.856702","172.30.1.104","172.30.1.205","TCP","54","49671 > 36074 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21613","9.856709","172.30.1.205","172.30.1.104","TCP","54","36074 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21614","9.856729","172.30.1.104","172.30.1.205","TCP","54","49671 > 36078 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21615","9.856732","172.30.1.205","172.30.1.104","TCP","54","36078 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21616","9.856757","172.30.1.104","172.30.1.205","TCP","54","49671 > 36086 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21617","9.856894","172.30.1.104","172.30.1.205","TCP","54","49671 > 36090 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21618","9.856922","172.30.1.104","172.30.1.205","TCP","54","49671 > 36094 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21619","9.856952","172.30.1.104","172.30.1.205","TCP","54","49671 > 36082 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21620","9.856958","172.30.1.205","172.30.1.104","TCP","54","36082 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21621","9.856981","172.30.1.104","172.30.1.205","TCP","54","49671 > 36094 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21622","9.856985","172.30.1.205","172.30.1.104","TCP","54","36094 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21623","9.857012","172.30.1.104","172.30.1.205","TCP","54","49671 > 36086 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21624","9.857016","172.30.1.205","172.30.1.104","TCP","54","36086 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21625","9.857038","172.30.1.104","172.30.1.205","TCP","54","49671 > 36090 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21626","9.857041","172.30.1.205","172.30.1.104","TCP","54","36090 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21627","9.857065","172.30.1.104","172.30.1.205","TCP","54","49671 > 36098 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21628","9.857095","172.30.1.104","172.30.1.205","TCP","54","49671 > 36102 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21629","9.857124","172.30.1.104","172.30.1.205","TCP","54","49671 > 36106 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21630","9.857171","172.30.1.104","172.30.1.205","TCP","54","49671 > 36098 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21631","9.857175","172.30.1.205","172.30.1.104","TCP","54","36098 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21632","9.857200","172.30.1.104","172.30.1.205","TCP","54","49671 > 36110 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21633","9.857228","172.30.1.104","172.30.1.205","TCP","54","49671 > 36114 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21634","9.857256","172.30.1.104","172.30.1.205","TCP","54","49671 > 36110 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21635","9.857260","172.30.1.205","172.30.1.104","TCP","54","36110 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21636","9.857287","172.30.1.104","172.30.1.205","TCP","54","49671 > 36114 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21637","9.857290","172.30.1.205","172.30.1.104","TCP","54","36114 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21638","9.857315","172.30.1.104","172.30.1.205","TCP","54","49671 > 36102 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21639","9.857318","172.30.1.205","172.30.1.104","TCP","54","36102 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21640","9.857342","172.30.1.104","172.30.1.205","TCP","54","49671 > 36106 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21641","9.857345","172.30.1.205","172.30.1.104","TCP","54","36106 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21642","9.857371","172.30.1.104","172.30.1.205","TCP","54","49671 > 36070 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21643","9.857851","172.30.1.104","172.30.1.205","TCP","54","49671 > 36070 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21644","9.857857","172.30.1.205","172.30.1.104","TCP","54","36070 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21645","9.858199","172.30.1.205","172.30.1.104","TCP","54","43480 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21646","9.858319","172.30.1.205","172.30.1.104","TCP","74","36118 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913084 TSecr=0 WS=128" "21647","9.858471","172.30.1.104","172.30.1.205","TCP","54","135 > 43480 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21648","9.858485","172.30.1.104","172.30.1.205","TCP","54","135 > 43480 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21649","9.858490","172.30.1.205","172.30.1.104","TCP","54","43480 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21650","9.858622","172.30.1.104","172.30.1.205","TCP","66","49671 > 36118 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21651","9.858630","172.30.1.205","172.30.1.104","TCP","54","36118 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21652","9.858986","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21653","9.859293","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21654","9.859302","172.30.1.205","172.30.1.104","TCP","54","36118 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21655","9.861230","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21656","9.862118","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21657","9.862125","172.30.1.205","172.30.1.104","TCP","54","36118 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21658","9.863484","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21659","9.865599","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21660","9.865608","172.30.1.205","172.30.1.104","TCP","54","36118 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21661","9.866569","172.30.1.205","172.30.1.104","TCP","74","43484 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913092 TSecr=0 WS=128" "21662","9.866883","172.30.1.104","172.30.1.205","TCP","66","135 > 43484 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21663","9.866894","172.30.1.205","172.30.1.104","TCP","54","43484 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21664","9.867245","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21665","9.867549","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21666","9.867557","172.30.1.205","172.30.1.104","TCP","54","43484 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21667","9.869766","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21668","9.870170","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21669","9.870178","172.30.1.205","172.30.1.104","TCP","54","43484 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21670","9.872024","172.30.1.205","172.30.1.104","TCP","54","43484 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21671","9.872140","172.30.1.205","172.30.1.104","TCP","74","36122 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913098 TSecr=0 WS=128" "21672","9.872395","172.30.1.104","172.30.1.205","TCP","54","135 > 43484 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21673","9.872407","172.30.1.104","172.30.1.205","TCP","54","135 > 43484 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21674","9.872420","172.30.1.205","172.30.1.104","TCP","54","43484 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21675","9.872458","172.30.1.104","172.30.1.205","TCP","66","49671 > 36122 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21676","9.872466","172.30.1.205","172.30.1.104","TCP","54","36122 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21677","9.872837","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21678","9.873789","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21679","9.873797","172.30.1.205","172.30.1.104","TCP","54","36122 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21680","9.875665","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21681","9.876078","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21682","9.876085","172.30.1.205","172.30.1.104","TCP","54","36122 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21683","9.877469","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21684","9.879549","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21685","9.879559","172.30.1.205","172.30.1.104","TCP","54","36122 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21686","9.880502","172.30.1.205","172.30.1.104","TCP","74","43488 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913106 TSecr=0 WS=128" "21687","9.880838","172.30.1.104","172.30.1.205","TCP","66","135 > 43488 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21688","9.880849","172.30.1.205","172.30.1.104","TCP","54","43488 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21689","9.881212","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21690","9.881531","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21691","9.881541","172.30.1.205","172.30.1.104","TCP","54","43488 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21692","9.883738","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21693","9.884152","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21694","9.884158","172.30.1.205","172.30.1.104","TCP","54","43488 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21695","9.885996","172.30.1.205","172.30.1.104","TCP","54","43488 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21696","9.886108","172.30.1.205","172.30.1.104","TCP","74","36126 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913112 TSecr=0 WS=128" "21697","9.886313","172.30.1.104","172.30.1.205","TCP","54","135 > 43488 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21698","9.886369","172.30.1.104","172.30.1.205","TCP","54","135 > 43488 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21699","9.886374","172.30.1.205","172.30.1.104","TCP","54","43488 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21700","9.886476","172.30.1.104","172.30.1.205","TCP","66","49671 > 36126 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21701","9.886484","172.30.1.205","172.30.1.104","TCP","54","36126 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21702","9.886833","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21703","9.887194","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21704","9.887203","172.30.1.205","172.30.1.104","TCP","54","36126 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21705","9.889120","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21706","9.889547","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21707","9.889560","172.30.1.205","172.30.1.104","TCP","54","36126 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21708","9.891142","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21709","9.893218","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21710","9.893227","172.30.1.205","172.30.1.104","TCP","54","36126 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21711","9.894201","172.30.1.205","172.30.1.104","TCP","74","43492 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913120 TSecr=0 WS=128" "21712","9.894515","172.30.1.104","172.30.1.205","TCP","66","135 > 43492 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21713","9.894526","172.30.1.205","172.30.1.104","TCP","54","43492 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21714","9.894880","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21715","9.895193","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21716","9.895201","172.30.1.205","172.30.1.104","TCP","54","43492 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21717","9.897431","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21718","9.897852","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21719","9.897858","172.30.1.205","172.30.1.104","TCP","54","43492 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21720","9.899683","172.30.1.205","172.30.1.104","TCP","54","43492 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21721","9.899794","172.30.1.205","172.30.1.104","TCP","74","36130 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913126 TSecr=0 WS=128" "21722","9.900001","172.30.1.104","172.30.1.205","TCP","54","135 > 43492 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21723","9.900029","172.30.1.104","172.30.1.205","TCP","54","135 > 43492 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21724","9.900034","172.30.1.205","172.30.1.104","TCP","54","43492 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21725","9.900120","172.30.1.104","172.30.1.205","TCP","66","49671 > 36130 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21726","9.900128","172.30.1.205","172.30.1.104","TCP","54","36130 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21727","9.900483","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21728","9.900792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21729","9.900802","172.30.1.205","172.30.1.104","TCP","54","36130 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21730","9.902701","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21731","9.903081","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21732","9.903088","172.30.1.205","172.30.1.104","TCP","54","36130 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21733","9.904441","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21734","9.906966","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21735","9.906977","172.30.1.205","172.30.1.104","TCP","54","36130 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21736","9.907936","172.30.1.205","172.30.1.104","TCP","74","43496 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913134 TSecr=0 WS=128" "21737","9.908262","172.30.1.104","172.30.1.205","TCP","66","135 > 43496 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21738","9.908273","172.30.1.205","172.30.1.104","TCP","54","43496 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21739","9.908623","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21740","9.908946","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21741","9.908956","172.30.1.205","172.30.1.104","TCP","54","43496 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21742","9.911172","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21743","9.911573","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21744","9.911579","172.30.1.205","172.30.1.104","TCP","54","43496 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21745","9.913427","172.30.1.205","172.30.1.104","TCP","54","43496 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21746","9.913544","172.30.1.205","172.30.1.104","TCP","74","36134 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913139 TSecr=0 WS=128" "21747","9.913719","172.30.1.104","172.30.1.205","TCP","54","135 > 43496 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21748","9.913742","172.30.1.104","172.30.1.205","TCP","54","135 > 43496 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21749","9.913748","172.30.1.205","172.30.1.104","TCP","54","43496 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21750","9.913858","172.30.1.104","172.30.1.205","TCP","66","49671 > 36134 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21751","9.913875","172.30.1.205","172.30.1.104","TCP","54","36134 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21752","9.914282","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21753","9.914600","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21754","9.914608","172.30.1.205","172.30.1.104","TCP","54","36134 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21755","9.916524","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21756","9.916929","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21757","9.916937","172.30.1.205","172.30.1.104","TCP","54","36134 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21758","9.918313","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21759","9.920402","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21760","9.920414","172.30.1.205","172.30.1.104","TCP","54","36134 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21761","9.921466","172.30.1.205","172.30.1.104","TCP","74","43500 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913147 TSecr=0 WS=128" "21762","9.921793","172.30.1.104","172.30.1.205","TCP","66","135 > 43500 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21763","9.921811","172.30.1.205","172.30.1.104","TCP","54","43500 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21764","9.922224","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21765","9.922524","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21766","9.922535","172.30.1.205","172.30.1.104","TCP","54","43500 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21767","9.924826","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21768","9.925217","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21769","9.925224","172.30.1.205","172.30.1.104","TCP","54","43500 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21770","9.927084","172.30.1.205","172.30.1.104","TCP","54","43500 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21771","9.927226","172.30.1.205","172.30.1.104","TCP","74","36138 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913153 TSecr=0 WS=128" "21772","9.927385","172.30.1.104","172.30.1.205","TCP","54","135 > 43500 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21773","9.927397","172.30.1.104","172.30.1.205","TCP","54","135 > 43500 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21774","9.927404","172.30.1.205","172.30.1.104","TCP","54","43500 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21775","9.927479","172.30.1.104","172.30.1.205","TCP","66","49671 > 36138 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21776","9.927488","172.30.1.205","172.30.1.104","TCP","54","36138 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21777","9.927841","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21778","9.928129","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21779","9.928135","172.30.1.205","172.30.1.104","TCP","54","36138 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21780","9.930077","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21781","9.930449","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21782","9.930455","172.30.1.205","172.30.1.104","TCP","54","36138 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21783","9.931832","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21784","9.934460","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21785","9.934471","172.30.1.205","172.30.1.104","TCP","54","36138 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21786","9.935479","172.30.1.205","172.30.1.104","TCP","74","43504 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913161 TSecr=0 WS=128" "21787","9.935810","172.30.1.104","172.30.1.205","TCP","66","135 > 43504 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21788","9.935822","172.30.1.205","172.30.1.104","TCP","54","43504 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21789","9.936171","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21790","9.936475","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21791","9.936484","172.30.1.205","172.30.1.104","TCP","54","43504 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21792","9.938728","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21793","9.939137","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21794","9.939144","172.30.1.205","172.30.1.104","TCP","54","43504 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21795","9.940992","172.30.1.205","172.30.1.104","TCP","54","43504 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21796","9.941106","172.30.1.205","172.30.1.104","TCP","74","36142 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913167 TSecr=0 WS=128" "21797","9.941268","172.30.1.104","172.30.1.205","TCP","54","135 > 43504 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21798","9.941294","172.30.1.104","172.30.1.205","TCP","54","135 > 43504 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21799","9.941300","172.30.1.205","172.30.1.104","TCP","54","43504 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21800","9.941408","172.30.1.104","172.30.1.205","TCP","66","49671 > 36142 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21801","9.941416","172.30.1.205","172.30.1.104","TCP","54","36142 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21802","9.941768","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21803","9.942064","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21804","9.942073","172.30.1.205","172.30.1.104","TCP","54","36142 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21805","9.943958","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21806","9.944325","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21807","9.944332","172.30.1.205","172.30.1.104","TCP","54","36142 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21808","9.945720","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21809","9.947745","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21810","9.947757","172.30.1.205","172.30.1.104","TCP","54","36142 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21811","9.948727","172.30.1.205","172.30.1.104","TCP","74","43508 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913175 TSecr=0 WS=128" "21812","9.949033","172.30.1.104","172.30.1.205","TCP","66","135 > 43508 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21813","9.949044","172.30.1.205","172.30.1.104","TCP","54","43508 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21814","9.949405","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21815","9.949712","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21816","9.949721","172.30.1.205","172.30.1.104","TCP","54","43508 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21817","9.951976","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21818","9.952406","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21819","9.952412","172.30.1.205","172.30.1.104","TCP","54","43508 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21820","9.954332","172.30.1.205","172.30.1.104","TCP","54","43508 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21821","9.954453","172.30.1.205","172.30.1.104","TCP","74","36146 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913180 TSecr=0 WS=128" "21822","9.954624","172.30.1.104","172.30.1.205","TCP","54","135 > 43508 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21823","9.954635","172.30.1.104","172.30.1.205","TCP","54","135 > 43508 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21824","9.954651","172.30.1.205","172.30.1.104","TCP","54","43508 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21825","9.954765","172.30.1.104","172.30.1.205","TCP","66","49671 > 36146 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21826","9.954774","172.30.1.205","172.30.1.104","TCP","54","36146 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21827","9.955163","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21828","9.955453","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21829","9.955460","172.30.1.205","172.30.1.104","TCP","54","36146 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21830","9.957389","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21831","9.957757","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21832","9.957764","172.30.1.205","172.30.1.104","TCP","54","36146 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21833","9.959124","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21834","9.961230","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21835","9.961240","172.30.1.205","172.30.1.104","TCP","54","36146 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21836","9.962196","172.30.1.205","172.30.1.104","TCP","74","43512 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913188 TSecr=0 WS=128" "21837","9.962535","172.30.1.104","172.30.1.205","TCP","66","135 > 43512 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21838","9.962548","172.30.1.205","172.30.1.104","TCP","54","43512 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21839","9.962907","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21840","9.963229","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21841","9.963239","172.30.1.205","172.30.1.104","TCP","54","43512 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21842","9.965456","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21843","9.965837","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21844","9.965844","172.30.1.205","172.30.1.104","TCP","54","43512 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21845","9.967663","172.30.1.205","172.30.1.104","TCP","54","43512 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21846","9.967777","172.30.1.205","172.30.1.104","TCP","74","36150 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913194 TSecr=0 WS=128" "21847","9.967952","172.30.1.104","172.30.1.205","TCP","54","135 > 43512 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21848","9.967998","172.30.1.104","172.30.1.205","TCP","54","135 > 43512 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21849","9.968004","172.30.1.205","172.30.1.104","TCP","54","43512 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21850","9.968089","172.30.1.104","172.30.1.205","TCP","66","49671 > 36150 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21851","9.968097","172.30.1.205","172.30.1.104","TCP","54","36150 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21852","9.968449","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21853","9.968733","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21854","9.968742","172.30.1.205","172.30.1.104","TCP","54","36150 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21855","9.970660","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21856","9.971028","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21857","9.971034","172.30.1.205","172.30.1.104","TCP","54","36150 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21858","9.972389","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21859","9.974419","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21860","9.974429","172.30.1.205","172.30.1.104","TCP","54","36150 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21861","9.975405","172.30.1.205","172.30.1.104","TCP","74","43516 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913201 TSecr=0 WS=128" "21862","9.975744","172.30.1.104","172.30.1.205","TCP","66","135 > 43516 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21863","9.975756","172.30.1.205","172.30.1.104","TCP","54","43516 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21864","9.976107","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21865","9.976389","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21866","9.976397","172.30.1.205","172.30.1.104","TCP","54","43516 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21867","9.978653","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21868","9.979066","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21869","9.979074","172.30.1.205","172.30.1.104","TCP","54","43516 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21870","9.980941","172.30.1.205","172.30.1.104","TCP","54","43516 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21871","9.981102","172.30.1.205","172.30.1.104","TCP","74","36154 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913207 TSecr=0 WS=128" "21872","9.981240","172.30.1.104","172.30.1.205","TCP","54","135 > 43516 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21873","9.981253","172.30.1.104","172.30.1.205","TCP","54","135 > 43516 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21874","9.981261","172.30.1.205","172.30.1.104","TCP","54","43516 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21875","9.981392","172.30.1.104","172.30.1.205","TCP","66","49671 > 36154 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21876","9.981402","172.30.1.205","172.30.1.104","TCP","54","36154 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21877","9.981765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21878","9.982072","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21879","9.982082","172.30.1.205","172.30.1.104","TCP","54","36154 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21880","9.984005","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21881","9.984372","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21882","9.984380","172.30.1.205","172.30.1.104","TCP","54","36154 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21883","9.985799","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21884","9.987957","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21885","9.987967","172.30.1.205","172.30.1.104","TCP","54","36154 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21886","9.989022","172.30.1.205","172.30.1.104","TCP","74","43520 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913215 TSecr=0 WS=128" "21887","9.989360","172.30.1.104","172.30.1.205","TCP","66","135 > 43520 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21888","9.989373","172.30.1.205","172.30.1.104","TCP","54","43520 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21889","9.989736","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21890","9.990118","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21891","9.990127","172.30.1.205","172.30.1.104","TCP","54","43520 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21892","9.992369","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21893","9.992847","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21894","9.992855","172.30.1.205","172.30.1.104","TCP","54","43520 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21895","9.994708","172.30.1.205","172.30.1.104","TCP","54","43520 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21896","9.994855","172.30.1.205","172.30.1.104","TCP","74","36158 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913221 TSecr=0 WS=128" "21897","9.995016","172.30.1.104","172.30.1.205","TCP","54","135 > 43520 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21898","9.995042","172.30.1.104","172.30.1.205","TCP","54","135 > 43520 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21899","9.995050","172.30.1.205","172.30.1.104","TCP","54","43520 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21900","9.995179","172.30.1.104","172.30.1.205","TCP","66","49671 > 36158 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21901","9.995188","172.30.1.205","172.30.1.104","TCP","54","36158 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21902","9.995542","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21903","9.995847","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21904","9.995856","172.30.1.205","172.30.1.104","TCP","54","36158 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21905","9.997835","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21906","9.998237","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21907","9.998244","172.30.1.205","172.30.1.104","TCP","54","36158 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21908","9.999642","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21909","10.002806","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21910","10.002816","172.30.1.205","172.30.1.104","TCP","54","36158 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21911","10.003870","172.30.1.205","172.30.1.104","TCP","74","43524 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913230 TSecr=0 WS=128" "21912","10.004185","172.30.1.104","172.30.1.205","TCP","66","135 > 43524 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21913","10.004198","172.30.1.205","172.30.1.104","TCP","54","43524 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21914","10.004556","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21915","10.004951","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21916","10.004965","172.30.1.205","172.30.1.104","TCP","54","43524 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21917","10.007213","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21918","10.007624","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21919","10.007631","172.30.1.205","172.30.1.104","TCP","54","43524 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21920","10.009495","172.30.1.205","172.30.1.104","TCP","54","43524 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21921","10.009641","172.30.1.205","172.30.1.104","TCP","74","36162 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913236 TSecr=0 WS=128" "21922","10.009778","172.30.1.104","172.30.1.205","TCP","54","135 > 43524 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21923","10.009872","172.30.1.104","172.30.1.205","TCP","54","135 > 43524 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21924","10.009884","172.30.1.205","172.30.1.104","TCP","54","43524 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21925","10.009978","172.30.1.104","172.30.1.205","TCP","66","49671 > 36162 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21926","10.009992","172.30.1.205","172.30.1.104","TCP","54","36162 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21927","10.010400","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "21928","10.010723","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21929","10.010737","172.30.1.205","172.30.1.104","TCP","54","36162 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21930","10.012774","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "21931","10.013176","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "21932","10.013184","172.30.1.205","172.30.1.104","TCP","54","36162 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "21933","10.014622","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "21934","10.016785","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "21935","10.016799","172.30.1.205","172.30.1.104","TCP","54","36162 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "21936","10.017872","172.30.1.205","172.30.1.104","TCP","74","43528 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913244 TSecr=0 WS=128" "21937","10.018178","172.30.1.104","172.30.1.205","TCP","66","135 > 43528 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21938","10.018191","172.30.1.205","172.30.1.104","TCP","54","43528 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "21939","10.018560","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "21940","10.018854","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "21941","10.018863","172.30.1.205","172.30.1.104","TCP","54","43528 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "21942","10.021147","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "21943","10.021560","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "21944","10.021568","172.30.1.205","172.30.1.104","TCP","54","43528 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "21945","10.022446","172.30.1.205","172.30.1.104","TCP","54","36122 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21946","10.022499","172.30.1.205","172.30.1.104","TCP","54","36126 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21947","10.022536","172.30.1.205","172.30.1.104","TCP","54","36130 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21948","10.022571","172.30.1.205","172.30.1.104","TCP","54","36134 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21949","10.022599","172.30.1.205","172.30.1.104","TCP","54","36138 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21950","10.022627","172.30.1.205","172.30.1.104","TCP","54","36142 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21951","10.022660","172.30.1.205","172.30.1.104","TCP","54","36146 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21952","10.022682","172.30.1.205","172.30.1.104","TCP","54","36150 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21953","10.022706","172.30.1.104","172.30.1.205","TCP","54","49671 > 36122 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21954","10.022733","172.30.1.205","172.30.1.104","TCP","54","36154 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21955","10.022763","172.30.1.205","172.30.1.104","TCP","54","36158 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21956","10.022791","172.30.1.205","172.30.1.104","TCP","54","36162 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21957","10.022830","172.30.1.104","172.30.1.205","TCP","54","49671 > 36126 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21958","10.022855","172.30.1.104","172.30.1.205","TCP","54","49671 > 36122 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21959","10.022865","172.30.1.205","172.30.1.104","TCP","54","36122 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21960","10.022883","172.30.1.104","172.30.1.205","TCP","54","49671 > 36126 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21961","10.022886","172.30.1.205","172.30.1.104","TCP","54","36126 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21962","10.022906","172.30.1.205","172.30.1.104","TCP","54","36118 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "21963","10.022912","172.30.1.104","172.30.1.205","TCP","54","49671 > 36130 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21964","10.022941","172.30.1.104","172.30.1.205","TCP","54","49671 > 36134 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21965","10.023056","172.30.1.104","172.30.1.205","TCP","54","49671 > 36138 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21966","10.023080","172.30.1.104","172.30.1.205","TCP","54","49671 > 36142 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21967","10.023106","172.30.1.104","172.30.1.205","TCP","54","49671 > 36130 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21968","10.023112","172.30.1.205","172.30.1.104","TCP","54","36130 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21969","10.023135","172.30.1.104","172.30.1.205","TCP","54","49671 > 36142 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21970","10.023137","172.30.1.205","172.30.1.104","TCP","54","36142 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21971","10.023163","172.30.1.104","172.30.1.205","TCP","54","49671 > 36134 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21972","10.023166","172.30.1.205","172.30.1.104","TCP","54","36134 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21973","10.023190","172.30.1.104","172.30.1.205","TCP","54","49671 > 36138 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21974","10.023193","172.30.1.205","172.30.1.104","TCP","54","36138 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21975","10.023217","172.30.1.104","172.30.1.205","TCP","54","49671 > 36146 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21976","10.023250","172.30.1.104","172.30.1.205","TCP","54","49671 > 36150 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21977","10.023278","172.30.1.104","172.30.1.205","TCP","54","49671 > 36154 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21978","10.023392","172.30.1.104","172.30.1.205","TCP","54","49671 > 36146 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21979","10.023397","172.30.1.205","172.30.1.104","TCP","54","36146 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21980","10.023420","172.30.1.104","172.30.1.205","TCP","54","49671 > 36158 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21981","10.023447","172.30.1.104","172.30.1.205","TCP","54","49671 > 36158 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21982","10.023450","172.30.1.205","172.30.1.104","TCP","54","36158 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21983","10.023473","172.30.1.104","172.30.1.205","TCP","54","49671 > 36150 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21984","10.023475","172.30.1.205","172.30.1.104","TCP","54","36150 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21985","10.023499","172.30.1.104","172.30.1.205","TCP","54","49671 > 36154 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21986","10.023501","172.30.1.205","172.30.1.104","TCP","54","36154 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21987","10.023526","172.30.1.104","172.30.1.205","TCP","54","49671 > 36162 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21988","10.023553","172.30.1.104","172.30.1.205","TCP","54","49671 > 36118 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21989","10.023579","172.30.1.104","172.30.1.205","TCP","54","49671 > 36162 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21990","10.023582","172.30.1.205","172.30.1.104","TCP","54","36162 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21991","10.023607","172.30.1.104","172.30.1.205","TCP","54","49671 > 36118 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "21992","10.023610","172.30.1.205","172.30.1.104","TCP","54","36118 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "21993","10.024467","172.30.1.205","172.30.1.104","TCP","54","43528 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "21994","10.024605","172.30.1.205","172.30.1.104","TCP","74","36166 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913251 TSecr=0 WS=128" "21995","10.024740","172.30.1.104","172.30.1.205","TCP","54","135 > 43528 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21996","10.024766","172.30.1.104","172.30.1.205","TCP","54","135 > 43528 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "21997","10.024771","172.30.1.205","172.30.1.104","TCP","54","43528 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "21998","10.025020","172.30.1.104","172.30.1.205","TCP","66","49671 > 36166 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "21999","10.025030","172.30.1.205","172.30.1.104","TCP","54","36166 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22000","10.025395","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22001","10.025694","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22002","10.025703","172.30.1.205","172.30.1.104","TCP","54","36166 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22003","10.027613","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22004","10.028009","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22005","10.028016","172.30.1.205","172.30.1.104","TCP","54","36166 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22006","10.029436","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22007","10.031611","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22008","10.031623","172.30.1.205","172.30.1.104","TCP","54","36166 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22009","10.032644","172.30.1.205","172.30.1.104","TCP","74","43532 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913259 TSecr=0 WS=128" "22010","10.032950","172.30.1.104","172.30.1.205","TCP","66","135 > 43532 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22011","10.032963","172.30.1.205","172.30.1.104","TCP","54","43532 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22012","10.033328","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22013","10.033645","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22014","10.033654","172.30.1.205","172.30.1.104","TCP","54","43532 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22015","10.035878","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22016","10.036322","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22017","10.036329","172.30.1.205","172.30.1.104","TCP","54","43532 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22018","10.038174","172.30.1.205","172.30.1.104","TCP","54","43532 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22019","10.038303","172.30.1.205","172.30.1.104","TCP","74","36170 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913264 TSecr=0 WS=128" "22020","10.038457","172.30.1.104","172.30.1.205","TCP","54","135 > 43532 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22021","10.038470","172.30.1.104","172.30.1.205","TCP","54","135 > 43532 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22022","10.038478","172.30.1.205","172.30.1.104","TCP","54","43532 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22023","10.038609","172.30.1.104","172.30.1.205","TCP","66","49671 > 36170 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22024","10.038618","172.30.1.205","172.30.1.104","TCP","54","36170 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22025","10.038989","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22026","10.039297","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22027","10.039305","172.30.1.205","172.30.1.104","TCP","54","36170 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22028","10.041198","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22029","10.041600","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22030","10.041610","172.30.1.205","172.30.1.104","TCP","54","36170 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22031","10.043040","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22032","10.045251","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22033","10.045263","172.30.1.205","172.30.1.104","TCP","54","36170 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22034","10.046306","172.30.1.205","172.30.1.104","TCP","74","43536 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913272 TSecr=0 WS=128" "22035","10.046642","172.30.1.104","172.30.1.205","TCP","66","135 > 43536 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22036","10.046654","172.30.1.205","172.30.1.104","TCP","54","43536 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22037","10.047019","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22038","10.049986","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22039","10.049995","172.30.1.205","172.30.1.104","TCP","54","43536 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22040","10.052250","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22041","10.052721","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22042","10.052729","172.30.1.205","172.30.1.104","TCP","54","43536 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22043","10.054574","172.30.1.205","172.30.1.104","TCP","54","43536 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22044","10.054710","172.30.1.205","172.30.1.104","TCP","74","36174 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913281 TSecr=0 WS=128" "22045","10.054866","172.30.1.104","172.30.1.205","TCP","54","135 > 43536 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22046","10.054879","172.30.1.104","172.30.1.205","TCP","54","135 > 43536 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22047","10.054886","172.30.1.205","172.30.1.104","TCP","54","43536 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22048","10.055004","172.30.1.104","172.30.1.205","TCP","66","49671 > 36174 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22049","10.055012","172.30.1.205","172.30.1.104","TCP","54","36174 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22050","10.055357","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22051","10.055631","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22052","10.055640","172.30.1.205","172.30.1.104","TCP","54","36174 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22053","10.057553","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22054","10.058793","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22055","10.058799","172.30.1.205","172.30.1.104","TCP","54","36174 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22056","10.060164","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22057","10.062330","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22058","10.062341","172.30.1.205","172.30.1.104","TCP","54","36174 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22059","10.063385","172.30.1.205","172.30.1.104","TCP","74","43540 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913289 TSecr=0 WS=128" "22060","10.063703","172.30.1.104","172.30.1.205","TCP","66","135 > 43540 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22061","10.063716","172.30.1.205","172.30.1.104","TCP","54","43540 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22062","10.064077","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22063","10.064378","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22064","10.064387","172.30.1.205","172.30.1.104","TCP","54","43540 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22065","10.066653","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22066","10.067083","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22067","10.067090","172.30.1.205","172.30.1.104","TCP","54","43540 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22068","10.068945","172.30.1.205","172.30.1.104","TCP","54","43540 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22069","10.069095","172.30.1.205","172.30.1.104","TCP","74","36178 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913295 TSecr=0 WS=128" "22070","10.069237","172.30.1.104","172.30.1.205","TCP","54","135 > 43540 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22071","10.069263","172.30.1.104","172.30.1.205","TCP","54","135 > 43540 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22072","10.069271","172.30.1.205","172.30.1.104","TCP","54","43540 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22073","10.069371","172.30.1.104","172.30.1.205","TCP","66","49671 > 36178 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22074","10.069380","172.30.1.205","172.30.1.104","TCP","54","36178 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22075","10.069752","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22076","10.071257","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22077","10.071268","172.30.1.205","172.30.1.104","TCP","54","36178 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22078","10.073208","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22079","10.074387","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22080","10.074399","172.30.1.205","172.30.1.104","TCP","54","36178 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22081","10.075781","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22082","10.077957","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22083","10.077968","172.30.1.205","172.30.1.104","TCP","54","36178 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22084","10.079007","172.30.1.205","172.30.1.104","TCP","74","43544 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913305 TSecr=0 WS=128" "22085","10.079342","172.30.1.104","172.30.1.205","TCP","66","135 > 43544 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22086","10.079354","172.30.1.205","172.30.1.104","TCP","54","43544 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22087","10.079705","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22088","10.080055","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22089","10.080065","172.30.1.205","172.30.1.104","TCP","54","43544 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22090","10.082321","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22091","10.082750","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22092","10.082757","172.30.1.205","172.30.1.104","TCP","54","43544 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22093","10.084578","172.30.1.205","172.30.1.104","TCP","54","43544 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22094","10.084715","172.30.1.205","172.30.1.104","TCP","74","36182 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913311 TSecr=0 WS=128" "22095","10.084889","172.30.1.104","172.30.1.205","TCP","54","135 > 43544 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22096","10.084914","172.30.1.104","172.30.1.205","TCP","54","135 > 43544 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22097","10.084922","172.30.1.205","172.30.1.104","TCP","54","43544 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22098","10.085057","172.30.1.104","172.30.1.205","TCP","66","49671 > 36182 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22099","10.085065","172.30.1.205","172.30.1.104","TCP","54","36182 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22100","10.085434","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22101","10.086088","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22102","10.086097","172.30.1.205","172.30.1.104","TCP","54","36182 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22103","10.087955","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22104","10.088386","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22105","10.088392","172.30.1.205","172.30.1.104","TCP","54","36182 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22106","10.089768","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22107","10.091926","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22108","10.091935","172.30.1.205","172.30.1.104","TCP","54","36182 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22109","10.092941","172.30.1.205","172.30.1.104","TCP","74","43548 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913319 TSecr=0 WS=128" "22110","10.093258","172.30.1.104","172.30.1.205","TCP","66","135 > 43548 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22111","10.093269","172.30.1.205","172.30.1.104","TCP","54","43548 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22112","10.093627","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22113","10.093944","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22114","10.093953","172.30.1.205","172.30.1.104","TCP","54","43548 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22115","10.096165","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22116","10.096589","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22117","10.096595","172.30.1.205","172.30.1.104","TCP","54","43548 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22118","10.098452","172.30.1.205","172.30.1.104","TCP","54","43548 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22119","10.098592","172.30.1.205","172.30.1.104","TCP","74","36186 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913325 TSecr=0 WS=128" "22120","10.098775","172.30.1.104","172.30.1.205","TCP","54","135 > 43548 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22121","10.098789","172.30.1.104","172.30.1.205","TCP","54","135 > 43548 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22122","10.098796","172.30.1.205","172.30.1.104","TCP","54","43548 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22123","10.098898","172.30.1.104","172.30.1.205","TCP","66","49671 > 36186 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22124","10.098906","172.30.1.205","172.30.1.104","TCP","54","36186 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22125","10.099259","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22126","10.099618","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22127","10.099633","172.30.1.205","172.30.1.104","TCP","54","36186 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22128","10.101647","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22129","10.102067","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22130","10.102074","172.30.1.205","172.30.1.104","TCP","54","36186 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22131","10.103471","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22132","10.105674","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22133","10.105686","172.30.1.205","172.30.1.104","TCP","54","36186 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22134","10.106718","172.30.1.205","172.30.1.104","TCP","74","43552 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913333 TSecr=0 WS=128" "22135","10.107116","172.30.1.104","172.30.1.205","TCP","66","135 > 43552 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22136","10.107129","172.30.1.205","172.30.1.104","TCP","54","43552 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22137","10.107489","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22138","10.107810","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22139","10.107820","172.30.1.205","172.30.1.104","TCP","54","43552 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22140","10.110103","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22141","10.110537","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22142","10.110544","172.30.1.205","172.30.1.104","TCP","54","43552 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22143","10.112380","172.30.1.205","172.30.1.104","TCP","54","43552 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22144","10.112503","172.30.1.205","172.30.1.104","TCP","74","36190 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913338 TSecr=0 WS=128" "22145","10.112686","172.30.1.104","172.30.1.205","TCP","54","135 > 43552 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22146","10.112711","172.30.1.104","172.30.1.205","TCP","54","135 > 43552 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22147","10.112718","172.30.1.205","172.30.1.104","TCP","54","43552 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22148","10.112841","172.30.1.104","172.30.1.205","TCP","66","49671 > 36190 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22149","10.112850","172.30.1.205","172.30.1.104","TCP","54","36190 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22150","10.113206","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22151","10.113630","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22152","10.113639","172.30.1.205","172.30.1.104","TCP","54","36190 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22153","10.115547","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22154","10.116353","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22155","10.116360","172.30.1.205","172.30.1.104","TCP","54","36190 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22156","10.117755","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22157","10.119972","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22158","10.119982","172.30.1.205","172.30.1.104","TCP","54","36190 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22159","10.120972","172.30.1.205","172.30.1.104","TCP","74","43556 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913347 TSecr=0 WS=128" "22160","10.121332","172.30.1.104","172.30.1.205","TCP","66","135 > 43556 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22161","10.121345","172.30.1.205","172.30.1.104","TCP","54","43556 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22162","10.121720","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22163","10.122062","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22164","10.122072","172.30.1.205","172.30.1.104","TCP","54","43556 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22165","10.124313","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22166","10.124759","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22167","10.124766","172.30.1.205","172.30.1.104","TCP","54","43556 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22168","10.126586","172.30.1.205","172.30.1.104","TCP","54","43556 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22169","10.126704","172.30.1.205","172.30.1.104","TCP","74","36194 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913353 TSecr=0 WS=128" "22170","10.126877","172.30.1.104","172.30.1.205","TCP","54","135 > 43556 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22171","10.126900","172.30.1.104","172.30.1.205","TCP","54","135 > 43556 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22172","10.126906","172.30.1.205","172.30.1.104","TCP","54","43556 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22173","10.127039","172.30.1.104","172.30.1.205","TCP","66","49671 > 36194 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22174","10.127047","172.30.1.205","172.30.1.104","TCP","54","36194 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22175","10.127392","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22176","10.127719","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22177","10.127728","172.30.1.205","172.30.1.104","TCP","54","36194 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22178","10.129642","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22179","10.130025","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22180","10.130032","172.30.1.205","172.30.1.104","TCP","54","36194 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22181","10.131391","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22182","10.133551","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22183","10.133560","172.30.1.205","172.30.1.104","TCP","54","36194 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22184","10.134520","172.30.1.205","172.30.1.104","TCP","74","43560 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913360 TSecr=0 WS=128" "22185","10.134866","172.30.1.104","172.30.1.205","TCP","66","135 > 43560 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22186","10.134877","172.30.1.205","172.30.1.104","TCP","54","43560 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22187","10.135228","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22188","10.135544","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22189","10.135553","172.30.1.205","172.30.1.104","TCP","54","43560 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22190","10.137777","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22191","10.138222","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22192","10.138236","172.30.1.205","172.30.1.104","TCP","54","43560 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22193","10.140049","172.30.1.205","172.30.1.104","TCP","54","43560 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22194","10.140160","172.30.1.205","172.30.1.104","TCP","74","36198 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913366 TSecr=0 WS=128" "22195","10.140335","172.30.1.104","172.30.1.205","TCP","54","135 > 43560 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22196","10.140363","172.30.1.104","172.30.1.205","TCP","54","135 > 43560 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22197","10.140369","172.30.1.205","172.30.1.104","TCP","54","43560 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22198","10.140442","172.30.1.104","172.30.1.205","TCP","66","49671 > 36198 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22199","10.140451","172.30.1.205","172.30.1.104","TCP","54","36198 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22200","10.140822","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22201","10.141135","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22202","10.141143","172.30.1.205","172.30.1.104","TCP","54","36198 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22203","10.143031","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22204","10.143404","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22205","10.143411","172.30.1.205","172.30.1.104","TCP","54","36198 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22206","10.144818","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22207","10.146934","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22208","10.146945","172.30.1.205","172.30.1.104","TCP","54","36198 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22209","10.147924","172.30.1.205","172.30.1.104","TCP","74","43564 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913374 TSecr=0 WS=128" "22210","10.148262","172.30.1.104","172.30.1.205","TCP","66","135 > 43564 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22211","10.148279","172.30.1.205","172.30.1.104","TCP","54","43564 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22212","10.148629","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22213","10.149049","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22214","10.149058","172.30.1.205","172.30.1.104","TCP","54","43564 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22215","10.151268","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22216","10.151691","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22217","10.151697","172.30.1.205","172.30.1.104","TCP","54","43564 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22218","10.153541","172.30.1.205","172.30.1.104","TCP","54","43564 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22219","10.153656","172.30.1.205","172.30.1.104","TCP","74","36202 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913380 TSecr=0 WS=128" "22220","10.153845","172.30.1.104","172.30.1.205","TCP","54","135 > 43564 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22221","10.153904","172.30.1.104","172.30.1.205","TCP","54","135 > 43564 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22222","10.153910","172.30.1.205","172.30.1.104","TCP","54","43564 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22223","10.153946","172.30.1.104","172.30.1.205","TCP","66","49671 > 36202 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22224","10.153955","172.30.1.205","172.30.1.104","TCP","54","36202 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22225","10.154299","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22226","10.154648","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22227","10.154657","172.30.1.205","172.30.1.104","TCP","54","36202 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22228","10.156554","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22229","10.157012","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22230","10.157022","172.30.1.205","172.30.1.104","TCP","54","36202 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22231","10.158448","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22232","10.160586","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22233","10.160599","172.30.1.205","172.30.1.104","TCP","54","36202 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22234","10.161615","172.30.1.205","172.30.1.104","TCP","74","43568 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913388 TSecr=0 WS=128" "22235","10.161936","172.30.1.104","172.30.1.205","TCP","66","135 > 43568 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22236","10.161949","172.30.1.205","172.30.1.104","TCP","54","43568 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22237","10.162313","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22238","10.162608","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22239","10.162617","172.30.1.205","172.30.1.104","TCP","54","43568 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22240","10.164859","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22241","10.165287","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22242","10.165294","172.30.1.205","172.30.1.104","TCP","54","43568 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22243","10.167124","172.30.1.205","172.30.1.104","TCP","54","43568 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22244","10.167238","172.30.1.205","172.30.1.104","TCP","74","36206 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913393 TSecr=0 WS=128" "22245","10.167484","172.30.1.104","172.30.1.205","TCP","54","135 > 43568 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22246","10.167514","172.30.1.104","172.30.1.205","TCP","54","135 > 43568 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22247","10.167524","172.30.1.205","172.30.1.104","TCP","54","43568 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22248","10.167589","172.30.1.104","172.30.1.205","TCP","66","49671 > 36206 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22249","10.167607","172.30.1.205","172.30.1.104","TCP","54","36206 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22250","10.168091","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22251","10.168404","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22252","10.168413","172.30.1.205","172.30.1.104","TCP","54","36206 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22253","10.170320","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22254","10.170704","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22255","10.170710","172.30.1.205","172.30.1.104","TCP","54","36206 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22256","10.172067","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22257","10.174170","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22258","10.174179","172.30.1.205","172.30.1.104","TCP","54","36206 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22259","10.175130","172.30.1.205","172.30.1.104","TCP","74","43572 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913401 TSecr=0 WS=128" "22260","10.175469","172.30.1.104","172.30.1.205","TCP","66","135 > 43572 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22261","10.175480","172.30.1.205","172.30.1.104","TCP","54","43572 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22262","10.175832","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22263","10.176158","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22264","10.176167","172.30.1.205","172.30.1.104","TCP","54","43572 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22265","10.178389","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22266","10.178812","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22267","10.178819","172.30.1.205","172.30.1.104","TCP","54","43572 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22268","10.180632","172.30.1.205","172.30.1.104","TCP","54","43572 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22269","10.180743","172.30.1.205","172.30.1.104","TCP","74","36210 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913407 TSecr=0 WS=128" "22270","10.180959","172.30.1.104","172.30.1.205","TCP","54","135 > 43572 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22271","10.180993","172.30.1.104","172.30.1.205","TCP","54","135 > 43572 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22272","10.181005","172.30.1.205","172.30.1.104","TCP","54","43572 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22273","10.181053","172.30.1.104","172.30.1.205","TCP","66","49671 > 36210 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22274","10.181068","172.30.1.205","172.30.1.104","TCP","54","36210 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22275","10.181607","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22276","10.181971","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22277","10.181980","172.30.1.205","172.30.1.104","TCP","54","36210 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22278","10.183843","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22279","10.184254","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22280","10.184258","172.30.1.205","172.30.1.104","TCP","54","36210 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22281","10.185638","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22282","10.189680","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22283","10.189698","172.30.1.205","172.30.1.104","TCP","54","36210 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22284","10.190719","172.30.1.205","172.30.1.104","TCP","74","43576 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913417 TSecr=0 WS=128" "22285","10.191065","172.30.1.104","172.30.1.205","TCP","66","135 > 43576 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22286","10.191076","172.30.1.205","172.30.1.104","TCP","54","43576 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22287","10.191430","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22288","10.191746","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22289","10.191764","172.30.1.205","172.30.1.104","TCP","54","43576 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22290","10.194131","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22291","10.194572","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22292","10.194584","172.30.1.205","172.30.1.104","TCP","54","43576 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22293","10.195571","172.30.1.205","172.30.1.104","TCP","54","36170 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22294","10.195620","172.30.1.205","172.30.1.104","TCP","54","36174 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22295","10.195657","172.30.1.205","172.30.1.104","TCP","54","36178 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22296","10.195687","172.30.1.205","172.30.1.104","TCP","54","36182 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22297","10.195716","172.30.1.205","172.30.1.104","TCP","54","36186 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22298","10.195750","172.30.1.205","172.30.1.104","TCP","54","36190 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22299","10.195777","172.30.1.205","172.30.1.104","TCP","54","36194 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22300","10.195811","172.30.1.205","172.30.1.104","TCP","54","36198 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22301","10.195838","172.30.1.205","172.30.1.104","TCP","54","36202 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22302","10.195860","172.30.1.205","172.30.1.104","TCP","54","36206 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22303","10.195886","172.30.1.205","172.30.1.104","TCP","54","36210 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22304","10.195959","172.30.1.205","172.30.1.104","TCP","54","36166 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22305","10.196222","172.30.1.104","172.30.1.205","TCP","54","49671 > 36170 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22306","10.196237","172.30.1.104","172.30.1.205","TCP","54","49671 > 36170 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22307","10.196248","172.30.1.205","172.30.1.104","TCP","54","36170 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "22308","10.196281","172.30.1.104","172.30.1.205","TCP","54","49671 > 36174 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22309","10.196300","172.30.1.104","172.30.1.205","TCP","54","49671 > 36178 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22310","10.196321","172.30.1.104","172.30.1.205","TCP","54","49671 > 36182 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22311","10.196366","172.30.1.104","172.30.1.205","TCP","54","49671 > 36174 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22312","10.196371","172.30.1.205","172.30.1.104","TCP","54","36174 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "22313","10.196387","172.30.1.104","172.30.1.205","TCP","54","49671 > 36186 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22314","10.196409","172.30.1.104","172.30.1.205","TCP","54","49671 > 36186 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22315","10.196412","172.30.1.205","172.30.1.104","TCP","54","36186 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "22316","10.196465","172.30.1.104","172.30.1.205","TCP","54","49671 > 36190 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22317","10.196488","172.30.1.104","172.30.1.205","TCP","54","49671 > 36190 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22318","10.196491","172.30.1.205","172.30.1.104","TCP","54","36190 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "22319","10.196514","172.30.1.104","172.30.1.205","TCP","54","49671 > 36194 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22320","10.196530","172.30.1.104","172.30.1.205","TCP","54","49671 > 36194 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22321","10.196534","172.30.1.205","172.30.1.104","TCP","54","36194 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "22322","10.196551","172.30.1.104","172.30.1.205","TCP","54","49671 > 36198 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22323","10.196645","172.30.1.104","172.30.1.205","TCP","54","49671 > 36198 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22324","10.196649","172.30.1.205","172.30.1.104","TCP","54","36198 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "22325","10.196665","172.30.1.104","172.30.1.205","TCP","54","49671 > 36178 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22326","10.196669","172.30.1.205","172.30.1.104","TCP","54","36178 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "22327","10.196688","172.30.1.104","172.30.1.205","TCP","54","49671 > 36202 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22328","10.196709","172.30.1.104","172.30.1.205","TCP","54","49671 > 36206 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22329","10.196730","172.30.1.104","172.30.1.205","TCP","54","49671 > 36206 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22330","10.196733","172.30.1.205","172.30.1.104","TCP","54","36206 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "22331","10.196763","172.30.1.104","172.30.1.205","TCP","54","49671 > 36210 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22332","10.196844","172.30.1.104","172.30.1.205","TCP","54","49671 > 36210 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22333","10.196850","172.30.1.205","172.30.1.104","TCP","54","36210 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "22334","10.197208","172.30.1.104","172.30.1.205","TCP","54","49671 > 36166 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22335","10.197240","172.30.1.104","172.30.1.205","TCP","54","49671 > 36166 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22336","10.197245","172.30.1.205","172.30.1.104","TCP","54","36166 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "22337","10.197260","172.30.1.104","172.30.1.205","TCP","54","49671 > 36182 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22338","10.197266","172.30.1.205","172.30.1.104","TCP","54","36182 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "22339","10.197371","172.30.1.104","172.30.1.205","TCP","54","49671 > 36202 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22340","10.197375","172.30.1.205","172.30.1.104","TCP","54","36202 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "22341","10.197904","172.30.1.205","172.30.1.104","TCP","54","43576 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22342","10.198016","172.30.1.205","172.30.1.104","TCP","74","36214 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913424 TSecr=0 WS=128" "22343","10.198176","172.30.1.104","172.30.1.205","TCP","54","135 > 43576 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22344","10.198212","172.30.1.104","172.30.1.205","TCP","54","135 > 43576 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22345","10.198218","172.30.1.205","172.30.1.104","TCP","54","43576 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22346","10.198299","172.30.1.104","172.30.1.205","TCP","66","49671 > 36214 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22347","10.198308","172.30.1.205","172.30.1.104","TCP","54","36214 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22348","10.198688","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22349","10.199020","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22350","10.199029","172.30.1.205","172.30.1.104","TCP","54","36214 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22351","10.200947","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22352","10.201326","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22353","10.201333","172.30.1.205","172.30.1.104","TCP","54","36214 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22354","10.202687","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22355","10.204885","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22356","10.204894","172.30.1.205","172.30.1.104","TCP","54","36214 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22357","10.205842","172.30.1.205","172.30.1.104","TCP","74","43580 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913432 TSecr=0 WS=128" "22358","10.206140","172.30.1.104","172.30.1.205","TCP","66","135 > 43580 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22359","10.206151","172.30.1.205","172.30.1.104","TCP","54","43580 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22360","10.206512","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22361","10.206834","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22362","10.206843","172.30.1.205","172.30.1.104","TCP","54","43580 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22363","10.209035","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22364","10.209473","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22365","10.209482","172.30.1.205","172.30.1.104","TCP","54","43580 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22366","10.211363","172.30.1.205","172.30.1.104","TCP","54","43580 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22367","10.211489","172.30.1.205","172.30.1.104","TCP","74","36218 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913437 TSecr=0 WS=128" "22368","10.211639","172.30.1.104","172.30.1.205","TCP","54","135 > 43580 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22369","10.211693","172.30.1.104","172.30.1.205","TCP","54","135 > 43580 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22370","10.211699","172.30.1.205","172.30.1.104","TCP","54","43580 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22371","10.211772","172.30.1.104","172.30.1.205","TCP","66","49671 > 36218 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22372","10.211786","172.30.1.205","172.30.1.104","TCP","54","36218 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22373","10.212132","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22374","10.212469","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22375","10.212478","172.30.1.205","172.30.1.104","TCP","54","36218 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22376","10.214374","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22377","10.214749","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22378","10.214755","172.30.1.205","172.30.1.104","TCP","54","36218 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22379","10.216118","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22380","10.218253","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22381","10.218262","172.30.1.205","172.30.1.104","TCP","54","36218 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22382","10.219213","172.30.1.205","172.30.1.104","TCP","74","43584 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913445 TSecr=0 WS=128" "22383","10.219539","172.30.1.104","172.30.1.205","TCP","66","135 > 43584 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22384","10.219556","172.30.1.205","172.30.1.104","TCP","54","43584 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22385","10.219904","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22386","10.220210","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22387","10.220219","172.30.1.205","172.30.1.104","TCP","54","43584 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22388","10.222445","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22389","10.222857","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22390","10.222864","172.30.1.205","172.30.1.104","TCP","54","43584 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22391","10.224678","172.30.1.205","172.30.1.104","TCP","54","43584 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22392","10.224809","172.30.1.205","172.30.1.104","TCP","74","36222 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913451 TSecr=0 WS=128" "22393","10.224941","172.30.1.104","172.30.1.205","TCP","54","135 > 43584 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22394","10.224955","172.30.1.104","172.30.1.205","TCP","54","135 > 43584 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22395","10.224960","172.30.1.205","172.30.1.104","TCP","54","43584 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22396","10.225090","172.30.1.104","172.30.1.205","TCP","66","49671 > 36222 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22397","10.225098","172.30.1.205","172.30.1.104","TCP","54","36222 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22398","10.225448","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22399","10.225733","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22400","10.225742","172.30.1.205","172.30.1.104","TCP","54","36222 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22401","10.227633","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22402","10.228025","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22403","10.228031","172.30.1.205","172.30.1.104","TCP","54","36222 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22404","10.229418","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22405","10.231703","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22406","10.231713","172.30.1.205","172.30.1.104","TCP","54","36222 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22407","10.232646","172.30.1.205","172.30.1.104","TCP","74","43588 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913459 TSecr=0 WS=128" "22408","10.232971","172.30.1.104","172.30.1.205","TCP","66","135 > 43588 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22409","10.232983","172.30.1.205","172.30.1.104","TCP","54","43588 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22410","10.233345","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22411","10.233644","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22412","10.233654","172.30.1.205","172.30.1.104","TCP","54","43588 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22413","10.235840","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22414","10.236251","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22415","10.236258","172.30.1.205","172.30.1.104","TCP","54","43588 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22416","10.238095","172.30.1.205","172.30.1.104","TCP","54","43588 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22417","10.238205","172.30.1.205","172.30.1.104","TCP","74","36226 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913464 TSecr=0 WS=128" "22418","10.238359","172.30.1.104","172.30.1.205","TCP","54","135 > 43588 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22419","10.238375","172.30.1.104","172.30.1.205","TCP","54","135 > 43588 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22420","10.238380","172.30.1.205","172.30.1.104","TCP","54","43588 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22421","10.238478","172.30.1.104","172.30.1.205","TCP","66","49671 > 36226 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22422","10.238486","172.30.1.205","172.30.1.104","TCP","54","36226 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22423","10.238837","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22424","10.239958","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22425","10.239966","172.30.1.205","172.30.1.104","TCP","54","36226 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22426","10.241920","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22427","10.242326","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22428","10.242330","172.30.1.205","172.30.1.104","TCP","54","36226 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22429","10.243745","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22430","10.245981","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22431","10.245990","172.30.1.205","172.30.1.104","TCP","54","36226 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22432","10.246949","172.30.1.205","172.30.1.104","TCP","74","43592 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913473 TSecr=0 WS=128" "22433","10.247281","172.30.1.104","172.30.1.205","TCP","66","135 > 43592 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22434","10.247292","172.30.1.205","172.30.1.104","TCP","54","43592 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22435","10.247681","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22436","10.247970","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22437","10.247979","172.30.1.205","172.30.1.104","TCP","54","43592 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22438","10.250188","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22439","10.250590","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22440","10.250596","172.30.1.205","172.30.1.104","TCP","54","43592 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22441","10.252419","172.30.1.205","172.30.1.104","TCP","54","43592 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22442","10.252529","172.30.1.205","172.30.1.104","TCP","74","36230 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913478 TSecr=0 WS=128" "22443","10.252690","172.30.1.104","172.30.1.205","TCP","54","135 > 43592 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22444","10.252721","172.30.1.104","172.30.1.205","TCP","54","135 > 43592 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22445","10.252727","172.30.1.205","172.30.1.104","TCP","54","43592 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22446","10.252826","172.30.1.104","172.30.1.205","TCP","66","49671 > 36230 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22447","10.252835","172.30.1.205","172.30.1.104","TCP","54","36230 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22448","10.253205","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22449","10.253498","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22450","10.253507","172.30.1.205","172.30.1.104","TCP","54","36230 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22451","10.255408","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22452","10.255769","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22453","10.255773","172.30.1.205","172.30.1.104","TCP","54","36230 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22454","10.257192","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22455","10.259305","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22456","10.259316","172.30.1.205","172.30.1.104","TCP","54","36230 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22457","10.260260","172.30.1.205","172.30.1.104","TCP","74","43596 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913486 TSecr=0 WS=128" "22458","10.260599","172.30.1.104","172.30.1.205","TCP","66","135 > 43596 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22459","10.260609","172.30.1.205","172.30.1.104","TCP","54","43596 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22460","10.260987","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22461","10.261279","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22462","10.261287","172.30.1.205","172.30.1.104","TCP","54","43596 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22463","10.263477","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22464","10.263859","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22465","10.263866","172.30.1.205","172.30.1.104","TCP","54","43596 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22466","10.265725","172.30.1.205","172.30.1.104","TCP","54","43596 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22467","10.265836","172.30.1.205","172.30.1.104","TCP","74","36234 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913492 TSecr=0 WS=128" "22468","10.266014","172.30.1.104","172.30.1.205","TCP","54","135 > 43596 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22469","10.266035","172.30.1.104","172.30.1.205","TCP","54","135 > 43596 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22470","10.266046","172.30.1.205","172.30.1.104","TCP","54","43596 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22471","10.266121","172.30.1.104","172.30.1.205","TCP","66","49671 > 36234 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22472","10.266129","172.30.1.205","172.30.1.104","TCP","54","36234 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22473","10.266475","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22474","10.266757","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22475","10.266772","172.30.1.205","172.30.1.104","TCP","54","36234 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22476","10.268636","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22477","10.268996","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22478","10.269003","172.30.1.205","172.30.1.104","TCP","54","36234 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22479","10.270394","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22480","10.272439","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22481","10.272448","172.30.1.205","172.30.1.104","TCP","54","36234 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22482","10.273419","172.30.1.205","172.30.1.104","TCP","74","43600 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913499 TSecr=0 WS=128" "22483","10.273722","172.30.1.104","172.30.1.205","TCP","66","135 > 43600 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22484","10.273732","172.30.1.205","172.30.1.104","TCP","54","43600 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22485","10.274078","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22486","10.274395","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22487","10.274404","172.30.1.205","172.30.1.104","TCP","54","43600 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22488","10.276593","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22489","10.277000","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22490","10.277008","172.30.1.205","172.30.1.104","TCP","54","43600 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22491","10.278834","172.30.1.205","172.30.1.104","TCP","54","43600 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22492","10.278955","172.30.1.205","172.30.1.104","TCP","74","36238 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913505 TSecr=0 WS=128" "22493","10.279084","172.30.1.104","172.30.1.205","TCP","54","135 > 43600 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22494","10.279139","172.30.1.104","172.30.1.205","TCP","54","135 > 43600 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22495","10.279145","172.30.1.205","172.30.1.104","TCP","54","43600 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22496","10.279234","172.30.1.104","172.30.1.205","TCP","66","49671 > 36238 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22497","10.279242","172.30.1.205","172.30.1.104","TCP","54","36238 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22498","10.279587","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22499","10.279867","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22500","10.279881","172.30.1.205","172.30.1.104","TCP","54","36238 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22501","10.281799","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22502","10.282163","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22503","10.282170","172.30.1.205","172.30.1.104","TCP","54","36238 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22504","10.283520","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22505","10.285751","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22506","10.285762","172.30.1.205","172.30.1.104","TCP","54","36238 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22507","10.286741","172.30.1.205","172.30.1.104","TCP","74","43604 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913513 TSecr=0 WS=128" "22508","10.287077","172.30.1.104","172.30.1.205","TCP","66","135 > 43604 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22509","10.287088","172.30.1.205","172.30.1.104","TCP","54","43604 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22510","10.287435","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22511","10.287756","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22512","10.287768","172.30.1.205","172.30.1.104","TCP","54","43604 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22513","10.290009","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22514","10.290442","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22515","10.290448","172.30.1.205","172.30.1.104","TCP","54","43604 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22516","10.292258","172.30.1.205","172.30.1.104","TCP","54","43604 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22517","10.292369","172.30.1.205","172.30.1.104","TCP","74","36242 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913518 TSecr=0 WS=128" "22518","10.292535","172.30.1.104","172.30.1.205","TCP","54","135 > 43604 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22519","10.292546","172.30.1.104","172.30.1.205","TCP","54","135 > 43604 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22520","10.292551","172.30.1.205","172.30.1.104","TCP","54","43604 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22521","10.292697","172.30.1.104","172.30.1.205","TCP","66","49671 > 36242 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22522","10.292705","172.30.1.205","172.30.1.104","TCP","54","36242 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22523","10.293075","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22524","10.293363","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22525","10.293372","172.30.1.205","172.30.1.104","TCP","54","36242 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22526","10.295242","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22527","10.295632","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22528","10.295638","172.30.1.205","172.30.1.104","TCP","54","36242 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22529","10.297023","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22530","10.299130","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22531","10.299141","172.30.1.205","172.30.1.104","TCP","54","36242 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22532","10.300069","172.30.1.205","172.30.1.104","TCP","74","43608 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913526 TSecr=0 WS=128" "22533","10.300406","172.30.1.104","172.30.1.205","TCP","66","135 > 43608 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22534","10.300417","172.30.1.205","172.30.1.104","TCP","54","43608 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22535","10.300762","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22536","10.301045","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22537","10.301054","172.30.1.205","172.30.1.104","TCP","54","43608 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22538","10.303223","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22539","10.303600","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22540","10.303607","172.30.1.205","172.30.1.104","TCP","54","43608 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22541","10.305433","172.30.1.205","172.30.1.104","TCP","54","43608 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22542","10.305546","172.30.1.205","172.30.1.104","TCP","74","36246 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913531 TSecr=0 WS=128" "22543","10.305711","172.30.1.104","172.30.1.205","TCP","54","135 > 43608 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22544","10.305720","172.30.1.104","172.30.1.205","TCP","54","135 > 43608 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22545","10.305725","172.30.1.205","172.30.1.104","TCP","54","43608 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22546","10.305815","172.30.1.104","172.30.1.205","TCP","66","49671 > 36246 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22547","10.305823","172.30.1.205","172.30.1.104","TCP","54","36246 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22548","10.306167","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22549","10.306667","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22550","10.306674","172.30.1.205","172.30.1.104","TCP","54","36246 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22551","10.308521","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22552","10.308876","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22553","10.308883","172.30.1.205","172.30.1.104","TCP","54","36246 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22554","10.310235","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22555","10.312312","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22556","10.312322","172.30.1.205","172.30.1.104","TCP","54","36246 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22557","10.313286","172.30.1.205","172.30.1.104","TCP","74","43612 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913539 TSecr=0 WS=128" "22558","10.313589","172.30.1.104","172.30.1.205","TCP","66","135 > 43612 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22559","10.313600","172.30.1.205","172.30.1.104","TCP","54","43612 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22560","10.313946","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22561","10.314223","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22562","10.314231","172.30.1.205","172.30.1.104","TCP","54","43612 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22563","10.316397","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22564","10.316823","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22565","10.316830","172.30.1.205","172.30.1.104","TCP","54","43612 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22566","10.318645","172.30.1.205","172.30.1.104","TCP","54","43612 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22567","10.318756","172.30.1.205","172.30.1.104","TCP","74","36250 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913545 TSecr=0 WS=128" "22568","10.318999","172.30.1.104","172.30.1.205","TCP","54","135 > 43612 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22569","10.319087","172.30.1.104","172.30.1.205","TCP","66","49671 > 36250 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22570","10.319096","172.30.1.205","172.30.1.104","TCP","54","36250 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22571","10.319102","172.30.1.104","172.30.1.205","TCP","54","135 > 43612 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22572","10.319105","172.30.1.205","172.30.1.104","TCP","54","43612 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22573","10.319451","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22574","10.319770","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22575","10.319779","172.30.1.205","172.30.1.104","TCP","54","36250 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22576","10.321679","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22577","10.322034","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22578","10.322040","172.30.1.205","172.30.1.104","TCP","54","36250 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22579","10.323377","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22580","10.325511","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22581","10.325520","172.30.1.205","172.30.1.104","TCP","54","36250 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22582","10.326456","172.30.1.205","172.30.1.104","TCP","74","43616 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913552 TSecr=0 WS=128" "22583","10.326746","172.30.1.104","172.30.1.205","TCP","66","135 > 43616 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22584","10.326757","172.30.1.205","172.30.1.104","TCP","54","43616 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22585","10.327112","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22586","10.327476","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22587","10.327484","172.30.1.205","172.30.1.104","TCP","54","43616 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22588","10.329694","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22589","10.330067","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22590","10.330074","172.30.1.205","172.30.1.104","TCP","54","43616 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22591","10.331876","172.30.1.205","172.30.1.104","TCP","54","43616 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22592","10.331985","172.30.1.205","172.30.1.104","TCP","74","36254 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913558 TSecr=0 WS=128" "22593","10.332185","172.30.1.104","172.30.1.205","TCP","54","135 > 43616 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22594","10.332196","172.30.1.104","172.30.1.205","TCP","54","135 > 43616 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22595","10.332201","172.30.1.205","172.30.1.104","TCP","54","43616 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22596","10.332315","172.30.1.104","172.30.1.205","TCP","66","49671 > 36254 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22597","10.332326","172.30.1.205","172.30.1.104","TCP","54","36254 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22598","10.332682","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22599","10.334468","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22600","10.334478","172.30.1.205","172.30.1.104","TCP","54","36254 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22601","10.336359","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22602","10.336763","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22603","10.336769","172.30.1.205","172.30.1.104","TCP","54","36254 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22604","10.338146","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22605","10.340295","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22606","10.340305","172.30.1.205","172.30.1.104","TCP","54","36254 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22607","10.341259","172.30.1.205","172.30.1.104","TCP","74","43620 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913567 TSecr=0 WS=128" "22608","10.341566","172.30.1.104","172.30.1.205","TCP","66","135 > 43620 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22609","10.341576","172.30.1.205","172.30.1.104","TCP","54","43620 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22610","10.341928","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22611","10.342221","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22612","10.342230","172.30.1.205","172.30.1.104","TCP","54","43620 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22613","10.344408","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22614","10.344815","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22615","10.344821","172.30.1.205","172.30.1.104","TCP","54","43620 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22616","10.346630","172.30.1.205","172.30.1.104","TCP","54","43620 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22617","10.346740","172.30.1.205","172.30.1.104","TCP","74","36258 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913573 TSecr=0 WS=128" "22618","10.346878","172.30.1.104","172.30.1.205","TCP","54","135 > 43620 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22619","10.346888","172.30.1.104","172.30.1.205","TCP","54","135 > 43620 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22620","10.346893","172.30.1.205","172.30.1.104","TCP","54","43620 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22621","10.347001","172.30.1.104","172.30.1.205","TCP","66","49671 > 36258 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22622","10.347009","172.30.1.205","172.30.1.104","TCP","54","36258 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22623","10.347369","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22624","10.348581","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22625","10.348589","172.30.1.205","172.30.1.104","TCP","54","36258 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22626","10.350474","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22627","10.350887","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22628","10.350894","172.30.1.205","172.30.1.104","TCP","54","36258 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22629","10.352234","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22630","10.354507","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22631","10.354517","172.30.1.205","172.30.1.104","TCP","54","36258 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22632","10.355452","172.30.1.205","172.30.1.104","TCP","74","43624 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913581 TSecr=0 WS=128" "22633","10.355741","172.30.1.104","172.30.1.205","TCP","66","135 > 43624 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22634","10.355752","172.30.1.205","172.30.1.104","TCP","54","43624 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22635","10.356106","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22636","10.356399","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22637","10.356408","172.30.1.205","172.30.1.104","TCP","54","43624 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22638","10.358608","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22639","10.359029","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22640","10.359035","172.30.1.205","172.30.1.104","TCP","54","43624 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22641","10.359876","172.30.1.205","172.30.1.104","TCP","54","36218 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22642","10.359925","172.30.1.205","172.30.1.104","TCP","54","36222 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22643","10.359958","172.30.1.205","172.30.1.104","TCP","54","36226 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22644","10.359986","172.30.1.205","172.30.1.104","TCP","54","36230 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22645","10.360013","172.30.1.205","172.30.1.104","TCP","54","36234 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22646","10.360040","172.30.1.205","172.30.1.104","TCP","54","36238 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22647","10.360068","172.30.1.205","172.30.1.104","TCP","54","36242 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22648","10.360096","172.30.1.205","172.30.1.104","TCP","54","36246 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22649","10.360126","172.30.1.205","172.30.1.104","TCP","54","36250 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22650","10.360149","172.30.1.205","172.30.1.104","TCP","54","36254 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22651","10.360176","172.30.1.205","172.30.1.104","TCP","54","36258 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22652","10.360184","172.30.1.104","172.30.1.205","TCP","54","49671 > 36218 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22653","10.360268","172.30.1.205","172.30.1.104","TCP","54","36214 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22654","10.360328","172.30.1.104","172.30.1.205","TCP","54","49671 > 36222 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22655","10.360364","172.30.1.104","172.30.1.205","TCP","54","49671 > 36218 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22656","10.360371","172.30.1.205","172.30.1.104","TCP","54","36218 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "22657","10.360393","172.30.1.104","172.30.1.205","TCP","54","49671 > 36230 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22658","10.360420","172.30.1.104","172.30.1.205","TCP","54","49671 > 36226 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22659","10.360448","172.30.1.104","172.30.1.205","TCP","54","49671 > 36234 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22660","10.360474","172.30.1.104","172.30.1.205","TCP","54","49671 > 36230 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22661","10.360479","172.30.1.205","172.30.1.104","TCP","54","36230 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "22662","10.360500","172.30.1.104","172.30.1.205","TCP","54","49671 > 36238 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22663","10.360527","172.30.1.104","172.30.1.205","TCP","54","49671 > 36226 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22664","10.360530","172.30.1.205","172.30.1.104","TCP","54","36226 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "22665","10.360562","172.30.1.104","172.30.1.205","TCP","54","49671 > 36242 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22666","10.360599","172.30.1.104","172.30.1.205","TCP","54","49671 > 36242 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22667","10.360604","172.30.1.205","172.30.1.104","TCP","54","36242 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "22668","10.360633","172.30.1.104","172.30.1.205","TCP","54","49671 > 36238 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22669","10.360637","172.30.1.205","172.30.1.104","TCP","54","36238 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "22670","10.360716","172.30.1.104","172.30.1.205","TCP","54","49671 > 36234 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22671","10.360720","172.30.1.205","172.30.1.104","TCP","54","36234 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "22672","10.360722","172.30.1.104","172.30.1.205","TCP","54","49671 > 36246 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22673","10.360727","172.30.1.104","172.30.1.205","TCP","54","49671 > 36250 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22674","10.360753","172.30.1.104","172.30.1.205","TCP","54","49671 > 36254 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22675","10.360790","172.30.1.104","172.30.1.205","TCP","54","49671 > 36254 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22676","10.360796","172.30.1.205","172.30.1.104","TCP","54","36254 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "22677","10.360809","172.30.1.104","172.30.1.205","TCP","54","49671 > 36250 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22678","10.360812","172.30.1.205","172.30.1.104","TCP","54","36250 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "22679","10.360847","172.30.1.104","172.30.1.205","TCP","54","49671 > 36246 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22680","10.360850","172.30.1.205","172.30.1.104","TCP","54","36246 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "22681","10.361245","172.30.1.104","172.30.1.205","TCP","54","49671 > 36258 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22682","10.361270","172.30.1.104","172.30.1.205","TCP","54","49671 > 36214 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22683","10.361299","172.30.1.104","172.30.1.205","TCP","54","49671 > 36214 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22684","10.361304","172.30.1.205","172.30.1.104","TCP","54","36214 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "22685","10.361328","172.30.1.104","172.30.1.205","TCP","54","49671 > 36258 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22686","10.361331","172.30.1.205","172.30.1.104","TCP","54","36258 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "22687","10.361410","172.30.1.104","172.30.1.205","TCP","54","49671 > 36222 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "22688","10.361415","172.30.1.205","172.30.1.104","TCP","54","36222 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "22689","10.361876","172.30.1.205","172.30.1.104","TCP","54","43624 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22690","10.361990","172.30.1.205","172.30.1.104","TCP","74","36262 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913588 TSecr=0 WS=128" "22691","10.362150","172.30.1.104","172.30.1.205","TCP","54","135 > 43624 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22692","10.362188","172.30.1.104","172.30.1.205","TCP","54","135 > 43624 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22693","10.362193","172.30.1.205","172.30.1.104","TCP","54","43624 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22694","10.362284","172.30.1.104","172.30.1.205","TCP","66","49671 > 36262 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22695","10.362293","172.30.1.205","172.30.1.104","TCP","54","36262 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22696","10.362669","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22697","10.363078","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22698","10.363087","172.30.1.205","172.30.1.104","TCP","54","36262 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22699","10.364993","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22700","10.365395","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22701","10.365402","172.30.1.205","172.30.1.104","TCP","54","36262 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22702","10.366754","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22703","10.368849","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22704","10.368859","172.30.1.205","172.30.1.104","TCP","54","36262 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22705","10.369809","172.30.1.205","172.30.1.104","TCP","74","43628 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913596 TSecr=0 WS=128" "22706","10.370147","172.30.1.104","172.30.1.205","TCP","66","135 > 43628 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22707","10.370158","172.30.1.205","172.30.1.104","TCP","54","43628 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22708","10.370520","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22709","10.370825","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22710","10.370833","172.30.1.205","172.30.1.104","TCP","54","43628 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22711","10.373031","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22712","10.373440","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22713","10.373446","172.30.1.205","172.30.1.104","TCP","54","43628 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22714","10.375245","172.30.1.205","172.30.1.104","TCP","54","43628 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22715","10.375356","172.30.1.205","172.30.1.104","TCP","74","36266 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913601 TSecr=0 WS=128" "22716","10.375528","172.30.1.104","172.30.1.205","TCP","54","135 > 43628 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22717","10.375550","172.30.1.104","172.30.1.205","TCP","54","135 > 43628 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22718","10.375555","172.30.1.205","172.30.1.104","TCP","54","43628 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22719","10.375666","172.30.1.104","172.30.1.205","TCP","66","49671 > 36266 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22720","10.375674","172.30.1.205","172.30.1.104","TCP","54","36266 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22721","10.376016","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22722","10.376316","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22723","10.376324","172.30.1.205","172.30.1.104","TCP","54","36266 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22724","10.378206","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22725","10.378623","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22726","10.378629","172.30.1.205","172.30.1.104","TCP","54","36266 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22727","10.379967","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22728","10.382118","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22729","10.382129","172.30.1.205","172.30.1.104","TCP","54","36266 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22730","10.383098","172.30.1.205","172.30.1.104","TCP","74","43632 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913609 TSecr=0 WS=128" "22731","10.383427","172.30.1.104","172.30.1.205","TCP","66","135 > 43632 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22732","10.383438","172.30.1.205","172.30.1.104","TCP","54","43632 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22733","10.383784","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22734","10.384137","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22735","10.384145","172.30.1.205","172.30.1.104","TCP","54","43632 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22736","10.386378","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22737","10.386867","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22738","10.386874","172.30.1.205","172.30.1.104","TCP","54","43632 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22739","10.388686","172.30.1.205","172.30.1.104","TCP","54","43632 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22740","10.388825","172.30.1.205","172.30.1.104","TCP","74","36270 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913615 TSecr=0 WS=128" "22741","10.389000","172.30.1.104","172.30.1.205","TCP","54","135 > 43632 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22742","10.389054","172.30.1.104","172.30.1.205","TCP","54","135 > 43632 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22743","10.389060","172.30.1.205","172.30.1.104","TCP","54","43632 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22744","10.389103","172.30.1.104","172.30.1.205","TCP","66","49671 > 36270 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22745","10.389111","172.30.1.205","172.30.1.104","TCP","54","36270 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22746","10.389460","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22747","10.389794","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22748","10.389801","172.30.1.205","172.30.1.104","TCP","54","36270 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22749","10.391656","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22750","10.392083","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22751","10.392093","172.30.1.205","172.30.1.104","TCP","54","36270 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22752","10.393565","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22753","10.395645","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22754","10.395656","172.30.1.205","172.30.1.104","TCP","54","36270 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22755","10.396632","172.30.1.205","172.30.1.104","TCP","74","43636 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913623 TSecr=0 WS=128" "22756","10.396937","172.30.1.104","172.30.1.205","TCP","66","135 > 43636 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22757","10.396949","172.30.1.205","172.30.1.104","TCP","54","43636 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22758","10.397310","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22759","10.397608","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22760","10.397619","172.30.1.205","172.30.1.104","TCP","54","43636 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22761","10.399815","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22762","10.400443","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22763","10.400450","172.30.1.205","172.30.1.104","TCP","54","43636 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22764","10.402281","172.30.1.205","172.30.1.104","TCP","54","43636 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22765","10.402393","172.30.1.205","172.30.1.104","TCP","74","36274 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913628 TSecr=0 WS=128" "22766","10.402688","172.30.1.104","172.30.1.205","TCP","54","135 > 43636 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22767","10.402697","172.30.1.104","172.30.1.205","TCP","54","135 > 43636 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22768","10.402703","172.30.1.205","172.30.1.104","TCP","54","43636 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22769","10.402708","172.30.1.104","172.30.1.205","TCP","66","49671 > 36274 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22770","10.402715","172.30.1.205","172.30.1.104","TCP","54","36274 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22771","10.403074","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22772","10.403443","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22773","10.403452","172.30.1.205","172.30.1.104","TCP","54","36274 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22774","10.405367","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22775","10.405814","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22776","10.405822","172.30.1.205","172.30.1.104","TCP","54","36274 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22777","10.407195","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22778","10.409488","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22779","10.409503","172.30.1.205","172.30.1.104","TCP","54","36274 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22780","10.410531","172.30.1.205","172.30.1.104","TCP","74","43640 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913636 TSecr=0 WS=128" "22781","10.410892","172.30.1.104","172.30.1.205","TCP","66","135 > 43640 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22782","10.410905","172.30.1.205","172.30.1.104","TCP","54","43640 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22783","10.411261","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22784","10.411614","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22785","10.411623","172.30.1.205","172.30.1.104","TCP","54","43640 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22786","10.413831","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22787","10.414296","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22788","10.414306","172.30.1.205","172.30.1.104","TCP","54","43640 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22789","10.416223","172.30.1.205","172.30.1.104","TCP","54","43640 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22790","10.416340","172.30.1.205","172.30.1.104","TCP","74","36278 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913642 TSecr=0 WS=128" "22791","10.416558","172.30.1.104","172.30.1.205","TCP","54","135 > 43640 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22792","10.416586","172.30.1.104","172.30.1.205","TCP","54","135 > 43640 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22793","10.416592","172.30.1.205","172.30.1.104","TCP","54","43640 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22794","10.416693","172.30.1.104","172.30.1.205","TCP","66","49671 > 36278 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22795","10.416702","172.30.1.205","172.30.1.104","TCP","54","36278 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22796","10.417085","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22797","10.418073","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22798","10.418083","172.30.1.205","172.30.1.104","TCP","54","36278 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22799","10.419969","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22800","10.420380","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22801","10.420387","172.30.1.205","172.30.1.104","TCP","54","36278 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22802","10.421765","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22803","10.423901","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22804","10.423911","172.30.1.205","172.30.1.104","TCP","54","36278 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22805","10.424865","172.30.1.205","172.30.1.104","TCP","74","43644 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913651 TSecr=0 WS=128" "22806","10.425194","172.30.1.104","172.30.1.205","TCP","66","135 > 43644 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22807","10.425205","172.30.1.205","172.30.1.104","TCP","54","43644 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22808","10.425563","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22809","10.425926","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22810","10.425935","172.30.1.205","172.30.1.104","TCP","54","43644 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22811","10.428109","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22812","10.428582","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22813","10.428588","172.30.1.205","172.30.1.104","TCP","54","43644 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22814","10.430420","172.30.1.205","172.30.1.104","TCP","54","43644 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22815","10.430533","172.30.1.205","172.30.1.104","TCP","74","36282 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913656 TSecr=0 WS=128" "22816","10.430726","172.30.1.104","172.30.1.205","TCP","54","135 > 43644 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22817","10.430804","172.30.1.104","172.30.1.205","TCP","54","135 > 43644 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22818","10.430810","172.30.1.205","172.30.1.104","TCP","54","43644 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22819","10.430861","172.30.1.104","172.30.1.205","TCP","66","49671 > 36282 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22820","10.430870","172.30.1.205","172.30.1.104","TCP","54","36282 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22821","10.431212","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22822","10.433717","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22823","10.433725","172.30.1.205","172.30.1.104","TCP","54","36282 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22824","10.435609","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22825","10.438243","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22826","10.438250","172.30.1.205","172.30.1.104","TCP","54","36282 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22827","10.439616","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22828","10.441816","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22829","10.441826","172.30.1.205","172.30.1.104","TCP","54","36282 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22830","10.442792","172.30.1.205","172.30.1.104","TCP","74","43648 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913669 TSecr=0 WS=128" "22831","10.443141","172.30.1.104","172.30.1.205","TCP","66","135 > 43648 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22832","10.443152","172.30.1.205","172.30.1.104","TCP","54","43648 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22833","10.443500","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22834","10.443831","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22835","10.443840","172.30.1.205","172.30.1.104","TCP","54","43648 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22836","10.446056","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22837","10.446532","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22838","10.446538","172.30.1.205","172.30.1.104","TCP","54","43648 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22839","10.448344","172.30.1.205","172.30.1.104","TCP","54","43648 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22840","10.448456","172.30.1.205","172.30.1.104","TCP","74","36286 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913674 TSecr=0 WS=128" "22841","10.448676","172.30.1.104","172.30.1.205","TCP","54","135 > 43648 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22842","10.448722","172.30.1.104","172.30.1.205","TCP","54","135 > 43648 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22843","10.448728","172.30.1.205","172.30.1.104","TCP","54","43648 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22844","10.448830","172.30.1.104","172.30.1.205","TCP","66","49671 > 36286 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22845","10.448840","172.30.1.205","172.30.1.104","TCP","54","36286 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22846","10.449189","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22847","10.449547","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22848","10.449555","172.30.1.205","172.30.1.104","TCP","54","36286 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22849","10.451428","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22850","10.451890","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22851","10.451896","172.30.1.205","172.30.1.104","TCP","54","36286 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22852","10.453279","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22853","10.455977","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22854","10.455988","172.30.1.205","172.30.1.104","TCP","54","36286 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22855","10.457011","172.30.1.205","172.30.1.104","TCP","74","43652 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913683 TSecr=0 WS=128" "22856","10.457407","172.30.1.104","172.30.1.205","TCP","66","135 > 43652 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22857","10.457420","172.30.1.205","172.30.1.104","TCP","54","43652 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22858","10.457807","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22859","10.458141","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22860","10.458150","172.30.1.205","172.30.1.104","TCP","54","43652 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22861","10.460353","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22862","10.460821","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22863","10.460828","172.30.1.205","172.30.1.104","TCP","54","43652 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22864","10.462636","172.30.1.205","172.30.1.104","TCP","54","43652 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22865","10.462747","172.30.1.205","172.30.1.104","TCP","74","36290 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913689 TSecr=0 WS=128" "22866","10.462936","172.30.1.104","172.30.1.205","TCP","54","135 > 43652 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22867","10.463010","172.30.1.104","172.30.1.205","TCP","54","135 > 43652 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22868","10.463015","172.30.1.205","172.30.1.104","TCP","54","43652 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22869","10.463106","172.30.1.104","172.30.1.205","TCP","66","49671 > 36290 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22870","10.463114","172.30.1.205","172.30.1.104","TCP","54","36290 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22871","10.463474","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22872","10.463808","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22873","10.463816","172.30.1.205","172.30.1.104","TCP","54","36290 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22874","10.465707","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22875","10.466127","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22876","10.466134","172.30.1.205","172.30.1.104","TCP","54","36290 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22877","10.467484","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22878","10.469696","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22879","10.469706","172.30.1.205","172.30.1.104","TCP","54","36290 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22880","10.470648","172.30.1.205","172.30.1.104","TCP","74","43656 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913697 TSecr=0 WS=128" "22881","10.470989","172.30.1.104","172.30.1.205","TCP","66","135 > 43656 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22882","10.470999","172.30.1.205","172.30.1.104","TCP","54","43656 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22883","10.471348","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22884","10.471697","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22885","10.471706","172.30.1.205","172.30.1.104","TCP","54","43656 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22886","10.473927","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22887","10.474367","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22888","10.474373","172.30.1.205","172.30.1.104","TCP","54","43656 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22889","10.476178","172.30.1.205","172.30.1.104","TCP","54","43656 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22890","10.476288","172.30.1.205","172.30.1.104","TCP","74","36294 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913702 TSecr=0 WS=128" "22891","10.476492","172.30.1.104","172.30.1.205","TCP","54","135 > 43656 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22892","10.476519","172.30.1.104","172.30.1.205","TCP","54","135 > 43656 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22893","10.476524","172.30.1.205","172.30.1.104","TCP","54","43656 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22894","10.476642","172.30.1.104","172.30.1.205","TCP","66","49671 > 36294 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22895","10.476650","172.30.1.205","172.30.1.104","TCP","54","36294 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22896","10.477023","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22897","10.480783","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22898","10.480803","172.30.1.205","172.30.1.104","TCP","54","36294 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22899","10.482745","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22900","10.483202","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22901","10.483209","172.30.1.205","172.30.1.104","TCP","54","36294 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22902","10.484573","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22903","10.486807","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22904","10.486818","172.30.1.205","172.30.1.104","TCP","54","36294 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22905","10.487775","172.30.1.205","172.30.1.104","TCP","74","43660 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913714 TSecr=0 WS=128" "22906","10.488125","172.30.1.104","172.30.1.205","TCP","66","135 > 43660 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22907","10.488137","172.30.1.205","172.30.1.104","TCP","54","43660 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22908","10.488501","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22909","10.488808","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22910","10.488818","172.30.1.205","172.30.1.104","TCP","54","43660 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22911","10.491012","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22912","10.491457","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22913","10.491464","172.30.1.205","172.30.1.104","TCP","54","43660 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22914","10.493304","172.30.1.205","172.30.1.104","TCP","54","43660 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22915","10.493418","172.30.1.205","172.30.1.104","TCP","74","36298 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913719 TSecr=0 WS=128" "22916","10.493561","172.30.1.104","172.30.1.205","TCP","54","135 > 43660 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22917","10.493597","172.30.1.104","172.30.1.205","TCP","54","135 > 43660 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22918","10.493603","172.30.1.205","172.30.1.104","TCP","54","43660 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22919","10.493678","172.30.1.104","172.30.1.205","TCP","66","49671 > 36298 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22920","10.493687","172.30.1.205","172.30.1.104","TCP","54","36298 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22921","10.494032","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22922","10.494328","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22923","10.494337","172.30.1.205","172.30.1.104","TCP","54","36298 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22924","10.496222","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22925","10.496596","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22926","10.496603","172.30.1.205","172.30.1.104","TCP","54","36298 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22927","10.497976","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22928","10.500783","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22929","10.500792","172.30.1.205","172.30.1.104","TCP","54","36298 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22930","10.501748","172.30.1.205","172.30.1.104","TCP","74","43664 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913728 TSecr=0 WS=128" "22931","10.502109","172.30.1.104","172.30.1.205","TCP","66","135 > 43664 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22932","10.502120","172.30.1.205","172.30.1.104","TCP","54","43664 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22933","10.502471","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22934","10.502774","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22935","10.502783","172.30.1.205","172.30.1.104","TCP","54","43664 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22936","10.505006","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22937","10.505417","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22938","10.505423","172.30.1.205","172.30.1.104","TCP","54","43664 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22939","10.507236","172.30.1.205","172.30.1.104","TCP","54","43664 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22940","10.507350","172.30.1.205","172.30.1.104","TCP","74","36302 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913733 TSecr=0 WS=128" "22941","10.507524","172.30.1.104","172.30.1.205","TCP","54","135 > 43664 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22942","10.507565","172.30.1.104","172.30.1.205","TCP","54","135 > 43664 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22943","10.507570","172.30.1.205","172.30.1.104","TCP","54","43664 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22944","10.507611","172.30.1.104","172.30.1.205","TCP","66","49671 > 36302 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22945","10.507619","172.30.1.205","172.30.1.104","TCP","54","36302 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22946","10.507965","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22947","10.509325","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22948","10.509334","172.30.1.205","172.30.1.104","TCP","54","36302 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22949","10.511263","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22950","10.511638","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22951","10.511645","172.30.1.205","172.30.1.104","TCP","54","36302 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22952","10.513043","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22953","10.515137","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22954","10.515149","172.30.1.205","172.30.1.104","TCP","54","36302 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22955","10.516140","172.30.1.205","172.30.1.104","TCP","74","43668 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913742 TSecr=0 WS=128" "22956","10.516446","172.30.1.104","172.30.1.205","TCP","66","135 > 43668 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22957","10.516458","172.30.1.205","172.30.1.104","TCP","54","43668 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22958","10.516838","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22959","10.517155","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22960","10.517164","172.30.1.205","172.30.1.104","TCP","54","43668 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22961","10.519427","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22962","10.519867","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22963","10.519880","172.30.1.205","172.30.1.104","TCP","54","43668 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22964","10.521801","172.30.1.205","172.30.1.104","TCP","54","43668 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "22965","10.521933","172.30.1.205","172.30.1.104","TCP","74","36306 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913748 TSecr=0 WS=128" "22966","10.522089","172.30.1.104","172.30.1.205","TCP","54","135 > 43668 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22967","10.522134","172.30.1.104","172.30.1.205","TCP","54","135 > 43668 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "22968","10.522141","172.30.1.205","172.30.1.104","TCP","54","43668 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "22969","10.522242","172.30.1.104","172.30.1.205","TCP","66","49671 > 36306 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22970","10.522251","172.30.1.205","172.30.1.104","TCP","54","36306 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22971","10.522596","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "22972","10.524731","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22973","10.524739","172.30.1.205","172.30.1.104","TCP","54","36306 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22974","10.526636","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "22975","10.527019","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "22976","10.527025","172.30.1.205","172.30.1.104","TCP","54","36306 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "22977","10.528376","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "22978","10.530521","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "22979","10.530531","172.30.1.205","172.30.1.104","TCP","54","36306 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "22980","10.531507","172.30.1.205","172.30.1.104","TCP","74","43672 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913757 TSecr=0 WS=128" "22981","10.531830","172.30.1.104","172.30.1.205","TCP","66","135 > 43672 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "22982","10.531841","172.30.1.205","172.30.1.104","TCP","54","43672 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "22983","10.532200","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "22984","10.532534","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "22985","10.532549","172.30.1.205","172.30.1.104","TCP","54","43672 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "22986","10.534845","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "22987","10.535259","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "22988","10.535267","172.30.1.205","172.30.1.104","TCP","54","43672 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "22989","10.536149","172.30.1.205","172.30.1.104","TCP","54","36266 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22990","10.536201","172.30.1.205","172.30.1.104","TCP","54","36270 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22991","10.536234","172.30.1.205","172.30.1.104","TCP","54","36274 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22992","10.536269","172.30.1.205","172.30.1.104","TCP","54","36278 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22993","10.536297","172.30.1.205","172.30.1.104","TCP","54","36282 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22994","10.536320","172.30.1.205","172.30.1.104","TCP","54","36286 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22995","10.536352","172.30.1.205","172.30.1.104","TCP","54","36290 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22996","10.536378","172.30.1.205","172.30.1.104","TCP","54","36294 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22997","10.536405","172.30.1.205","172.30.1.104","TCP","54","36298 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22998","10.536431","172.30.1.205","172.30.1.104","TCP","54","36302 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "22999","10.536458","172.30.1.205","172.30.1.104","TCP","54","36306 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23000","10.536526","172.30.1.205","172.30.1.104","TCP","54","36262 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23001","10.536753","172.30.1.104","172.30.1.205","TCP","54","49671 > 36266 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23002","10.536789","172.30.1.104","172.30.1.205","TCP","54","49671 > 36270 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23003","10.536807","172.30.1.104","172.30.1.205","TCP","54","49671 > 36266 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23004","10.536814","172.30.1.205","172.30.1.104","TCP","54","36266 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23005","10.536833","172.30.1.104","172.30.1.205","TCP","54","49671 > 36274 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23006","10.536865","172.30.1.104","172.30.1.205","TCP","54","49671 > 36278 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23007","10.536892","172.30.1.104","172.30.1.205","TCP","54","49671 > 36278 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23008","10.536897","172.30.1.205","172.30.1.104","TCP","54","36278 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23009","10.536918","172.30.1.104","172.30.1.205","TCP","54","49671 > 36282 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23010","10.536946","172.30.1.104","172.30.1.205","TCP","54","49671 > 36282 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23011","10.536950","172.30.1.205","172.30.1.104","TCP","54","36282 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23012","10.536971","172.30.1.104","172.30.1.205","TCP","54","49671 > 36286 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23013","10.536998","172.30.1.104","172.30.1.205","TCP","54","49671 > 36286 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23014","10.537003","172.30.1.205","172.30.1.104","TCP","54","36286 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23015","10.537025","172.30.1.104","172.30.1.205","TCP","54","49671 > 36290 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23016","10.537052","172.30.1.104","172.30.1.205","TCP","54","49671 > 36290 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23017","10.537056","172.30.1.205","172.30.1.104","TCP","54","36290 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23018","10.537077","172.30.1.104","172.30.1.205","TCP","54","49671 > 36294 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23019","10.537103","172.30.1.104","172.30.1.205","TCP","54","49671 > 36294 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23020","10.537107","172.30.1.205","172.30.1.104","TCP","54","36294 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23021","10.537130","172.30.1.104","172.30.1.205","TCP","54","49671 > 36298 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23022","10.537156","172.30.1.104","172.30.1.205","TCP","54","49671 > 36302 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23023","10.537183","172.30.1.104","172.30.1.205","TCP","54","49671 > 36298 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23024","10.537186","172.30.1.205","172.30.1.104","TCP","54","36298 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23025","10.537210","172.30.1.104","172.30.1.205","TCP","54","49671 > 36302 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23026","10.537213","172.30.1.205","172.30.1.104","TCP","54","36302 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23027","10.537387","172.30.1.104","172.30.1.205","TCP","54","49671 > 36306 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23028","10.537414","172.30.1.104","172.30.1.205","TCP","54","49671 > 36306 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23029","10.537418","172.30.1.205","172.30.1.104","TCP","54","36306 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23030","10.537443","172.30.1.104","172.30.1.205","TCP","54","49671 > 36270 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23031","10.537446","172.30.1.205","172.30.1.104","TCP","54","36270 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23032","10.537470","172.30.1.104","172.30.1.205","TCP","54","49671 > 36274 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23033","10.537473","172.30.1.205","172.30.1.104","TCP","54","36274 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23034","10.537837","172.30.1.104","172.30.1.205","TCP","54","49671 > 36262 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23035","10.537859","172.30.1.104","172.30.1.205","TCP","54","49671 > 36262 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23036","10.537864","172.30.1.205","172.30.1.104","TCP","54","36262 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23037","10.538187","172.30.1.205","172.30.1.104","TCP","54","43672 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23038","10.538305","172.30.1.205","172.30.1.104","TCP","74","36310 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913764 TSecr=0 WS=128" "23039","10.538454","172.30.1.104","172.30.1.205","TCP","54","135 > 43672 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23040","10.538504","172.30.1.104","172.30.1.205","TCP","54","135 > 43672 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23041","10.538509","172.30.1.205","172.30.1.104","TCP","54","43672 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23042","10.538609","172.30.1.104","172.30.1.205","TCP","66","49671 > 36310 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23043","10.538618","172.30.1.205","172.30.1.104","TCP","54","36310 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23044","10.538984","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23045","10.539303","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23046","10.539310","172.30.1.205","172.30.1.104","TCP","54","36310 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23047","10.541222","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23048","10.541647","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23049","10.541653","172.30.1.205","172.30.1.104","TCP","54","36310 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23050","10.543015","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23051","10.545213","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23052","10.545223","172.30.1.205","172.30.1.104","TCP","54","36310 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23053","10.546190","172.30.1.205","172.30.1.104","TCP","74","43676 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913772 TSecr=0 WS=128" "23054","10.546507","172.30.1.104","172.30.1.205","TCP","66","135 > 43676 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23055","10.546517","172.30.1.205","172.30.1.104","TCP","54","43676 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23056","10.546875","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23057","10.547195","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23058","10.547204","172.30.1.205","172.30.1.104","TCP","54","43676 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23059","10.549413","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23060","10.549841","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23061","10.549848","172.30.1.205","172.30.1.104","TCP","54","43676 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23062","10.551683","172.30.1.205","172.30.1.104","TCP","54","43676 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23063","10.551803","172.30.1.205","172.30.1.104","TCP","74","36314 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913778 TSecr=0 WS=128" "23064","10.551957","172.30.1.104","172.30.1.205","TCP","54","135 > 43676 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23065","10.552010","172.30.1.104","172.30.1.205","TCP","54","135 > 43676 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23066","10.552016","172.30.1.205","172.30.1.104","TCP","54","43676 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23067","10.552135","172.30.1.104","172.30.1.205","TCP","66","49671 > 36314 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23068","10.552143","172.30.1.205","172.30.1.104","TCP","54","36314 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23069","10.552490","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23070","10.552846","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23071","10.552855","172.30.1.205","172.30.1.104","TCP","54","36314 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23072","10.554749","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23073","10.555134","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23074","10.555140","172.30.1.205","172.30.1.104","TCP","54","36314 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23075","10.556509","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23076","10.558681","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23077","10.558690","172.30.1.205","172.30.1.104","TCP","54","36314 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23078","10.559658","172.30.1.205","172.30.1.104","TCP","74","43680 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913786 TSecr=0 WS=128" "23079","10.559958","172.30.1.104","172.30.1.205","TCP","66","135 > 43680 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23080","10.559969","172.30.1.205","172.30.1.104","TCP","54","43680 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23081","10.560325","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23082","10.560627","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23083","10.560635","172.30.1.205","172.30.1.104","TCP","54","43680 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23084","10.562862","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23085","10.563299","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23086","10.563305","172.30.1.205","172.30.1.104","TCP","54","43680 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23087","10.565152","172.30.1.205","172.30.1.104","TCP","54","43680 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23088","10.565264","172.30.1.205","172.30.1.104","TCP","74","36318 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913791 TSecr=0 WS=128" "23089","10.565434","172.30.1.104","172.30.1.205","TCP","54","135 > 43680 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23090","10.565474","172.30.1.104","172.30.1.205","TCP","54","135 > 43680 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23091","10.565480","172.30.1.205","172.30.1.104","TCP","54","43680 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23092","10.565583","172.30.1.104","172.30.1.205","TCP","66","49671 > 36318 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23093","10.565591","172.30.1.205","172.30.1.104","TCP","54","36318 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23094","10.565938","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23095","10.566314","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23096","10.566321","172.30.1.205","172.30.1.104","TCP","54","36318 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23097","10.568196","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23098","10.568636","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23099","10.568643","172.30.1.205","172.30.1.104","TCP","54","36318 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23100","10.570052","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23101","10.572194","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23102","10.572206","172.30.1.205","172.30.1.104","TCP","54","36318 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23103","10.573256","172.30.1.205","172.30.1.104","TCP","74","43684 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913799 TSecr=0 WS=128" "23104","10.573600","172.30.1.104","172.30.1.205","TCP","66","135 > 43684 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23105","10.573617","172.30.1.205","172.30.1.104","TCP","54","43684 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23106","10.574032","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23107","10.574395","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23108","10.574405","172.30.1.205","172.30.1.104","TCP","54","43684 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23109","10.576663","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23110","10.577066","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23111","10.577073","172.30.1.205","172.30.1.104","TCP","54","43684 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23112","10.578914","172.30.1.205","172.30.1.104","TCP","54","43684 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23113","10.579035","172.30.1.205","172.30.1.104","TCP","74","36322 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913805 TSecr=0 WS=128" "23114","10.579202","172.30.1.104","172.30.1.205","TCP","54","135 > 43684 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23115","10.579243","172.30.1.104","172.30.1.205","TCP","54","135 > 43684 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23116","10.579248","172.30.1.205","172.30.1.104","TCP","54","43684 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23117","10.579335","172.30.1.104","172.30.1.205","TCP","66","49671 > 36322 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23118","10.579343","172.30.1.205","172.30.1.104","TCP","54","36322 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23119","10.579694","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23120","10.580930","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23121","10.580939","172.30.1.205","172.30.1.104","TCP","54","36322 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23122","10.582848","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23123","10.583272","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23124","10.583278","172.30.1.205","172.30.1.104","TCP","54","36322 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23125","10.584672","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23126","10.586899","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23127","10.586909","172.30.1.205","172.30.1.104","TCP","54","36322 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23128","10.587873","172.30.1.205","172.30.1.104","TCP","74","43688 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913814 TSecr=0 WS=128" "23129","10.588238","172.30.1.104","172.30.1.205","TCP","66","135 > 43688 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23130","10.588248","172.30.1.205","172.30.1.104","TCP","54","43688 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23131","10.588600","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23132","10.588900","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23133","10.588909","172.30.1.205","172.30.1.104","TCP","54","43688 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23134","10.591112","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23135","10.591550","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23136","10.591556","172.30.1.205","172.30.1.104","TCP","54","43688 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23137","10.593399","172.30.1.205","172.30.1.104","TCP","54","43688 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23138","10.593516","172.30.1.205","172.30.1.104","TCP","74","36326 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913819 TSecr=0 WS=128" "23139","10.593685","172.30.1.104","172.30.1.205","TCP","54","135 > 43688 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23140","10.593713","172.30.1.104","172.30.1.205","TCP","54","135 > 43688 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23141","10.593718","172.30.1.205","172.30.1.104","TCP","54","43688 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23142","10.593790","172.30.1.104","172.30.1.205","TCP","66","49671 > 36326 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23143","10.593798","172.30.1.205","172.30.1.104","TCP","54","36326 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23144","10.594202","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23145","10.594556","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23146","10.594565","172.30.1.205","172.30.1.104","TCP","54","36326 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23147","10.596435","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23148","10.596848","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23149","10.596856","172.30.1.205","172.30.1.104","TCP","54","36326 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23150","10.598236","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23151","10.600428","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23152","10.600437","172.30.1.205","172.30.1.104","TCP","54","36326 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23153","10.601409","172.30.1.205","172.30.1.104","TCP","74","43692 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913827 TSecr=0 WS=128" "23154","10.601761","172.30.1.104","172.30.1.205","TCP","66","135 > 43692 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23155","10.601771","172.30.1.205","172.30.1.104","TCP","54","43692 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23156","10.602123","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23157","10.602429","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23158","10.602438","172.30.1.205","172.30.1.104","TCP","54","43692 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23159","10.604634","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23160","10.605066","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23161","10.605074","172.30.1.205","172.30.1.104","TCP","54","43692 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23162","10.606930","172.30.1.205","172.30.1.104","TCP","54","43692 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23163","10.607043","172.30.1.205","172.30.1.104","TCP","74","36330 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913833 TSecr=0 WS=128" "23164","10.607226","172.30.1.104","172.30.1.205","TCP","54","135 > 43692 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23165","10.607293","172.30.1.104","172.30.1.205","TCP","54","135 > 43692 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23166","10.607299","172.30.1.205","172.30.1.104","TCP","54","43692 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23167","10.607382","172.30.1.104","172.30.1.205","TCP","66","49671 > 36330 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23168","10.607390","172.30.1.205","172.30.1.104","TCP","54","36330 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23169","10.607737","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23170","10.608060","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23171","10.608069","172.30.1.205","172.30.1.104","TCP","54","36330 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23172","10.610001","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23173","10.610395","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23174","10.610402","172.30.1.205","172.30.1.104","TCP","54","36330 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23175","10.611805","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23176","10.614036","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23177","10.614046","172.30.1.205","172.30.1.104","TCP","54","36330 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23178","10.615007","172.30.1.205","172.30.1.104","TCP","74","43696 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913841 TSecr=0 WS=128" "23179","10.615330","172.30.1.104","172.30.1.205","TCP","66","135 > 43696 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23180","10.615343","172.30.1.205","172.30.1.104","TCP","54","43696 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23181","10.615701","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23182","10.616020","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23183","10.616029","172.30.1.205","172.30.1.104","TCP","54","43696 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23184","10.618253","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23185","10.618685","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23186","10.618692","172.30.1.205","172.30.1.104","TCP","54","43696 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23187","10.620501","172.30.1.205","172.30.1.104","TCP","54","43696 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23188","10.620613","172.30.1.205","172.30.1.104","TCP","74","36334 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913847 TSecr=0 WS=128" "23189","10.620792","172.30.1.104","172.30.1.205","TCP","54","135 > 43696 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23190","10.620826","172.30.1.104","172.30.1.205","TCP","54","135 > 43696 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23191","10.620832","172.30.1.205","172.30.1.104","TCP","54","43696 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23192","10.620913","172.30.1.104","172.30.1.205","TCP","66","49671 > 36334 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23193","10.620921","172.30.1.205","172.30.1.104","TCP","54","36334 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23194","10.621274","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23195","10.621608","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23196","10.621617","172.30.1.205","172.30.1.104","TCP","54","36334 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23197","10.623501","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23198","10.623929","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23199","10.623935","172.30.1.205","172.30.1.104","TCP","54","36334 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23200","10.625334","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23201","10.627645","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23202","10.627656","172.30.1.205","172.30.1.104","TCP","54","36334 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23203","10.628618","172.30.1.205","172.30.1.104","TCP","74","43700 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913855 TSecr=0 WS=128" "23204","10.628933","172.30.1.104","172.30.1.205","TCP","66","135 > 43700 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23205","10.628945","172.30.1.205","172.30.1.104","TCP","54","43700 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23206","10.629307","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23207","10.629649","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23208","10.629658","172.30.1.205","172.30.1.104","TCP","54","43700 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23209","10.631865","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23210","10.632300","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23211","10.632306","172.30.1.205","172.30.1.104","TCP","54","43700 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23212","10.634136","172.30.1.205","172.30.1.104","TCP","54","43700 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23213","10.634249","172.30.1.205","172.30.1.104","TCP","74","36338 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913860 TSecr=0 WS=128" "23214","10.634412","172.30.1.104","172.30.1.205","TCP","54","135 > 43700 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23215","10.634447","172.30.1.104","172.30.1.205","TCP","54","135 > 43700 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23216","10.634453","172.30.1.205","172.30.1.104","TCP","54","43700 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23217","10.634527","172.30.1.104","172.30.1.205","TCP","66","49671 > 36338 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23218","10.634535","172.30.1.205","172.30.1.104","TCP","54","36338 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23219","10.634886","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23220","10.635218","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23221","10.635229","172.30.1.205","172.30.1.104","TCP","54","36338 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23222","10.637291","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23223","10.637695","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23224","10.637703","172.30.1.205","172.30.1.104","TCP","54","36338 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23225","10.639107","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23226","10.641301","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23227","10.641311","172.30.1.205","172.30.1.104","TCP","54","36338 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23228","10.642297","172.30.1.205","172.30.1.104","TCP","74","43704 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913868 TSecr=0 WS=128" "23229","10.642613","172.30.1.104","172.30.1.205","TCP","66","135 > 43704 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23230","10.642625","172.30.1.205","172.30.1.104","TCP","54","43704 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23231","10.642979","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23232","10.643303","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23233","10.643312","172.30.1.205","172.30.1.104","TCP","54","43704 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23234","10.645528","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23235","10.645966","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23236","10.645973","172.30.1.205","172.30.1.104","TCP","54","43704 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23237","10.647798","172.30.1.205","172.30.1.104","TCP","54","43704 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23238","10.647911","172.30.1.205","172.30.1.104","TCP","74","36342 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913874 TSecr=0 WS=128" "23239","10.648080","172.30.1.104","172.30.1.205","TCP","54","135 > 43704 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23240","10.648116","172.30.1.104","172.30.1.205","TCP","54","135 > 43704 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23241","10.648122","172.30.1.205","172.30.1.104","TCP","54","43704 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23242","10.648204","172.30.1.104","172.30.1.205","TCP","66","49671 > 36342 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23243","10.648213","172.30.1.205","172.30.1.104","TCP","54","36342 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23244","10.648560","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23245","10.648867","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23246","10.648876","172.30.1.205","172.30.1.104","TCP","54","36342 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23247","10.650776","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23248","10.651171","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23249","10.651178","172.30.1.205","172.30.1.104","TCP","54","36342 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23250","10.652531","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23251","10.654717","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23252","10.654728","172.30.1.205","172.30.1.104","TCP","54","36342 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23253","10.655697","172.30.1.205","172.30.1.104","TCP","74","43708 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913882 TSecr=0 WS=128" "23254","10.656023","172.30.1.104","172.30.1.205","TCP","66","135 > 43708 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23255","10.656034","172.30.1.205","172.30.1.104","TCP","54","43708 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23256","10.656389","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23257","10.656699","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23258","10.656710","172.30.1.205","172.30.1.104","TCP","54","43708 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23259","10.658944","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23260","10.659328","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23261","10.659334","172.30.1.205","172.30.1.104","TCP","54","43708 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23262","10.661175","172.30.1.205","172.30.1.104","TCP","54","43708 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23263","10.661293","172.30.1.205","172.30.1.104","TCP","74","36346 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913887 TSecr=0 WS=128" "23264","10.661451","172.30.1.104","172.30.1.205","TCP","54","135 > 43708 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23265","10.661491","172.30.1.104","172.30.1.205","TCP","54","135 > 43708 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23266","10.661498","172.30.1.205","172.30.1.104","TCP","54","43708 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23267","10.661602","172.30.1.104","172.30.1.205","TCP","66","49671 > 36346 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23268","10.661611","172.30.1.205","172.30.1.104","TCP","54","36346 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23269","10.661959","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23270","10.662264","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23271","10.662274","172.30.1.205","172.30.1.104","TCP","54","36346 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23272","10.664152","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23273","10.664532","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23274","10.664539","172.30.1.205","172.30.1.104","TCP","54","36346 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23275","10.665940","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23276","10.668208","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23277","10.668218","172.30.1.205","172.30.1.104","TCP","54","36346 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23278","10.669205","172.30.1.205","172.30.1.104","TCP","74","43712 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913895 TSecr=0 WS=128" "23279","10.669510","172.30.1.104","172.30.1.205","TCP","66","135 > 43712 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23280","10.669521","172.30.1.205","172.30.1.104","TCP","54","43712 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23281","10.669882","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23282","10.670182","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23283","10.670191","172.30.1.205","172.30.1.104","TCP","54","43712 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23284","10.672379","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23285","10.672808","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23286","10.672815","172.30.1.205","172.30.1.104","TCP","54","43712 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23287","10.674627","172.30.1.205","172.30.1.104","TCP","54","43712 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23288","10.674741","172.30.1.205","172.30.1.104","TCP","74","36350 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913901 TSecr=0 WS=128" "23289","10.674958","172.30.1.104","172.30.1.205","TCP","54","135 > 43712 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23290","10.674990","172.30.1.104","172.30.1.205","TCP","54","135 > 43712 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23291","10.674996","172.30.1.205","172.30.1.104","TCP","54","43712 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23292","10.675047","172.30.1.104","172.30.1.205","TCP","66","49671 > 36350 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23293","10.675056","172.30.1.205","172.30.1.104","TCP","54","36350 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23294","10.675403","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23295","10.677884","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23296","10.677894","172.30.1.205","172.30.1.104","TCP","54","36350 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23297","10.679801","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23298","10.680195","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23299","10.680201","172.30.1.205","172.30.1.104","TCP","54","36350 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23300","10.681579","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23301","10.683918","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23302","10.683929","172.30.1.205","172.30.1.104","TCP","54","36350 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23303","10.684886","172.30.1.205","172.30.1.104","TCP","74","43716 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913911 TSecr=0 WS=128" "23304","10.685226","172.30.1.104","172.30.1.205","TCP","66","135 > 43716 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23305","10.685237","172.30.1.205","172.30.1.104","TCP","54","43716 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23306","10.685597","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23307","10.685952","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23308","10.685962","172.30.1.205","172.30.1.104","TCP","54","43716 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23309","10.688158","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23310","10.688604","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23311","10.688611","172.30.1.205","172.30.1.104","TCP","54","43716 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23312","10.690448","172.30.1.205","172.30.1.104","TCP","54","43716 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23313","10.690562","172.30.1.205","172.30.1.104","TCP","74","36354 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913916 TSecr=0 WS=128" "23314","10.690746","172.30.1.104","172.30.1.205","TCP","54","135 > 43716 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23315","10.690782","172.30.1.104","172.30.1.205","TCP","54","135 > 43716 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23316","10.690788","172.30.1.205","172.30.1.104","TCP","54","43716 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23317","10.690862","172.30.1.104","172.30.1.205","TCP","66","49671 > 36354 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23318","10.690871","172.30.1.205","172.30.1.104","TCP","54","36354 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23319","10.691216","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23320","10.691534","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23321","10.691543","172.30.1.205","172.30.1.104","TCP","54","36354 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23322","10.693461","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23323","10.693844","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23324","10.693850","172.30.1.205","172.30.1.104","TCP","54","36354 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23325","10.695198","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23326","10.697416","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23327","10.697426","172.30.1.205","172.30.1.104","TCP","54","36354 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23328","10.698395","172.30.1.205","172.30.1.104","TCP","74","43720 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913924 TSecr=0 WS=128" "23329","10.698703","172.30.1.104","172.30.1.205","TCP","66","135 > 43720 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23330","10.698714","172.30.1.205","172.30.1.104","TCP","54","43720 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23331","10.699072","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23332","10.699374","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23333","10.699383","172.30.1.205","172.30.1.104","TCP","54","43720 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23334","10.701668","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23335","10.702118","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23336","10.702125","172.30.1.205","172.30.1.104","TCP","54","43720 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23337","10.703058","172.30.1.205","172.30.1.104","TCP","54","36314 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23338","10.703108","172.30.1.205","172.30.1.104","TCP","54","36318 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23339","10.703145","172.30.1.205","172.30.1.104","TCP","54","36322 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23340","10.703173","172.30.1.205","172.30.1.104","TCP","54","36326 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23341","10.703207","172.30.1.205","172.30.1.104","TCP","54","36330 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23342","10.703232","172.30.1.205","172.30.1.104","TCP","54","36334 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23343","10.703260","172.30.1.205","172.30.1.104","TCP","54","36338 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23344","10.703287","172.30.1.205","172.30.1.104","TCP","54","36342 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23345","10.703326","172.30.1.205","172.30.1.104","TCP","54","36346 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23346","10.703357","172.30.1.205","172.30.1.104","TCP","54","36350 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23347","10.703383","172.30.1.205","172.30.1.104","TCP","54","36354 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23348","10.703462","172.30.1.205","172.30.1.104","TCP","54","36310 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23349","10.703722","172.30.1.104","172.30.1.205","TCP","54","49671 > 36314 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23350","10.703758","172.30.1.104","172.30.1.205","TCP","54","49671 > 36318 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23351","10.703783","172.30.1.104","172.30.1.205","TCP","54","49671 > 36314 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23352","10.703790","172.30.1.205","172.30.1.104","TCP","54","36314 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23353","10.703823","172.30.1.104","172.30.1.205","TCP","54","49671 > 36322 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23354","10.703849","172.30.1.104","172.30.1.205","TCP","54","49671 > 36326 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23355","10.703873","172.30.1.104","172.30.1.205","TCP","54","49671 > 36326 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23356","10.703877","172.30.1.205","172.30.1.104","TCP","54","36326 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23357","10.703928","172.30.1.104","172.30.1.205","TCP","54","49671 > 36330 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23358","10.703964","172.30.1.104","172.30.1.205","TCP","54","49671 > 36334 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23359","10.703998","172.30.1.104","172.30.1.205","TCP","54","49671 > 36330 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23360","10.704003","172.30.1.205","172.30.1.104","TCP","54","36330 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23361","10.704021","172.30.1.104","172.30.1.205","TCP","54","49671 > 36334 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23362","10.704023","172.30.1.205","172.30.1.104","TCP","54","36334 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23363","10.704071","172.30.1.104","172.30.1.205","TCP","54","49671 > 36338 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23364","10.704097","172.30.1.104","172.30.1.205","TCP","54","49671 > 36318 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23365","10.704101","172.30.1.205","172.30.1.104","TCP","54","36318 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23366","10.704120","172.30.1.104","172.30.1.205","TCP","54","49671 > 36342 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23367","10.704143","172.30.1.104","172.30.1.205","TCP","54","49671 > 36342 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23368","10.704147","172.30.1.205","172.30.1.104","TCP","54","36342 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23369","10.704171","172.30.1.104","172.30.1.205","TCP","54","49671 > 36346 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23370","10.704273","172.30.1.104","172.30.1.205","TCP","54","49671 > 36322 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23371","10.704278","172.30.1.205","172.30.1.104","TCP","54","36322 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23372","10.704299","172.30.1.104","172.30.1.205","TCP","54","49671 > 36346 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23373","10.704302","172.30.1.205","172.30.1.104","TCP","54","36346 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23374","10.704323","172.30.1.104","172.30.1.205","TCP","54","49671 > 36350 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23375","10.704348","172.30.1.104","172.30.1.205","TCP","54","49671 > 36350 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23376","10.704351","172.30.1.205","172.30.1.104","TCP","54","36350 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23377","10.704372","172.30.1.104","172.30.1.205","TCP","54","49671 > 36354 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23378","10.704396","172.30.1.104","172.30.1.205","TCP","54","49671 > 36354 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23379","10.704412","172.30.1.205","172.30.1.104","TCP","54","36354 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23380","10.704422","172.30.1.104","172.30.1.205","TCP","54","49671 > 36338 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23381","10.704424","172.30.1.205","172.30.1.104","TCP","54","36338 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23382","10.704930","172.30.1.104","172.30.1.205","TCP","54","49671 > 36310 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23383","10.704970","172.30.1.104","172.30.1.205","TCP","54","49671 > 36310 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23384","10.704976","172.30.1.205","172.30.1.104","TCP","54","36310 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23385","10.705215","172.30.1.205","172.30.1.104","TCP","54","43720 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23386","10.705327","172.30.1.205","172.30.1.104","TCP","74","36358 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913931 TSecr=0 WS=128" "23387","10.705499","172.30.1.104","172.30.1.205","TCP","54","135 > 43720 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23388","10.705554","172.30.1.104","172.30.1.205","TCP","54","135 > 43720 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23389","10.705561","172.30.1.205","172.30.1.104","TCP","54","43720 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23390","10.705630","172.30.1.104","172.30.1.205","TCP","66","49671 > 36358 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23391","10.705640","172.30.1.205","172.30.1.104","TCP","54","36358 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23392","10.706027","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23393","10.706350","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23394","10.706359","172.30.1.205","172.30.1.104","TCP","54","36358 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23395","10.708246","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23396","10.708633","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23397","10.708640","172.30.1.205","172.30.1.104","TCP","54","36358 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23398","10.710038","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23399","10.712312","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23400","10.712322","172.30.1.205","172.30.1.104","TCP","54","36358 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23401","10.713297","172.30.1.205","172.30.1.104","TCP","74","43724 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913939 TSecr=0 WS=128" "23402","10.713610","172.30.1.104","172.30.1.205","TCP","66","135 > 43724 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23403","10.713621","172.30.1.205","172.30.1.104","TCP","54","43724 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23404","10.713972","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23405","10.714274","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23406","10.714283","172.30.1.205","172.30.1.104","TCP","54","43724 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23407","10.716481","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23408","10.716929","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23409","10.716936","172.30.1.205","172.30.1.104","TCP","54","43724 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23410","10.718730","172.30.1.205","172.30.1.104","TCP","54","43724 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23411","10.718844","172.30.1.205","172.30.1.104","TCP","74","36362 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913945 TSecr=0 WS=128" "23412","10.719019","172.30.1.104","172.30.1.205","TCP","54","135 > 43724 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23413","10.719053","172.30.1.104","172.30.1.205","TCP","54","135 > 43724 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23414","10.719058","172.30.1.205","172.30.1.104","TCP","54","43724 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23415","10.719128","172.30.1.104","172.30.1.205","TCP","66","49671 > 36362 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23416","10.719136","172.30.1.205","172.30.1.104","TCP","54","36362 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23417","10.719481","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23418","10.719792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23419","10.719800","172.30.1.205","172.30.1.104","TCP","54","36362 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23420","10.721725","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23421","10.722131","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23422","10.722138","172.30.1.205","172.30.1.104","TCP","54","36362 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23423","10.723484","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23424","10.725659","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23425","10.725668","172.30.1.205","172.30.1.104","TCP","54","36362 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23426","10.726613","172.30.1.205","172.30.1.104","TCP","74","43728 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913953 TSecr=0 WS=128" "23427","10.726924","172.30.1.104","172.30.1.205","TCP","66","135 > 43728 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23428","10.726935","172.30.1.205","172.30.1.104","TCP","54","43728 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23429","10.727285","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23430","10.727609","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23431","10.727618","172.30.1.205","172.30.1.104","TCP","54","43728 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23432","10.729839","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23433","10.730250","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23434","10.730257","172.30.1.205","172.30.1.104","TCP","54","43728 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23435","10.732074","172.30.1.205","172.30.1.104","TCP","54","43728 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23436","10.732191","172.30.1.205","172.30.1.104","TCP","74","36366 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913958 TSecr=0 WS=128" "23437","10.732343","172.30.1.104","172.30.1.205","TCP","54","135 > 43728 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23438","10.732460","172.30.1.104","172.30.1.205","TCP","66","49671 > 36366 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23439","10.732469","172.30.1.205","172.30.1.104","TCP","54","36366 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23440","10.732842","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23441","10.733469","172.30.1.104","172.30.1.205","TCP","54","135 > 43728 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23442","10.733476","172.30.1.205","172.30.1.104","TCP","54","43728 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23443","10.733592","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23444","10.733607","172.30.1.205","172.30.1.104","TCP","54","36366 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23445","10.735516","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23446","10.735889","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23447","10.735895","172.30.1.205","172.30.1.104","TCP","54","36366 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23448","10.737348","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23449","10.739541","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23450","10.739550","172.30.1.205","172.30.1.104","TCP","54","36366 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23451","10.740495","172.30.1.205","172.30.1.104","TCP","74","43732 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913966 TSecr=0 WS=128" "23452","10.740806","172.30.1.104","172.30.1.205","TCP","66","135 > 43732 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23453","10.740817","172.30.1.205","172.30.1.104","TCP","54","43732 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23454","10.741174","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23455","10.741464","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23456","10.741473","172.30.1.205","172.30.1.104","TCP","54","43732 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23457","10.743657","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23458","10.744066","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23459","10.744073","172.30.1.205","172.30.1.104","TCP","54","43732 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23460","10.745919","172.30.1.205","172.30.1.104","TCP","54","43732 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23461","10.746034","172.30.1.205","172.30.1.104","TCP","74","36370 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913972 TSecr=0 WS=128" "23462","10.746228","172.30.1.104","172.30.1.205","TCP","54","135 > 43732 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23463","10.746314","172.30.1.104","172.30.1.205","TCP","54","135 > 43732 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23464","10.746321","172.30.1.205","172.30.1.104","TCP","54","43732 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23465","10.746387","172.30.1.104","172.30.1.205","TCP","66","49671 > 36370 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23466","10.746396","172.30.1.205","172.30.1.104","TCP","54","36370 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23467","10.746747","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23468","10.748617","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23469","10.748624","172.30.1.205","172.30.1.104","TCP","54","36370 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23470","10.750536","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23471","10.750933","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23472","10.750939","172.30.1.205","172.30.1.104","TCP","54","36370 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23473","10.752305","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23474","10.754447","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23475","10.754457","172.30.1.205","172.30.1.104","TCP","54","36370 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23476","10.755425","172.30.1.205","172.30.1.104","TCP","74","43736 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913981 TSecr=0 WS=128" "23477","10.755792","172.30.1.104","172.30.1.205","TCP","66","135 > 43736 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23478","10.755805","172.30.1.205","172.30.1.104","TCP","54","43736 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23479","10.756167","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23480","10.756486","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23481","10.756495","172.30.1.205","172.30.1.104","TCP","54","43736 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23482","10.758698","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23483","10.759137","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23484","10.759144","172.30.1.205","172.30.1.104","TCP","54","43736 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23485","10.760985","172.30.1.205","172.30.1.104","TCP","54","43736 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23486","10.761096","172.30.1.205","172.30.1.104","TCP","74","36374 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913987 TSecr=0 WS=128" "23487","10.761285","172.30.1.104","172.30.1.205","TCP","54","135 > 43736 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23488","10.761295","172.30.1.104","172.30.1.205","TCP","54","135 > 43736 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23489","10.761301","172.30.1.205","172.30.1.104","TCP","54","43736 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23490","10.761386","172.30.1.104","172.30.1.205","TCP","66","49671 > 36374 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23491","10.761395","172.30.1.205","172.30.1.104","TCP","54","36374 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23492","10.761738","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23493","10.762077","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23494","10.762086","172.30.1.205","172.30.1.104","TCP","54","36374 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23495","10.763962","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23496","10.764370","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23497","10.764384","172.30.1.205","172.30.1.104","TCP","54","36374 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23498","10.765759","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23499","10.768029","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23500","10.768038","172.30.1.205","172.30.1.104","TCP","54","36374 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23501","10.768990","172.30.1.205","172.30.1.104","TCP","74","43740 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499913995 TSecr=0 WS=128" "23502","10.769292","172.30.1.104","172.30.1.205","TCP","66","135 > 43740 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23503","10.769302","172.30.1.205","172.30.1.104","TCP","54","43740 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23504","10.769656","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23505","10.769982","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23506","10.769991","172.30.1.205","172.30.1.104","TCP","54","43740 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23507","10.772168","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23508","10.772581","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23509","10.772588","172.30.1.205","172.30.1.104","TCP","54","43740 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23510","10.774432","172.30.1.205","172.30.1.104","TCP","54","43740 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23511","10.774554","172.30.1.205","172.30.1.104","TCP","74","36378 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914000 TSecr=0 WS=128" "23512","10.774707","172.30.1.104","172.30.1.205","TCP","54","135 > 43740 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23513","10.774751","172.30.1.104","172.30.1.205","TCP","54","135 > 43740 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23514","10.774757","172.30.1.205","172.30.1.104","TCP","54","43740 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23515","10.774895","172.30.1.104","172.30.1.205","TCP","66","49671 > 36378 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23516","10.774904","172.30.1.205","172.30.1.104","TCP","54","36378 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23517","10.775253","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23518","10.776807","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23519","10.776816","172.30.1.205","172.30.1.104","TCP","54","36378 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23520","10.778708","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23521","10.781840","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23522","10.781847","172.30.1.205","172.30.1.104","TCP","54","36378 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23523","10.783234","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23524","10.785510","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23525","10.785521","172.30.1.205","172.30.1.104","TCP","54","36378 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23526","10.786524","172.30.1.205","172.30.1.104","TCP","74","43744 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914012 TSecr=0 WS=128" "23527","10.786840","172.30.1.104","172.30.1.205","TCP","66","135 > 43744 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23528","10.786852","172.30.1.205","172.30.1.104","TCP","54","43744 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23529","10.787214","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23530","10.787573","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23531","10.787582","172.30.1.205","172.30.1.104","TCP","54","43744 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23532","10.789822","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23533","10.790244","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23534","10.790251","172.30.1.205","172.30.1.104","TCP","54","43744 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23535","10.792076","172.30.1.205","172.30.1.104","TCP","54","43744 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23536","10.792190","172.30.1.205","172.30.1.104","TCP","74","36382 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914018 TSecr=0 WS=128" "23537","10.792369","172.30.1.104","172.30.1.205","TCP","54","135 > 43744 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23538","10.792412","172.30.1.104","172.30.1.205","TCP","54","135 > 43744 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23539","10.792418","172.30.1.205","172.30.1.104","TCP","54","43744 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23540","10.792500","172.30.1.104","172.30.1.205","TCP","66","49671 > 36382 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23541","10.792509","172.30.1.205","172.30.1.104","TCP","54","36382 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23542","10.792883","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23543","10.793197","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23544","10.793204","172.30.1.205","172.30.1.104","TCP","54","36382 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23545","10.795075","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23546","10.795479","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23547","10.795485","172.30.1.205","172.30.1.104","TCP","54","36382 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23548","10.796903","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23549","10.799549","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23550","10.799558","172.30.1.205","172.30.1.104","TCP","54","36382 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23551","10.800518","172.30.1.205","172.30.1.104","TCP","74","43748 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914026 TSecr=0 WS=128" "23552","10.800873","172.30.1.104","172.30.1.205","TCP","66","135 > 43748 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23553","10.800885","172.30.1.205","172.30.1.104","TCP","54","43748 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23554","10.801245","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23555","10.801556","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23556","10.801565","172.30.1.205","172.30.1.104","TCP","54","43748 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23557","10.803758","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23558","10.804164","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23559","10.804171","172.30.1.205","172.30.1.104","TCP","54","43748 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23560","10.805997","172.30.1.205","172.30.1.104","TCP","54","43748 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23561","10.806108","172.30.1.205","172.30.1.104","TCP","74","36386 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914032 TSecr=0 WS=128" "23562","10.806292","172.30.1.104","172.30.1.205","TCP","54","135 > 43748 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23563","10.806332","172.30.1.104","172.30.1.205","TCP","54","135 > 43748 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23564","10.806337","172.30.1.205","172.30.1.104","TCP","54","43748 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23565","10.806408","172.30.1.104","172.30.1.205","TCP","66","49671 > 36386 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23566","10.806416","172.30.1.205","172.30.1.104","TCP","54","36386 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23567","10.806767","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23568","10.807073","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23569","10.807082","172.30.1.205","172.30.1.104","TCP","54","36386 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23570","10.808997","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23571","10.809383","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23572","10.809389","172.30.1.205","172.30.1.104","TCP","54","36386 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23573","10.810743","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23574","10.813234","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23575","10.813243","172.30.1.205","172.30.1.104","TCP","54","36386 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23576","10.814202","172.30.1.205","172.30.1.104","TCP","74","43752 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914040 TSecr=0 WS=128" "23577","10.814540","172.30.1.104","172.30.1.205","TCP","66","135 > 43752 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23578","10.814551","172.30.1.205","172.30.1.104","TCP","54","43752 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23579","10.814906","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23580","10.815237","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23581","10.815246","172.30.1.205","172.30.1.104","TCP","54","43752 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23582","10.817465","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23583","10.817890","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23584","10.817897","172.30.1.205","172.30.1.104","TCP","54","43752 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23585","10.819710","172.30.1.205","172.30.1.104","TCP","54","43752 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23586","10.819822","172.30.1.205","172.30.1.104","TCP","74","36390 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914046 TSecr=0 WS=128" "23587","10.820031","172.30.1.104","172.30.1.205","TCP","54","135 > 43752 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23588","10.820068","172.30.1.104","172.30.1.205","TCP","54","135 > 43752 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23589","10.820074","172.30.1.205","172.30.1.104","TCP","54","43752 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23590","10.820161","172.30.1.104","172.30.1.205","TCP","66","49671 > 36390 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23591","10.820169","172.30.1.205","172.30.1.104","TCP","54","36390 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23592","10.820514","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23593","10.820941","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23594","10.820952","172.30.1.205","172.30.1.104","TCP","54","36390 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23595","10.822926","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23596","10.823339","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23597","10.823346","172.30.1.205","172.30.1.104","TCP","54","36390 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23598","10.824724","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23599","10.826860","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23600","10.826869","172.30.1.205","172.30.1.104","TCP","54","36390 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23601","10.827810","172.30.1.205","172.30.1.104","TCP","74","43756 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914054 TSecr=0 WS=128" "23602","10.828152","172.30.1.104","172.30.1.205","TCP","66","135 > 43756 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23603","10.828164","172.30.1.205","172.30.1.104","TCP","54","43756 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23604","10.828515","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23605","10.828839","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23606","10.828849","172.30.1.205","172.30.1.104","TCP","54","43756 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23607","10.831055","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23608","10.831476","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23609","10.831482","172.30.1.205","172.30.1.104","TCP","54","43756 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23610","10.833328","172.30.1.205","172.30.1.104","TCP","54","43756 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23611","10.833448","172.30.1.205","172.30.1.104","TCP","74","36394 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914059 TSecr=0 WS=128" "23612","10.833598","172.30.1.104","172.30.1.205","TCP","54","135 > 43756 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23613","10.833631","172.30.1.104","172.30.1.205","TCP","54","135 > 43756 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23614","10.833638","172.30.1.205","172.30.1.104","TCP","54","43756 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23615","10.833738","172.30.1.104","172.30.1.205","TCP","66","49671 > 36394 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23616","10.833746","172.30.1.205","172.30.1.104","TCP","54","36394 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23617","10.834092","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23618","10.834391","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23619","10.834400","172.30.1.205","172.30.1.104","TCP","54","36394 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23620","10.836312","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23621","10.836721","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23622","10.836728","172.30.1.205","172.30.1.104","TCP","54","36394 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23623","10.838117","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23624","10.840385","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23625","10.840396","172.30.1.205","172.30.1.104","TCP","54","36394 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23626","10.841421","172.30.1.205","172.30.1.104","TCP","74","43760 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914067 TSecr=0 WS=128" "23627","10.841755","172.30.1.104","172.30.1.205","TCP","66","135 > 43760 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23628","10.841767","172.30.1.205","172.30.1.104","TCP","54","43760 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23629","10.842123","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23630","10.842455","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23631","10.842464","172.30.1.205","172.30.1.104","TCP","54","43760 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23632","10.844683","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23633","10.845144","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23634","10.845152","172.30.1.205","172.30.1.104","TCP","54","43760 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23635","10.847005","172.30.1.205","172.30.1.104","TCP","54","43760 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23636","10.847124","172.30.1.205","172.30.1.104","TCP","74","36398 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914073 TSecr=0 WS=128" "23637","10.847303","172.30.1.104","172.30.1.205","TCP","54","135 > 43760 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23638","10.847349","172.30.1.104","172.30.1.205","TCP","54","135 > 43760 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23639","10.847355","172.30.1.205","172.30.1.104","TCP","54","43760 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23640","10.847429","172.30.1.104","172.30.1.205","TCP","66","49671 > 36398 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23641","10.847438","172.30.1.205","172.30.1.104","TCP","54","36398 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23642","10.847787","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23643","10.848097","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23644","10.848106","172.30.1.205","172.30.1.104","TCP","54","36398 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23645","10.850038","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23646","10.850430","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23647","10.850436","172.30.1.205","172.30.1.104","TCP","54","36398 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23648","10.851781","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23649","10.854140","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23650","10.854151","172.30.1.205","172.30.1.104","TCP","54","36398 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23651","10.855130","172.30.1.205","172.30.1.104","TCP","74","43764 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914081 TSecr=0 WS=128" "23652","10.855516","172.30.1.104","172.30.1.205","TCP","66","135 > 43764 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23653","10.855527","172.30.1.205","172.30.1.104","TCP","54","43764 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23654","10.855878","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23655","10.859141","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23656","10.859155","172.30.1.205","172.30.1.104","TCP","54","43764 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23657","10.861470","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23658","10.861895","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23659","10.861901","172.30.1.205","172.30.1.104","TCP","54","43764 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23660","10.863751","172.30.1.205","172.30.1.104","TCP","54","43764 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23661","10.863867","172.30.1.205","172.30.1.104","TCP","74","36402 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914090 TSecr=0 WS=128" "23662","10.864060","172.30.1.104","172.30.1.205","TCP","54","135 > 43764 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23663","10.864098","172.30.1.104","172.30.1.205","TCP","54","135 > 43764 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23664","10.864105","172.30.1.205","172.30.1.104","TCP","54","43764 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23665","10.864192","172.30.1.104","172.30.1.205","TCP","66","49671 > 36402 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23666","10.864205","172.30.1.205","172.30.1.104","TCP","54","36402 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23667","10.864607","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23668","10.864931","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23669","10.864940","172.30.1.205","172.30.1.104","TCP","54","36402 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23670","10.866845","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23671","10.867224","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23672","10.867230","172.30.1.205","172.30.1.104","TCP","54","36402 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23673","10.868586","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23674","10.870810","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23675","10.870825","172.30.1.205","172.30.1.104","TCP","54","36402 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23676","10.871848","172.30.1.205","172.30.1.104","TCP","74","43768 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914098 TSecr=0 WS=128" "23677","10.872153","172.30.1.104","172.30.1.205","TCP","66","135 > 43768 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23678","10.872165","172.30.1.205","172.30.1.104","TCP","54","43768 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23679","10.872517","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23680","10.872848","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23681","10.872861","172.30.1.205","172.30.1.104","TCP","54","43768 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23682","10.875104","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23683","10.875524","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23684","10.875531","172.30.1.205","172.30.1.104","TCP","54","43768 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23685","10.876409","172.30.1.205","172.30.1.104","TCP","54","36362 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23686","10.876458","172.30.1.205","172.30.1.104","TCP","54","36366 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23687","10.876496","172.30.1.205","172.30.1.104","TCP","54","36370 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23688","10.876532","172.30.1.205","172.30.1.104","TCP","54","36374 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23689","10.876562","172.30.1.205","172.30.1.104","TCP","54","36378 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23690","10.876589","172.30.1.205","172.30.1.104","TCP","54","36382 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23691","10.876617","172.30.1.205","172.30.1.104","TCP","54","36386 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23692","10.876644","172.30.1.205","172.30.1.104","TCP","54","36390 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23693","10.876677","172.30.1.205","172.30.1.104","TCP","54","36394 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23694","10.876709","172.30.1.205","172.30.1.104","TCP","54","36398 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23695","10.876737","172.30.1.205","172.30.1.104","TCP","54","36402 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23696","10.876838","172.30.1.205","172.30.1.104","TCP","54","36358 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "23697","10.877028","172.30.1.104","172.30.1.205","TCP","54","49671 > 36362 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23698","10.877063","172.30.1.104","172.30.1.205","TCP","54","49671 > 36366 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23699","10.877081","172.30.1.104","172.30.1.205","TCP","54","49671 > 36362 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23700","10.877088","172.30.1.205","172.30.1.104","TCP","54","36362 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23701","10.877109","172.30.1.104","172.30.1.205","TCP","54","49671 > 36370 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23702","10.877171","172.30.1.104","172.30.1.205","TCP","54","49671 > 36374 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23703","10.877189","172.30.1.104","172.30.1.205","TCP","54","49671 > 36374 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23704","10.877194","172.30.1.205","172.30.1.104","TCP","54","36374 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23705","10.877209","172.30.1.104","172.30.1.205","TCP","54","49671 > 36378 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23706","10.877231","172.30.1.104","172.30.1.205","TCP","54","49671 > 36378 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23707","10.877234","172.30.1.205","172.30.1.104","TCP","54","36378 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23708","10.877277","172.30.1.104","172.30.1.205","TCP","54","49671 > 36366 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23709","10.877281","172.30.1.205","172.30.1.104","TCP","54","36366 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23710","10.877295","172.30.1.104","172.30.1.205","TCP","54","49671 > 36382 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23711","10.877314","172.30.1.104","172.30.1.205","TCP","54","49671 > 36370 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23712","10.877318","172.30.1.205","172.30.1.104","TCP","54","36370 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23713","10.877386","172.30.1.104","172.30.1.205","TCP","54","49671 > 36382 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23714","10.877391","172.30.1.205","172.30.1.104","TCP","54","36382 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23715","10.877403","172.30.1.104","172.30.1.205","TCP","54","49671 > 36386 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23716","10.877447","172.30.1.104","172.30.1.205","TCP","54","49671 > 36390 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23717","10.877479","172.30.1.104","172.30.1.205","TCP","54","49671 > 36394 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23718","10.877497","172.30.1.104","172.30.1.205","TCP","54","49671 > 36394 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23719","10.877500","172.30.1.205","172.30.1.104","TCP","54","36394 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23720","10.877515","172.30.1.104","172.30.1.205","TCP","54","49671 > 36398 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23721","10.877590","172.30.1.104","172.30.1.205","TCP","54","49671 > 36398 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23722","10.877594","172.30.1.205","172.30.1.104","TCP","54","36398 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23723","10.877910","172.30.1.104","172.30.1.205","TCP","54","49671 > 36402 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23724","10.877931","172.30.1.104","172.30.1.205","TCP","54","49671 > 36402 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23725","10.877936","172.30.1.205","172.30.1.104","TCP","54","36402 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23726","10.877958","172.30.1.104","172.30.1.205","TCP","54","49671 > 36386 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23727","10.877961","172.30.1.205","172.30.1.104","TCP","54","36386 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23728","10.878006","172.30.1.104","172.30.1.205","TCP","54","49671 > 36390 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23729","10.878009","172.30.1.205","172.30.1.104","TCP","54","36390 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23730","10.878036","172.30.1.104","172.30.1.205","TCP","54","49671 > 36358 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23731","10.878056","172.30.1.104","172.30.1.205","TCP","54","49671 > 36358 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "23732","10.878060","172.30.1.205","172.30.1.104","TCP","54","36358 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "23733","10.878508","172.30.1.205","172.30.1.104","TCP","54","43768 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23734","10.878619","172.30.1.205","172.30.1.104","TCP","74","36406 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914105 TSecr=0 WS=128" "23735","10.878804","172.30.1.104","172.30.1.205","TCP","54","135 > 43768 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23736","10.878825","172.30.1.104","172.30.1.205","TCP","54","135 > 43768 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23737","10.878830","172.30.1.205","172.30.1.104","TCP","54","43768 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23738","10.878939","172.30.1.104","172.30.1.205","TCP","66","49671 > 36406 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23739","10.878947","172.30.1.205","172.30.1.104","TCP","54","36406 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23740","10.879301","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23741","10.879633","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23742","10.879644","172.30.1.205","172.30.1.104","TCP","54","36406 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23743","10.881579","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23744","10.881974","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23745","10.881981","172.30.1.205","172.30.1.104","TCP","54","36406 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23746","10.883335","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23747","10.885531","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23748","10.885540","172.30.1.205","172.30.1.104","TCP","54","36406 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23749","10.886494","172.30.1.205","172.30.1.104","TCP","74","43772 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914112 TSecr=0 WS=128" "23750","10.886862","172.30.1.104","172.30.1.205","TCP","66","135 > 43772 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23751","10.886873","172.30.1.205","172.30.1.104","TCP","54","43772 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23752","10.887228","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23753","10.887567","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23754","10.887576","172.30.1.205","172.30.1.104","TCP","54","43772 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23755","10.889786","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23756","10.890213","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23757","10.890220","172.30.1.205","172.30.1.104","TCP","54","43772 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23758","10.892032","172.30.1.205","172.30.1.104","TCP","54","43772 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23759","10.892148","172.30.1.205","172.30.1.104","TCP","74","36410 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914118 TSecr=0 WS=128" "23760","10.892328","172.30.1.104","172.30.1.205","TCP","54","135 > 43772 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23761","10.892386","172.30.1.104","172.30.1.205","TCP","54","135 > 43772 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23762","10.892391","172.30.1.205","172.30.1.104","TCP","54","43772 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23763","10.892464","172.30.1.104","172.30.1.205","TCP","66","49671 > 36410 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23764","10.892472","172.30.1.205","172.30.1.104","TCP","54","36410 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23765","10.892843","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23766","10.893141","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23767","10.893150","172.30.1.205","172.30.1.104","TCP","54","36410 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23768","10.895035","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23769","10.895452","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23770","10.895458","172.30.1.205","172.30.1.104","TCP","54","36410 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23771","10.896840","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23772","10.899024","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23773","10.899033","172.30.1.205","172.30.1.104","TCP","54","36410 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23774","10.899967","172.30.1.205","172.30.1.104","TCP","74","43776 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914126 TSecr=0 WS=128" "23775","10.900291","172.30.1.104","172.30.1.205","TCP","66","135 > 43776 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23776","10.900303","172.30.1.205","172.30.1.104","TCP","54","43776 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23777","10.900663","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23778","10.900966","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23779","10.900975","172.30.1.205","172.30.1.104","TCP","54","43776 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23780","10.903184","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23781","10.903608","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23782","10.903615","172.30.1.205","172.30.1.104","TCP","54","43776 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23783","10.905456","172.30.1.205","172.30.1.104","TCP","54","43776 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23784","10.905569","172.30.1.205","172.30.1.104","TCP","74","36414 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914131 TSecr=0 WS=128" "23785","10.905766","172.30.1.104","172.30.1.205","TCP","54","135 > 43776 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23786","10.905783","172.30.1.104","172.30.1.205","TCP","54","135 > 43776 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23787","10.905788","172.30.1.205","172.30.1.104","TCP","54","43776 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23788","10.905859","172.30.1.104","172.30.1.205","TCP","66","49671 > 36414 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23789","10.905866","172.30.1.205","172.30.1.104","TCP","54","36414 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23790","10.906284","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23791","10.906584","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23792","10.906593","172.30.1.205","172.30.1.104","TCP","54","36414 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23793","10.908491","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23794","10.908930","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23795","10.908937","172.30.1.205","172.30.1.104","TCP","54","36414 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23796","10.910300","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23797","10.913637","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23798","10.913647","172.30.1.205","172.30.1.104","TCP","54","36414 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23799","10.914628","172.30.1.205","172.30.1.104","TCP","74","43780 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914141 TSecr=0 WS=128" "23800","10.914933","172.30.1.104","172.30.1.205","TCP","66","135 > 43780 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23801","10.914944","172.30.1.205","172.30.1.104","TCP","54","43780 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23802","10.915297","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23803","10.915595","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23804","10.915604","172.30.1.205","172.30.1.104","TCP","54","43780 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23805","10.917857","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23806","10.918255","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23807","10.918261","172.30.1.205","172.30.1.104","TCP","54","43780 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23808","10.920117","172.30.1.205","172.30.1.104","TCP","54","43780 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23809","10.920236","172.30.1.205","172.30.1.104","TCP","74","36418 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914146 TSecr=0 WS=128" "23810","10.920408","172.30.1.104","172.30.1.205","TCP","54","135 > 43780 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23811","10.920466","172.30.1.104","172.30.1.205","TCP","54","135 > 43780 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23812","10.920472","172.30.1.205","172.30.1.104","TCP","54","43780 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23813","10.920544","172.30.1.104","172.30.1.205","TCP","66","49671 > 36418 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23814","10.920553","172.30.1.205","172.30.1.104","TCP","54","36418 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23815","10.920938","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23816","10.921227","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23817","10.921237","172.30.1.205","172.30.1.104","TCP","54","36418 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23818","10.923133","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23819","10.923511","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23820","10.923516","172.30.1.205","172.30.1.104","TCP","54","36418 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23821","10.924921","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23822","10.927165","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23823","10.927176","172.30.1.205","172.30.1.104","TCP","54","36418 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23824","10.928144","172.30.1.205","172.30.1.104","TCP","74","43784 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914154 TSecr=0 WS=128" "23825","10.928460","172.30.1.104","172.30.1.205","TCP","66","135 > 43784 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23826","10.928470","172.30.1.205","172.30.1.104","TCP","54","43784 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23827","10.928851","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23828","10.929152","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23829","10.929161","172.30.1.205","172.30.1.104","TCP","54","43784 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23830","10.931350","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23831","10.931752","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23832","10.931759","172.30.1.205","172.30.1.104","TCP","54","43784 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23833","10.933593","172.30.1.205","172.30.1.104","TCP","54","43784 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23834","10.933710","172.30.1.205","172.30.1.104","TCP","74","36422 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914160 TSecr=0 WS=128" "23835","10.933889","172.30.1.104","172.30.1.205","TCP","54","135 > 43784 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23836","10.933951","172.30.1.104","172.30.1.205","TCP","54","135 > 43784 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23837","10.933956","172.30.1.205","172.30.1.104","TCP","54","43784 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23838","10.934028","172.30.1.104","172.30.1.205","TCP","66","49671 > 36422 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23839","10.934037","172.30.1.205","172.30.1.104","TCP","54","36422 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23840","10.934388","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23841","10.934682","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23842","10.934689","172.30.1.205","172.30.1.104","TCP","54","36422 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23843","10.936546","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23844","10.936954","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23845","10.936961","172.30.1.205","172.30.1.104","TCP","54","36422 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23846","10.938323","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23847","10.940445","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23848","10.940455","172.30.1.205","172.30.1.104","TCP","54","36422 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23849","10.941415","172.30.1.205","172.30.1.104","TCP","74","43788 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914167 TSecr=0 WS=128" "23850","10.941714","172.30.1.104","172.30.1.205","TCP","66","135 > 43788 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23851","10.941725","172.30.1.205","172.30.1.104","TCP","54","43788 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23852","10.942075","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23853","10.942371","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23854","10.942381","172.30.1.205","172.30.1.104","TCP","54","43788 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23855","10.944557","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23856","10.944995","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23857","10.945002","172.30.1.205","172.30.1.104","TCP","54","43788 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23858","10.946831","172.30.1.205","172.30.1.104","TCP","54","43788 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23859","10.946943","172.30.1.205","172.30.1.104","TCP","74","36426 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914173 TSecr=0 WS=128" "23860","10.947115","172.30.1.104","172.30.1.205","TCP","54","135 > 43788 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23861","10.947153","172.30.1.104","172.30.1.205","TCP","54","135 > 43788 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23862","10.947159","172.30.1.205","172.30.1.104","TCP","54","43788 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23863","10.947230","172.30.1.104","172.30.1.205","TCP","66","49671 > 36426 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23864","10.947238","172.30.1.205","172.30.1.104","TCP","54","36426 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23865","10.947584","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23866","10.947907","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23867","10.947916","172.30.1.205","172.30.1.104","TCP","54","36426 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23868","10.949829","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23869","10.950196","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23870","10.950202","172.30.1.205","172.30.1.104","TCP","54","36426 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23871","10.951557","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23872","10.953707","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23873","10.953717","172.30.1.205","172.30.1.104","TCP","54","36426 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23874","10.954669","172.30.1.205","172.30.1.104","TCP","74","43792 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914181 TSecr=0 WS=128" "23875","10.954977","172.30.1.104","172.30.1.205","TCP","66","135 > 43792 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23876","10.954987","172.30.1.205","172.30.1.104","TCP","54","43792 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23877","10.955331","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23878","10.955672","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23879","10.955690","172.30.1.205","172.30.1.104","TCP","54","43792 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23880","10.958009","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23881","10.958447","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23882","10.958454","172.30.1.205","172.30.1.104","TCP","54","43792 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23883","10.960289","172.30.1.205","172.30.1.104","TCP","54","43792 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23884","10.960414","172.30.1.205","172.30.1.104","TCP","74","36430 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914186 TSecr=0 WS=128" "23885","10.960585","172.30.1.104","172.30.1.205","TCP","54","135 > 43792 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23886","10.960617","172.30.1.104","172.30.1.205","TCP","54","135 > 43792 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23887","10.960622","172.30.1.205","172.30.1.104","TCP","54","43792 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23888","10.960704","172.30.1.104","172.30.1.205","TCP","66","49671 > 36430 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23889","10.960712","172.30.1.205","172.30.1.104","TCP","54","36430 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23890","10.961086","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23891","10.961394","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23892","10.961405","172.30.1.205","172.30.1.104","TCP","54","36430 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23893","10.963307","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23894","10.965078","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23895","10.965086","172.30.1.205","172.30.1.104","TCP","54","36430 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23896","10.966475","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23897","10.968670","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23898","10.968685","172.30.1.205","172.30.1.104","TCP","54","36430 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23899","10.969727","172.30.1.205","172.30.1.104","TCP","74","43796 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914196 TSecr=0 WS=128" "23900","10.970047","172.30.1.104","172.30.1.205","TCP","66","135 > 43796 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23901","10.970059","172.30.1.205","172.30.1.104","TCP","54","43796 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23902","10.970421","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23903","10.970743","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23904","10.970752","172.30.1.205","172.30.1.104","TCP","54","43796 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23905","10.972990","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23906","10.973404","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23907","10.973410","172.30.1.205","172.30.1.104","TCP","54","43796 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23908","10.975234","172.30.1.205","172.30.1.104","TCP","54","43796 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23909","10.975348","172.30.1.205","172.30.1.104","TCP","74","36434 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914201 TSecr=0 WS=128" "23910","10.975521","172.30.1.104","172.30.1.205","TCP","54","135 > 43796 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23911","10.975558","172.30.1.104","172.30.1.205","TCP","54","135 > 43796 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23912","10.975565","172.30.1.205","172.30.1.104","TCP","54","43796 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23913","10.975644","172.30.1.104","172.30.1.205","TCP","66","49671 > 36434 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23914","10.975653","172.30.1.205","172.30.1.104","TCP","54","36434 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23915","10.976012","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23916","10.976331","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23917","10.976338","172.30.1.205","172.30.1.104","TCP","54","36434 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23918","10.978232","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23919","10.978618","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23920","10.978625","172.30.1.205","172.30.1.104","TCP","54","36434 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23921","10.979988","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23922","10.982409","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23923","10.982418","172.30.1.205","172.30.1.104","TCP","54","36434 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23924","10.983367","172.30.1.205","172.30.1.104","TCP","74","43800 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914209 TSecr=0 WS=128" "23925","10.983677","172.30.1.104","172.30.1.205","TCP","66","135 > 43800 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23926","10.983688","172.30.1.205","172.30.1.104","TCP","54","43800 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23927","10.984054","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23928","10.984363","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23929","10.984373","172.30.1.205","172.30.1.104","TCP","54","43800 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23930","10.986611","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23931","10.987022","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23932","10.987029","172.30.1.205","172.30.1.104","TCP","54","43800 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23933","10.988868","172.30.1.205","172.30.1.104","TCP","54","43800 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23934","10.988977","172.30.1.205","172.30.1.104","TCP","74","36438 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914215 TSecr=0 WS=128" "23935","10.989144","172.30.1.104","172.30.1.205","TCP","54","135 > 43800 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23936","10.989183","172.30.1.104","172.30.1.205","TCP","54","135 > 43800 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23937","10.989188","172.30.1.205","172.30.1.104","TCP","54","43800 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23938","10.989268","172.30.1.104","172.30.1.205","TCP","66","49671 > 36438 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23939","10.989276","172.30.1.205","172.30.1.104","TCP","54","36438 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23940","10.989620","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23941","10.989927","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23942","10.989936","172.30.1.205","172.30.1.104","TCP","54","36438 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23943","10.991811","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23944","10.993438","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23945","10.993445","172.30.1.205","172.30.1.104","TCP","54","36438 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23946","10.994808","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23947","10.997162","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23948","10.997173","172.30.1.205","172.30.1.104","TCP","54","36438 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23949","10.998140","172.30.1.205","172.30.1.104","TCP","74","43804 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914224 TSecr=0 WS=128" "23950","10.998494","172.30.1.104","172.30.1.205","TCP","66","135 > 43804 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23951","10.998505","172.30.1.205","172.30.1.104","TCP","54","43804 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23952","10.998859","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23953","10.999186","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23954","10.999195","172.30.1.205","172.30.1.104","TCP","54","43804 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23955","11.001417","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23956","11.001864","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23957","11.001870","172.30.1.205","172.30.1.104","TCP","54","43804 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23958","11.003691","172.30.1.205","172.30.1.104","TCP","54","43804 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23959","11.003809","172.30.1.205","172.30.1.104","TCP","74","36442 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914230 TSecr=0 WS=128" "23960","11.003973","172.30.1.104","172.30.1.205","TCP","54","135 > 43804 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23961","11.004018","172.30.1.104","172.30.1.205","TCP","54","135 > 43804 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23962","11.004025","172.30.1.205","172.30.1.104","TCP","54","43804 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23963","11.004232","172.30.1.104","172.30.1.205","TCP","66","49671 > 36442 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23964","11.004248","172.30.1.205","172.30.1.104","TCP","54","36442 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23965","11.004658","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23966","11.005004","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23967","11.005014","172.30.1.205","172.30.1.104","TCP","54","36442 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23968","11.006911","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23969","11.007329","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23970","11.007337","172.30.1.205","172.30.1.104","TCP","54","36442 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23971","11.008712","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23972","11.010967","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23973","11.010975","172.30.1.205","172.30.1.104","TCP","54","36442 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23974","11.012015","172.30.1.205","172.30.1.104","TCP","74","43808 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914238 TSecr=0 WS=128" "23975","11.012335","172.30.1.104","172.30.1.205","TCP","66","135 > 43808 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23976","11.012349","172.30.1.205","172.30.1.104","TCP","54","43808 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23977","11.012718","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "23978","11.013037","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23979","11.013046","172.30.1.205","172.30.1.104","TCP","54","43808 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23980","11.015275","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "23981","11.015711","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "23982","11.015720","172.30.1.205","172.30.1.104","TCP","54","43808 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "23983","11.017630","172.30.1.205","172.30.1.104","TCP","54","43808 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "23984","11.017756","172.30.1.205","172.30.1.104","TCP","74","36446 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914244 TSecr=0 WS=128" "23985","11.017915","172.30.1.104","172.30.1.205","TCP","54","135 > 43808 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23986","11.017953","172.30.1.104","172.30.1.205","TCP","54","135 > 43808 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "23987","11.017960","172.30.1.205","172.30.1.104","TCP","54","43808 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "23988","11.018055","172.30.1.104","172.30.1.205","TCP","66","49671 > 36446 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "23989","11.018067","172.30.1.205","172.30.1.104","TCP","54","36446 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "23990","11.018426","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "23991","11.018762","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "23992","11.018772","172.30.1.205","172.30.1.104","TCP","54","36446 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "23993","11.020669","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "23994","11.021053","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "23995","11.021060","172.30.1.205","172.30.1.104","TCP","54","36446 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "23996","11.022438","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "23997","11.024659","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "23998","11.024668","172.30.1.205","172.30.1.104","TCP","54","36446 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "23999","11.025638","172.30.1.205","172.30.1.104","TCP","74","43812 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914252 TSecr=0 WS=128" "24000","11.025956","172.30.1.104","172.30.1.205","TCP","66","135 > 43812 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24001","11.025966","172.30.1.205","172.30.1.104","TCP","54","43812 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24002","11.026320","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24003","11.026710","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24004","11.026719","172.30.1.205","172.30.1.104","TCP","54","43812 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24005","11.028903","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24006","11.029306","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24007","11.029313","172.30.1.205","172.30.1.104","TCP","54","43812 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24008","11.031111","172.30.1.205","172.30.1.104","TCP","54","43812 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24009","11.031220","172.30.1.205","172.30.1.104","TCP","74","36450 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914257 TSecr=0 WS=128" "24010","11.031433","172.30.1.104","172.30.1.205","TCP","54","135 > 43812 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24011","11.031468","172.30.1.104","172.30.1.205","TCP","54","135 > 43812 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24012","11.031473","172.30.1.205","172.30.1.104","TCP","54","43812 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24013","11.031536","172.30.1.104","172.30.1.205","TCP","66","49671 > 36450 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24014","11.031545","172.30.1.205","172.30.1.104","TCP","54","36450 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24015","11.031884","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24016","11.032185","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24017","11.032194","172.30.1.205","172.30.1.104","TCP","54","36450 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24018","11.034070","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24019","11.034446","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24020","11.034451","172.30.1.205","172.30.1.104","TCP","54","36450 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24021","11.035803","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24022","11.038925","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24023","11.038937","172.30.1.205","172.30.1.104","TCP","54","36450 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24024","11.039912","172.30.1.205","172.30.1.104","TCP","74","43816 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914266 TSecr=0 WS=128" "24025","11.040200","172.30.1.104","172.30.1.205","TCP","66","135 > 43816 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24026","11.040211","172.30.1.205","172.30.1.104","TCP","54","43816 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24027","11.040565","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24028","11.040857","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24029","11.040867","172.30.1.205","172.30.1.104","TCP","54","43816 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24030","11.043059","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24031","11.043478","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24032","11.043485","172.30.1.205","172.30.1.104","TCP","54","43816 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24033","11.044335","172.30.1.205","172.30.1.104","TCP","54","36406 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24034","11.044384","172.30.1.205","172.30.1.104","TCP","54","36410 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24035","11.044421","172.30.1.205","172.30.1.104","TCP","54","36414 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24036","11.044453","172.30.1.205","172.30.1.104","TCP","54","36418 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24037","11.044485","172.30.1.205","172.30.1.104","TCP","54","36422 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24038","11.044513","172.30.1.205","172.30.1.104","TCP","54","36426 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24039","11.044540","172.30.1.205","172.30.1.104","TCP","54","36430 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24040","11.044572","172.30.1.205","172.30.1.104","TCP","54","36434 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24041","11.044599","172.30.1.205","172.30.1.104","TCP","54","36438 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24042","11.044628","172.30.1.205","172.30.1.104","TCP","54","36442 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24043","11.044654","172.30.1.205","172.30.1.104","TCP","54","36446 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24044","11.044681","172.30.1.205","172.30.1.104","TCP","54","36450 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24045","11.044729","172.30.1.104","172.30.1.205","TCP","54","49671 > 36406 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24046","11.045106","172.30.1.104","172.30.1.205","TCP","54","49671 > 36410 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24047","11.045114","172.30.1.104","172.30.1.205","TCP","54","49671 > 36406 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24048","11.045122","172.30.1.205","172.30.1.104","TCP","54","36406 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24049","11.045128","172.30.1.104","172.30.1.205","TCP","54","49671 > 36410 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24050","11.045130","172.30.1.205","172.30.1.104","TCP","54","36410 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24051","11.045159","172.30.1.104","172.30.1.205","TCP","54","49671 > 36414 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24052","11.045178","172.30.1.104","172.30.1.205","TCP","54","49671 > 36414 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24053","11.045181","172.30.1.205","172.30.1.104","TCP","54","36414 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24054","11.045211","172.30.1.104","172.30.1.205","TCP","54","49671 > 36418 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24055","11.045234","172.30.1.104","172.30.1.205","TCP","54","49671 > 36418 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24056","11.045238","172.30.1.205","172.30.1.104","TCP","54","36418 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24057","11.045269","172.30.1.104","172.30.1.205","TCP","54","49671 > 36422 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24058","11.045290","172.30.1.104","172.30.1.205","TCP","54","49671 > 36422 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24059","11.045294","172.30.1.205","172.30.1.104","TCP","54","36422 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24060","11.045313","172.30.1.104","172.30.1.205","TCP","54","49671 > 36426 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24061","11.045448","172.30.1.104","172.30.1.205","TCP","54","49671 > 36430 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24062","11.045470","172.30.1.104","172.30.1.205","TCP","54","49671 > 36426 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24063","11.045473","172.30.1.205","172.30.1.104","TCP","54","36426 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24064","11.045490","172.30.1.104","172.30.1.205","TCP","54","49671 > 36430 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24065","11.045492","172.30.1.205","172.30.1.104","TCP","54","36430 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24066","11.045513","172.30.1.104","172.30.1.205","TCP","54","49671 > 36434 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24067","11.045533","172.30.1.104","172.30.1.205","TCP","54","49671 > 36438 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24068","11.045555","172.30.1.104","172.30.1.205","TCP","54","49671 > 36434 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24069","11.045559","172.30.1.205","172.30.1.104","TCP","54","36434 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24070","11.045574","172.30.1.104","172.30.1.205","TCP","54","49671 > 36442 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24071","11.045595","172.30.1.104","172.30.1.205","TCP","54","49671 > 36438 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24072","11.045598","172.30.1.205","172.30.1.104","TCP","54","36438 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24073","11.045616","172.30.1.104","172.30.1.205","TCP","54","49671 > 36446 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24074","11.045638","172.30.1.104","172.30.1.205","TCP","54","49671 > 36442 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24075","11.045641","172.30.1.205","172.30.1.104","TCP","54","36442 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24076","11.045659","172.30.1.104","172.30.1.205","TCP","54","49671 > 36446 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24077","11.045661","172.30.1.205","172.30.1.104","TCP","54","36446 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24078","11.046110","172.30.1.104","172.30.1.205","TCP","54","49671 > 36450 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24079","11.046128","172.30.1.104","172.30.1.205","TCP","54","49671 > 36450 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24080","11.046133","172.30.1.205","172.30.1.104","TCP","54","36450 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24081","11.046301","172.30.1.205","172.30.1.104","TCP","54","43816 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24082","11.046411","172.30.1.205","172.30.1.104","TCP","74","36454 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914272 TSecr=0 WS=128" "24083","11.046562","172.30.1.104","172.30.1.205","TCP","54","135 > 43816 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24084","11.046592","172.30.1.104","172.30.1.205","TCP","54","135 > 43816 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24085","11.046597","172.30.1.205","172.30.1.104","TCP","54","43816 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24086","11.046699","172.30.1.104","172.30.1.205","TCP","66","49671 > 36454 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24087","11.046708","172.30.1.205","172.30.1.104","TCP","54","36454 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24088","11.047058","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24089","11.047409","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24090","11.047418","172.30.1.205","172.30.1.104","TCP","54","36454 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24091","11.049331","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24092","11.049708","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24093","11.049714","172.30.1.205","172.30.1.104","TCP","54","36454 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24094","11.051073","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24095","11.053203","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24096","11.053212","172.30.1.205","172.30.1.104","TCP","54","36454 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24097","11.054174","172.30.1.205","172.30.1.104","TCP","74","43820 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914280 TSecr=0 WS=128" "24098","11.054523","172.30.1.104","172.30.1.205","TCP","66","135 > 43820 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24099","11.054533","172.30.1.205","172.30.1.104","TCP","54","43820 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24100","11.054890","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24101","11.055247","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24102","11.055260","172.30.1.205","172.30.1.104","TCP","54","43820 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24103","11.057576","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24104","11.057973","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24105","11.057981","172.30.1.205","172.30.1.104","TCP","54","43820 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24106","11.059821","172.30.1.205","172.30.1.104","TCP","54","43820 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24107","11.059951","172.30.1.205","172.30.1.104","TCP","74","36458 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914286 TSecr=0 WS=128" "24108","11.060103","172.30.1.104","172.30.1.205","TCP","54","135 > 43820 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24109","11.060191","172.30.1.104","172.30.1.205","TCP","54","135 > 43820 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24110","11.060198","172.30.1.205","172.30.1.104","TCP","54","43820 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24111","11.060249","172.30.1.104","172.30.1.205","TCP","66","49671 > 36458 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24112","11.060258","172.30.1.205","172.30.1.104","TCP","54","36458 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24113","11.060601","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24114","11.060907","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24115","11.060917","172.30.1.205","172.30.1.104","TCP","54","36458 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24116","11.062813","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24117","11.063176","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24118","11.063182","172.30.1.205","172.30.1.104","TCP","54","36458 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24119","11.064540","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24120","11.066858","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24121","11.066868","172.30.1.205","172.30.1.104","TCP","54","36458 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24122","11.067840","172.30.1.205","172.30.1.104","TCP","74","43824 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914294 TSecr=0 WS=128" "24123","11.068197","172.30.1.104","172.30.1.205","TCP","66","135 > 43824 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24124","11.068208","172.30.1.205","172.30.1.104","TCP","54","43824 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24125","11.068561","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24126","11.068889","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24127","11.068898","172.30.1.205","172.30.1.104","TCP","54","43824 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24128","11.071126","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24129","11.071553","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24130","11.071560","172.30.1.205","172.30.1.104","TCP","54","43824 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24131","11.073420","172.30.1.205","172.30.1.104","TCP","54","43824 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24132","11.073548","172.30.1.205","172.30.1.104","TCP","74","36462 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914299 TSecr=0 WS=128" "24133","11.073695","172.30.1.104","172.30.1.205","TCP","54","135 > 43824 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24134","11.073784","172.30.1.104","172.30.1.205","TCP","54","135 > 43824 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24135","11.073792","172.30.1.205","172.30.1.104","TCP","54","43824 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24136","11.073835","172.30.1.104","172.30.1.205","TCP","66","49671 > 36462 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24137","11.073844","172.30.1.205","172.30.1.104","TCP","54","36462 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24138","11.074189","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24139","11.074498","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24140","11.074508","172.30.1.205","172.30.1.104","TCP","54","36462 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24141","11.076405","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24142","11.076789","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24143","11.076794","172.30.1.205","172.30.1.104","TCP","54","36462 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24144","11.078167","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24145","11.080432","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24146","11.080444","172.30.1.205","172.30.1.104","TCP","54","36462 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24147","11.081505","172.30.1.205","172.30.1.104","TCP","74","43828 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914307 TSecr=0 WS=128" "24148","11.081834","172.30.1.104","172.30.1.205","TCP","66","135 > 43828 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24149","11.081846","172.30.1.205","172.30.1.104","TCP","54","43828 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24150","11.082205","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24151","11.082509","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24152","11.082518","172.30.1.205","172.30.1.104","TCP","54","43828 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24153","11.084757","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24154","11.085239","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24155","11.085246","172.30.1.205","172.30.1.104","TCP","54","43828 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24156","11.087089","172.30.1.205","172.30.1.104","TCP","54","43828 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24157","11.087216","172.30.1.205","172.30.1.104","TCP","74","36466 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914313 TSecr=0 WS=128" "24158","11.087383","172.30.1.104","172.30.1.205","TCP","54","135 > 43828 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24159","11.087418","172.30.1.104","172.30.1.205","TCP","54","135 > 43828 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24160","11.087426","172.30.1.205","172.30.1.104","TCP","54","43828 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24161","11.087538","172.30.1.104","172.30.1.205","TCP","66","49671 > 36466 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24162","11.087546","172.30.1.205","172.30.1.104","TCP","54","36466 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24163","11.087895","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24164","11.088202","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24165","11.088211","172.30.1.205","172.30.1.104","TCP","54","36466 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24166","11.090122","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24167","11.090513","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24168","11.090519","172.30.1.205","172.30.1.104","TCP","54","36466 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24169","11.091887","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24170","11.094114","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24171","11.094127","172.30.1.205","172.30.1.104","TCP","54","36466 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24172","11.095182","172.30.1.205","172.30.1.104","TCP","74","43832 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914321 TSecr=0 WS=128" "24173","11.095491","172.30.1.104","172.30.1.205","TCP","66","135 > 43832 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24174","11.095503","172.30.1.205","172.30.1.104","TCP","54","43832 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24175","11.095859","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24176","11.096182","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24177","11.096196","172.30.1.205","172.30.1.104","TCP","54","43832 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24178","11.098551","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24179","11.098973","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24180","11.098982","172.30.1.205","172.30.1.104","TCP","54","43832 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24181","11.100851","172.30.1.205","172.30.1.104","TCP","54","43832 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24182","11.101024","172.30.1.205","172.30.1.104","TCP","74","36470 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914327 TSecr=0 WS=128" "24183","11.101143","172.30.1.104","172.30.1.205","TCP","54","135 > 43832 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24184","11.101172","172.30.1.104","172.30.1.205","TCP","54","135 > 43832 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24185","11.101181","172.30.1.205","172.30.1.104","TCP","54","43832 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24186","11.101301","172.30.1.104","172.30.1.205","TCP","66","49671 > 36470 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24187","11.101310","172.30.1.205","172.30.1.104","TCP","54","36470 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24188","11.101679","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24189","11.101977","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24190","11.101985","172.30.1.205","172.30.1.104","TCP","54","36470 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24191","11.103872","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24192","11.104248","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24193","11.104254","172.30.1.205","172.30.1.104","TCP","54","36470 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24194","11.105658","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24195","11.107957","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24196","11.107969","172.30.1.205","172.30.1.104","TCP","54","36470 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24197","11.108986","172.30.1.205","172.30.1.104","TCP","74","43836 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914335 TSecr=0 WS=128" "24198","11.109342","172.30.1.104","172.30.1.205","TCP","66","135 > 43836 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24199","11.109354","172.30.1.205","172.30.1.104","TCP","54","43836 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24200","11.109708","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24201","11.110046","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24202","11.110057","172.30.1.205","172.30.1.104","TCP","54","43836 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24203","11.112275","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24204","11.112700","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24205","11.112708","172.30.1.205","172.30.1.104","TCP","54","43836 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24206","11.114577","172.30.1.205","172.30.1.104","TCP","54","43836 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24207","11.114703","172.30.1.205","172.30.1.104","TCP","74","36474 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914341 TSecr=0 WS=128" "24208","11.114858","172.30.1.104","172.30.1.205","TCP","54","135 > 43836 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24209","11.114892","172.30.1.104","172.30.1.205","TCP","54","135 > 43836 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24210","11.114899","172.30.1.205","172.30.1.104","TCP","54","43836 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24211","11.115055","172.30.1.104","172.30.1.205","TCP","66","49671 > 36474 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24212","11.115067","172.30.1.205","172.30.1.104","TCP","54","36474 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24213","11.115436","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24214","11.115740","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24215","11.115748","172.30.1.205","172.30.1.104","TCP","54","36474 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24216","11.117680","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24217","11.118072","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24218","11.118079","172.30.1.205","172.30.1.104","TCP","54","36474 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24219","11.119442","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24220","11.121754","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24221","11.121766","172.30.1.205","172.30.1.104","TCP","54","36474 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24222","11.122768","172.30.1.205","172.30.1.104","TCP","74","43840 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914349 TSecr=0 WS=128" "24223","11.123077","172.30.1.104","172.30.1.205","TCP","66","135 > 43840 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24224","11.123088","172.30.1.205","172.30.1.104","TCP","54","43840 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24225","11.123436","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24226","11.123753","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24227","11.123762","172.30.1.205","172.30.1.104","TCP","54","43840 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24228","11.126016","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24229","11.126442","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24230","11.126449","172.30.1.205","172.30.1.104","TCP","54","43840 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24231","11.128276","172.30.1.205","172.30.1.104","TCP","54","43840 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24232","11.128394","172.30.1.205","172.30.1.104","TCP","74","36478 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914354 TSecr=0 WS=128" "24233","11.128554","172.30.1.104","172.30.1.205","TCP","54","135 > 43840 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24234","11.128590","172.30.1.104","172.30.1.205","TCP","54","135 > 43840 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24235","11.128596","172.30.1.205","172.30.1.104","TCP","54","43840 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24236","11.128696","172.30.1.104","172.30.1.205","TCP","66","49671 > 36478 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24237","11.128704","172.30.1.205","172.30.1.104","TCP","54","36478 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24238","11.129072","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24239","11.129385","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24240","11.129394","172.30.1.205","172.30.1.104","TCP","54","36478 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24241","11.131276","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24242","11.131671","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24243","11.131677","172.30.1.205","172.30.1.104","TCP","54","36478 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24244","11.133072","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24245","11.135440","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24246","11.135455","172.30.1.205","172.30.1.104","TCP","54","36478 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24247","11.136536","172.30.1.205","172.30.1.104","TCP","74","43844 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914362 TSecr=0 WS=128" "24248","11.136921","172.30.1.104","172.30.1.205","TCP","66","135 > 43844 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24249","11.136933","172.30.1.205","172.30.1.104","TCP","54","43844 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24250","11.137309","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24251","11.137639","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24252","11.137649","172.30.1.205","172.30.1.104","TCP","54","43844 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24253","11.139880","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24254","11.140325","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24255","11.140332","172.30.1.205","172.30.1.104","TCP","54","43844 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24256","11.142197","172.30.1.205","172.30.1.104","TCP","54","43844 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24257","11.142315","172.30.1.205","172.30.1.104","TCP","74","36482 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914368 TSecr=0 WS=128" "24258","11.142534","172.30.1.104","172.30.1.205","TCP","54","135 > 43844 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24259","11.142586","172.30.1.104","172.30.1.205","TCP","66","49671 > 36482 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24260","11.142596","172.30.1.205","172.30.1.104","TCP","54","36482 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24261","11.142637","172.30.1.104","172.30.1.205","TCP","54","135 > 43844 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24262","11.142644","172.30.1.205","172.30.1.104","TCP","54","43844 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24263","11.142970","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24264","11.144528","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24265","11.144536","172.30.1.205","172.30.1.104","TCP","54","36482 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24266","11.146436","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24267","11.146817","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24268","11.146824","172.30.1.205","172.30.1.104","TCP","54","36482 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24269","11.148197","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24270","11.150446","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24271","11.150456","172.30.1.205","172.30.1.104","TCP","54","36482 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24272","11.151436","172.30.1.205","172.30.1.104","TCP","74","43848 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914377 TSecr=0 WS=128" "24273","11.151762","172.30.1.104","172.30.1.205","TCP","66","135 > 43848 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24274","11.151772","172.30.1.205","172.30.1.104","TCP","54","43848 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24275","11.152128","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24276","11.152457","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24277","11.152467","172.30.1.205","172.30.1.104","TCP","54","43848 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24278","11.154702","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24279","11.155107","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24280","11.155114","172.30.1.205","172.30.1.104","TCP","54","43848 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24281","11.156962","172.30.1.205","172.30.1.104","TCP","54","43848 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24282","11.157081","172.30.1.205","172.30.1.104","TCP","74","36486 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914383 TSecr=0 WS=128" "24283","11.157282","172.30.1.104","172.30.1.205","TCP","54","135 > 43848 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24284","11.157348","172.30.1.104","172.30.1.205","TCP","54","135 > 43848 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24285","11.157355","172.30.1.205","172.30.1.104","TCP","54","43848 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24286","11.157433","172.30.1.104","172.30.1.205","TCP","66","49671 > 36486 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24287","11.157442","172.30.1.205","172.30.1.104","TCP","54","36486 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24288","11.157792","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24289","11.158156","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24290","11.158165","172.30.1.205","172.30.1.104","TCP","54","36486 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24291","11.160062","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24292","11.160457","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24293","11.160463","172.30.1.205","172.30.1.104","TCP","54","36486 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24294","11.161855","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24295","11.164052","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24296","11.164064","172.30.1.205","172.30.1.104","TCP","54","36486 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24297","11.165150","172.30.1.205","172.30.1.104","TCP","74","43852 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914391 TSecr=0 WS=128" "24298","11.165515","172.30.1.104","172.30.1.205","TCP","66","135 > 43852 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24299","11.165527","172.30.1.205","172.30.1.104","TCP","54","43852 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24300","11.165878","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24301","11.166194","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24302","11.166202","172.30.1.205","172.30.1.104","TCP","54","43852 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24303","11.168437","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24304","11.168847","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24305","11.168855","172.30.1.205","172.30.1.104","TCP","54","43852 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24306","11.170693","172.30.1.205","172.30.1.104","TCP","54","43852 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24307","11.170809","172.30.1.205","172.30.1.104","TCP","74","36490 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914397 TSecr=0 WS=128" "24308","11.170974","172.30.1.104","172.30.1.205","TCP","54","135 > 43852 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24309","11.171012","172.30.1.104","172.30.1.205","TCP","54","135 > 43852 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24310","11.171019","172.30.1.205","172.30.1.104","TCP","54","43852 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24311","11.171100","172.30.1.104","172.30.1.205","TCP","66","49671 > 36490 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24312","11.171109","172.30.1.205","172.30.1.104","TCP","54","36490 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24313","11.171454","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24314","11.171762","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24315","11.171771","172.30.1.205","172.30.1.104","TCP","54","36490 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24316","11.173694","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24317","11.174069","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24318","11.174075","172.30.1.205","172.30.1.104","TCP","54","36490 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24319","11.175426","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24320","11.177685","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24321","11.177696","172.30.1.205","172.30.1.104","TCP","54","36490 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24322","11.178663","172.30.1.205","172.30.1.104","TCP","74","43856 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914405 TSecr=0 WS=128" "24323","11.178996","172.30.1.104","172.30.1.205","TCP","66","135 > 43856 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24324","11.179007","172.30.1.205","172.30.1.104","TCP","54","43856 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24325","11.179359","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24326","11.179681","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24327","11.179691","172.30.1.205","172.30.1.104","TCP","54","43856 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24328","11.181915","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24329","11.182311","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24330","11.182318","172.30.1.205","172.30.1.104","TCP","54","43856 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24331","11.184173","172.30.1.205","172.30.1.104","TCP","54","43856 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24332","11.184286","172.30.1.205","172.30.1.104","TCP","74","36494 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914410 TSecr=0 WS=128" "24333","11.184462","172.30.1.104","172.30.1.205","TCP","54","135 > 43856 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24334","11.184534","172.30.1.104","172.30.1.205","TCP","54","135 > 43856 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24335","11.184539","172.30.1.205","172.30.1.104","TCP","54","43856 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24336","11.184575","172.30.1.104","172.30.1.205","TCP","66","49671 > 36494 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24337","11.184583","172.30.1.205","172.30.1.104","TCP","54","36494 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24338","11.184999","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24339","11.185313","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24340","11.185322","172.30.1.205","172.30.1.104","TCP","54","36494 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24341","11.187266","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24342","11.187727","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24343","11.187733","172.30.1.205","172.30.1.104","TCP","54","36494 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24344","11.189172","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24345","11.191418","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24346","11.191427","172.30.1.205","172.30.1.104","TCP","54","36494 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24347","11.192362","172.30.1.205","172.30.1.104","TCP","74","43860 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914418 TSecr=0 WS=128" "24348","11.192683","172.30.1.104","172.30.1.205","TCP","66","135 > 43860 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24349","11.192693","172.30.1.205","172.30.1.104","TCP","54","43860 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24350","11.193066","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24351","11.193368","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24352","11.193377","172.30.1.205","172.30.1.104","TCP","54","43860 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24353","11.195575","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24354","11.196034","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24355","11.196041","172.30.1.205","172.30.1.104","TCP","54","43860 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24356","11.197889","172.30.1.205","172.30.1.104","TCP","54","43860 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24357","11.198000","172.30.1.205","172.30.1.104","TCP","74","36498 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914424 TSecr=0 WS=128" "24358","11.198208","172.30.1.104","172.30.1.205","TCP","54","135 > 43860 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24359","11.198267","172.30.1.104","172.30.1.205","TCP","54","135 > 43860 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24360","11.198272","172.30.1.205","172.30.1.104","TCP","54","43860 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24361","11.198290","172.30.1.104","172.30.1.205","TCP","66","49671 > 36498 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24362","11.198299","172.30.1.205","172.30.1.104","TCP","54","36498 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24363","11.198644","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24364","11.199414","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24365","11.199421","172.30.1.205","172.30.1.104","TCP","54","36498 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24366","11.201315","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24367","11.201732","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24368","11.201739","172.30.1.205","172.30.1.104","TCP","54","36498 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24369","11.203082","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24370","11.205435","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24371","11.205446","172.30.1.205","172.30.1.104","TCP","54","36498 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24372","11.206402","172.30.1.205","172.30.1.104","TCP","74","43864 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914432 TSecr=0 WS=128" "24373","11.206699","172.30.1.104","172.30.1.205","TCP","66","135 > 43864 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24374","11.206713","172.30.1.205","172.30.1.104","TCP","54","43864 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24375","11.207081","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24376","11.207430","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24377","11.207439","172.30.1.205","172.30.1.104","TCP","54","43864 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24378","11.209652","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24379","11.210057","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24380","11.210064","172.30.1.205","172.30.1.104","TCP","54","43864 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24381","11.210920","172.30.1.205","172.30.1.104","TCP","54","36458 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24382","11.210969","172.30.1.205","172.30.1.104","TCP","54","36462 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24383","11.211007","172.30.1.205","172.30.1.104","TCP","54","36466 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24384","11.211036","172.30.1.205","172.30.1.104","TCP","54","36470 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24385","11.211069","172.30.1.205","172.30.1.104","TCP","54","36474 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24386","11.211102","172.30.1.205","172.30.1.104","TCP","54","36478 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24387","11.211134","172.30.1.205","172.30.1.104","TCP","54","36482 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24388","11.211161","172.30.1.205","172.30.1.104","TCP","54","36486 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24389","11.211194","172.30.1.205","172.30.1.104","TCP","54","36490 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24390","11.211220","172.30.1.205","172.30.1.104","TCP","54","36494 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24391","11.211247","172.30.1.205","172.30.1.104","TCP","54","36498 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24392","11.211304","172.30.1.104","172.30.1.205","TCP","54","49671 > 36458 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24393","11.211330","172.30.1.104","172.30.1.205","TCP","54","49671 > 36458 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24394","11.211337","172.30.1.205","172.30.1.104","TCP","54","36458 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24395","11.211343","172.30.1.205","172.30.1.104","TCP","54","36454 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24396","11.211354","172.30.1.104","172.30.1.205","TCP","54","49671 > 36462 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24397","11.211373","172.30.1.104","172.30.1.205","TCP","54","49671 > 36466 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24398","11.211464","172.30.1.104","172.30.1.205","TCP","54","49671 > 36462 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24399","11.211470","172.30.1.205","172.30.1.104","TCP","54","36462 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24400","11.211493","172.30.1.104","172.30.1.205","TCP","54","49671 > 36470 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24401","11.211812","172.30.1.104","172.30.1.205","TCP","54","49671 > 36474 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24402","11.211836","172.30.1.104","172.30.1.205","TCP","54","49671 > 36474 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24403","11.211841","172.30.1.205","172.30.1.104","TCP","54","36474 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24404","11.211858","172.30.1.104","172.30.1.205","TCP","54","49671 > 36466 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24405","11.211861","172.30.1.205","172.30.1.104","TCP","54","36466 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24406","11.211910","172.30.1.104","172.30.1.205","TCP","54","49671 > 36470 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24407","11.211913","172.30.1.205","172.30.1.104","TCP","54","36470 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24408","11.211930","172.30.1.104","172.30.1.205","TCP","54","49671 > 36482 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24409","11.211950","172.30.1.104","172.30.1.205","TCP","54","49671 > 36478 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24410","11.211971","172.30.1.104","172.30.1.205","TCP","54","49671 > 36482 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24411","11.211974","172.30.1.205","172.30.1.104","TCP","54","36482 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24412","11.212051","172.30.1.104","172.30.1.205","TCP","54","49671 > 36478 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24413","11.212055","172.30.1.205","172.30.1.104","TCP","54","36478 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24414","11.212076","172.30.1.104","172.30.1.205","TCP","54","49671 > 36486 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24415","11.212099","172.30.1.104","172.30.1.205","TCP","54","49671 > 36490 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24416","11.212120","172.30.1.104","172.30.1.205","TCP","54","49671 > 36494 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24417","11.212141","172.30.1.104","172.30.1.205","TCP","54","49671 > 36486 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24418","11.212145","172.30.1.205","172.30.1.104","TCP","54","36486 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24419","11.212169","172.30.1.104","172.30.1.205","TCP","54","49671 > 36498 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24420","11.212191","172.30.1.104","172.30.1.205","TCP","54","49671 > 36498 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24421","11.212195","172.30.1.205","172.30.1.104","TCP","54","36498 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24422","11.212211","172.30.1.104","172.30.1.205","TCP","54","49671 > 36490 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24423","11.212214","172.30.1.205","172.30.1.104","TCP","54","36490 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24424","11.212232","172.30.1.104","172.30.1.205","TCP","54","49671 > 36494 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24425","11.212236","172.30.1.205","172.30.1.104","TCP","54","36494 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24426","11.212253","172.30.1.104","172.30.1.205","TCP","54","49671 > 36454 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24427","11.212718","172.30.1.104","172.30.1.205","TCP","54","49671 > 36454 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24428","11.212724","172.30.1.205","172.30.1.104","TCP","54","36454 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24429","11.212937","172.30.1.205","172.30.1.104","TCP","54","43864 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24430","11.213049","172.30.1.205","172.30.1.104","TCP","74","36502 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914439 TSecr=0 WS=128" "24431","11.213218","172.30.1.104","172.30.1.205","TCP","54","135 > 43864 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24432","11.213318","172.30.1.104","172.30.1.205","TCP","54","135 > 43864 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24433","11.213323","172.30.1.205","172.30.1.104","TCP","54","43864 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24434","11.213355","172.30.1.104","172.30.1.205","TCP","66","49671 > 36502 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24435","11.213363","172.30.1.205","172.30.1.104","TCP","54","36502 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24436","11.213719","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24437","11.214059","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24438","11.214068","172.30.1.205","172.30.1.104","TCP","54","36502 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24439","11.215970","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24440","11.217872","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24441","11.217879","172.30.1.205","172.30.1.104","TCP","54","36502 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24442","11.219253","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24443","11.221589","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24444","11.221598","172.30.1.205","172.30.1.104","TCP","54","36502 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24445","11.222586","172.30.1.205","172.30.1.104","TCP","74","43868 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914449 TSecr=0 WS=128" "24446","11.222906","172.30.1.104","172.30.1.205","TCP","66","135 > 43868 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24447","11.222918","172.30.1.205","172.30.1.104","TCP","54","43868 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24448","11.223283","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24449","11.223600","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24450","11.223614","172.30.1.205","172.30.1.104","TCP","54","43868 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24451","11.225938","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24452","11.226352","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24453","11.226360","172.30.1.205","172.30.1.104","TCP","54","43868 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24454","11.228220","172.30.1.205","172.30.1.104","TCP","54","43868 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24455","11.228352","172.30.1.205","172.30.1.104","TCP","74","36506 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914454 TSecr=0 WS=128" "24456","11.228535","172.30.1.104","172.30.1.205","TCP","54","135 > 43868 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24457","11.228555","172.30.1.104","172.30.1.205","TCP","54","135 > 43868 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24458","11.228562","172.30.1.205","172.30.1.104","TCP","54","43868 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24459","11.228634","172.30.1.104","172.30.1.205","TCP","66","49671 > 36506 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24460","11.228643","172.30.1.205","172.30.1.104","TCP","54","36506 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24461","11.229023","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24462","11.230568","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24463","11.230575","172.30.1.205","172.30.1.104","TCP","54","36506 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24464","11.232463","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24465","11.232865","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24466","11.232872","172.30.1.205","172.30.1.104","TCP","54","36506 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24467","11.234253","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24468","11.236467","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24469","11.236478","172.30.1.205","172.30.1.104","TCP","54","36506 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24470","11.237514","172.30.1.205","172.30.1.104","TCP","74","43872 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914463 TSecr=0 WS=128" "24471","11.237850","172.30.1.104","172.30.1.205","TCP","66","135 > 43872 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24472","11.237861","172.30.1.205","172.30.1.104","TCP","54","43872 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24473","11.238215","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24474","11.238552","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24475","11.238561","172.30.1.205","172.30.1.104","TCP","54","43872 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24476","11.240808","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24477","11.241197","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24478","11.241204","172.30.1.205","172.30.1.104","TCP","54","43872 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24479","11.243028","172.30.1.205","172.30.1.104","TCP","54","43872 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24480","11.243143","172.30.1.205","172.30.1.104","TCP","74","36510 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914469 TSecr=0 WS=128" "24481","11.243314","172.30.1.104","172.30.1.205","TCP","54","135 > 43872 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24482","11.243379","172.30.1.104","172.30.1.205","TCP","54","135 > 43872 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24483","11.243386","172.30.1.205","172.30.1.104","TCP","54","43872 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24484","11.243426","172.30.1.104","172.30.1.205","TCP","66","49671 > 36510 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24485","11.243434","172.30.1.205","172.30.1.104","TCP","54","36510 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24486","11.243778","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24487","11.245252","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24488","11.245260","172.30.1.205","172.30.1.104","TCP","54","36510 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24489","11.247150","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24490","11.247523","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24491","11.247530","172.30.1.205","172.30.1.104","TCP","54","36510 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24492","11.248929","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24493","11.251137","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24494","11.251146","172.30.1.205","172.30.1.104","TCP","54","36510 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24495","11.252119","172.30.1.205","172.30.1.104","TCP","74","43876 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914478 TSecr=0 WS=128" "24496","11.252458","172.30.1.104","172.30.1.205","TCP","66","135 > 43876 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24497","11.252470","172.30.1.205","172.30.1.104","TCP","54","43876 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24498","11.252851","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24499","11.253174","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24500","11.253183","172.30.1.205","172.30.1.104","TCP","54","43876 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24501","11.255393","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24502","11.255809","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24503","11.255816","172.30.1.205","172.30.1.104","TCP","54","43876 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24504","11.257688","172.30.1.205","172.30.1.104","TCP","54","43876 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24505","11.257804","172.30.1.205","172.30.1.104","TCP","74","36514 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914484 TSecr=0 WS=128" "24506","11.257976","172.30.1.104","172.30.1.205","TCP","54","135 > 43876 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24507","11.258011","172.30.1.104","172.30.1.205","TCP","54","135 > 43876 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24508","11.258018","172.30.1.205","172.30.1.104","TCP","54","43876 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24509","11.258151","172.30.1.104","172.30.1.205","TCP","66","49671 > 36514 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24510","11.258160","172.30.1.205","172.30.1.104","TCP","54","36514 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24511","11.258509","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24512","11.258834","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24513","11.258843","172.30.1.205","172.30.1.104","TCP","54","36514 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24514","11.260736","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24515","11.261136","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24516","11.261143","172.30.1.205","172.30.1.104","TCP","54","36514 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24517","11.262512","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24518","11.265676","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24519","11.265685","172.30.1.205","172.30.1.104","TCP","54","36514 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24520","11.266642","172.30.1.205","172.30.1.104","TCP","74","43880 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914493 TSecr=0 WS=128" "24521","11.266975","172.30.1.104","172.30.1.205","TCP","66","135 > 43880 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24522","11.266986","172.30.1.205","172.30.1.104","TCP","54","43880 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24523","11.267335","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24524","11.267650","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24525","11.267659","172.30.1.205","172.30.1.104","TCP","54","43880 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24526","11.269879","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24527","11.270355","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24528","11.270361","172.30.1.205","172.30.1.104","TCP","54","43880 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24529","11.272217","172.30.1.205","172.30.1.104","TCP","54","43880 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24530","11.272336","172.30.1.205","172.30.1.104","TCP","74","36518 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914498 TSecr=0 WS=128" "24531","11.272557","172.30.1.104","172.30.1.205","TCP","54","135 > 43880 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24532","11.272608","172.30.1.104","172.30.1.205","TCP","54","135 > 43880 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24533","11.272617","172.30.1.205","172.30.1.104","TCP","54","43880 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24534","11.272638","172.30.1.104","172.30.1.205","TCP","66","49671 > 36518 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24535","11.272646","172.30.1.205","172.30.1.104","TCP","54","36518 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24536","11.273057","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24537","11.273470","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24538","11.273478","172.30.1.205","172.30.1.104","TCP","54","36518 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24539","11.275350","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24540","11.275762","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24541","11.275768","172.30.1.205","172.30.1.104","TCP","54","36518 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24542","11.277155","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24543","11.279402","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24544","11.279412","172.30.1.205","172.30.1.104","TCP","54","36518 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24545","11.280340","172.30.1.205","172.30.1.104","TCP","74","43884 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914506 TSecr=0 WS=128" "24546","11.280665","172.30.1.104","172.30.1.205","TCP","66","135 > 43884 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24547","11.280675","172.30.1.205","172.30.1.104","TCP","54","43884 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24548","11.281053","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24549","11.281375","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24550","11.281384","172.30.1.205","172.30.1.104","TCP","54","43884 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24551","11.283563","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24552","11.283954","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24553","11.283961","172.30.1.205","172.30.1.104","TCP","54","43884 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24554","11.285819","172.30.1.205","172.30.1.104","TCP","54","43884 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24555","11.285933","172.30.1.205","172.30.1.104","TCP","74","36522 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914512 TSecr=0 WS=128" "24556","11.286099","172.30.1.104","172.30.1.205","TCP","54","135 > 43884 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24557","11.286144","172.30.1.104","172.30.1.205","TCP","54","135 > 43884 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24558","11.286149","172.30.1.205","172.30.1.104","TCP","54","43884 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24559","11.286225","172.30.1.104","172.30.1.205","TCP","66","49671 > 36522 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24560","11.286233","172.30.1.205","172.30.1.104","TCP","54","36522 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24561","11.286586","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24562","11.286916","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24563","11.286923","172.30.1.205","172.30.1.104","TCP","54","36522 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24564","11.288825","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24565","11.289203","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24566","11.289210","172.30.1.205","172.30.1.104","TCP","54","36522 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24567","11.290568","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24568","11.294376","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24569","11.294386","172.30.1.205","172.30.1.104","TCP","54","36522 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24570","11.295376","172.30.1.205","172.30.1.104","TCP","74","43888 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914521 TSecr=0 WS=128" "24571","11.295702","172.30.1.104","172.30.1.205","TCP","66","135 > 43888 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24572","11.295714","172.30.1.205","172.30.1.104","TCP","54","43888 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24573","11.296068","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24574","11.296392","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24575","11.296401","172.30.1.205","172.30.1.104","TCP","54","43888 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24576","11.298656","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24577","11.299100","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24578","11.299107","172.30.1.205","172.30.1.104","TCP","54","43888 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24579","11.300958","172.30.1.205","172.30.1.104","TCP","54","43888 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24580","11.301081","172.30.1.205","172.30.1.104","TCP","74","36526 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914527 TSecr=0 WS=128" "24581","11.301259","172.30.1.104","172.30.1.205","TCP","54","135 > 43888 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24582","11.301300","172.30.1.104","172.30.1.205","TCP","54","135 > 43888 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24583","11.301307","172.30.1.205","172.30.1.104","TCP","54","43888 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24584","11.301415","172.30.1.104","172.30.1.205","TCP","66","49671 > 36526 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24585","11.301424","172.30.1.205","172.30.1.104","TCP","54","36526 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24586","11.301771","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24587","11.302083","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24588","11.302093","172.30.1.205","172.30.1.104","TCP","54","36526 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24589","11.303975","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24590","11.305546","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24591","11.305554","172.30.1.205","172.30.1.104","TCP","54","36526 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24592","11.306922","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24593","11.309275","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24594","11.309285","172.30.1.205","172.30.1.104","TCP","54","36526 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24595","11.310247","172.30.1.205","172.30.1.104","TCP","74","43892 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914536 TSecr=0 WS=128" "24596","11.310569","172.30.1.104","172.30.1.205","TCP","66","135 > 43892 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24597","11.310580","172.30.1.205","172.30.1.104","TCP","54","43892 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24598","11.310930","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24599","11.311247","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24600","11.311255","172.30.1.205","172.30.1.104","TCP","54","43892 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24601","11.313475","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24602","11.313891","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24603","11.313897","172.30.1.205","172.30.1.104","TCP","54","43892 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24604","11.315702","172.30.1.205","172.30.1.104","TCP","54","43892 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24605","11.315813","172.30.1.205","172.30.1.104","TCP","74","36530 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914542 TSecr=0 WS=128" "24606","11.316005","172.30.1.104","172.30.1.205","TCP","54","135 > 43892 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24607","11.316043","172.30.1.104","172.30.1.205","TCP","54","135 > 43892 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24608","11.316049","172.30.1.205","172.30.1.104","TCP","54","43892 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24609","11.316127","172.30.1.104","172.30.1.205","TCP","66","49671 > 36530 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24610","11.316135","172.30.1.205","172.30.1.104","TCP","54","36530 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24611","11.316480","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24612","11.316786","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24613","11.316795","172.30.1.205","172.30.1.104","TCP","54","36530 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24614","11.318674","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24615","11.319073","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24616","11.319080","172.30.1.205","172.30.1.104","TCP","54","36530 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24617","11.320434","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24618","11.324516","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24619","11.324526","172.30.1.205","172.30.1.104","TCP","54","36530 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24620","11.325507","172.30.1.205","172.30.1.104","TCP","74","43896 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914551 TSecr=0 WS=128" "24621","11.325848","172.30.1.104","172.30.1.205","TCP","66","135 > 43896 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24622","11.325860","172.30.1.205","172.30.1.104","TCP","54","43896 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24623","11.326218","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24624","11.326534","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24625","11.326543","172.30.1.205","172.30.1.104","TCP","54","43896 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24626","11.328717","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24627","11.329161","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24628","11.329168","172.30.1.205","172.30.1.104","TCP","54","43896 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24629","11.330979","172.30.1.205","172.30.1.104","TCP","54","43896 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24630","11.331092","172.30.1.205","172.30.1.104","TCP","74","36534 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914557 TSecr=0 WS=128" "24631","11.331273","172.30.1.104","172.30.1.205","TCP","54","135 > 43896 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24632","11.331340","172.30.1.104","172.30.1.205","TCP","54","135 > 43896 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24633","11.331346","172.30.1.205","172.30.1.104","TCP","54","43896 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24634","11.331425","172.30.1.104","172.30.1.205","TCP","66","49671 > 36534 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24635","11.331433","172.30.1.205","172.30.1.104","TCP","54","36534 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24636","11.331777","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24637","11.332094","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24638","11.332103","172.30.1.205","172.30.1.104","TCP","54","36534 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24639","11.334034","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24640","11.334453","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24641","11.334463","172.30.1.205","172.30.1.104","TCP","54","36534 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24642","11.335920","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24643","11.338130","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24644","11.338139","172.30.1.205","172.30.1.104","TCP","54","36534 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24645","11.339098","172.30.1.205","172.30.1.104","TCP","74","43900 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914565 TSecr=0 WS=128" "24646","11.339413","172.30.1.104","172.30.1.205","TCP","66","135 > 43900 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24647","11.339427","172.30.1.205","172.30.1.104","TCP","54","43900 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24648","11.339780","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24649","11.340105","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24650","11.340115","172.30.1.205","172.30.1.104","TCP","54","43900 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24651","11.342335","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24652","11.342739","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24653","11.342746","172.30.1.205","172.30.1.104","TCP","54","43900 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24654","11.344600","172.30.1.205","172.30.1.104","TCP","54","43900 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24655","11.344722","172.30.1.205","172.30.1.104","TCP","74","36538 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914571 TSecr=0 WS=128" "24656","11.344899","172.30.1.104","172.30.1.205","TCP","54","135 > 43900 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24657","11.344923","172.30.1.104","172.30.1.205","TCP","54","135 > 43900 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24658","11.344929","172.30.1.205","172.30.1.104","TCP","54","43900 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24659","11.345013","172.30.1.104","172.30.1.205","TCP","66","49671 > 36538 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24660","11.345021","172.30.1.205","172.30.1.104","TCP","54","36538 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24661","11.345381","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24662","11.346189","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24663","11.346199","172.30.1.205","172.30.1.104","TCP","54","36538 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24664","11.348121","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24665","11.348508","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24666","11.348515","172.30.1.205","172.30.1.104","TCP","54","36538 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24667","11.349903","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24668","11.352118","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24669","11.352128","172.30.1.205","172.30.1.104","TCP","54","36538 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24670","11.353130","172.30.1.205","172.30.1.104","TCP","74","43904 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914579 TSecr=0 WS=128" "24671","11.353449","172.30.1.104","172.30.1.205","TCP","66","135 > 43904 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24672","11.353462","172.30.1.205","172.30.1.104","TCP","54","43904 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24673","11.353822","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24674","11.354139","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24675","11.354148","172.30.1.205","172.30.1.104","TCP","54","43904 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24676","11.356359","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24677","11.356782","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24678","11.356789","172.30.1.205","172.30.1.104","TCP","54","43904 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24679","11.358610","172.30.1.205","172.30.1.104","TCP","54","43904 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24680","11.358724","172.30.1.205","172.30.1.104","TCP","74","36542 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914585 TSecr=0 WS=128" "24681","11.358900","172.30.1.104","172.30.1.205","TCP","54","135 > 43904 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24682","11.358938","172.30.1.104","172.30.1.205","TCP","54","135 > 43904 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24683","11.358945","172.30.1.205","172.30.1.104","TCP","54","43904 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24684","11.359025","172.30.1.104","172.30.1.205","TCP","66","49671 > 36542 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24685","11.359034","172.30.1.205","172.30.1.104","TCP","54","36542 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24686","11.359385","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24687","11.359719","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24688","11.359733","172.30.1.205","172.30.1.104","TCP","54","36542 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24689","11.361762","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24690","11.362165","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24691","11.362173","172.30.1.205","172.30.1.104","TCP","54","36542 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24692","11.363558","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24693","11.365806","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24694","11.365818","172.30.1.205","172.30.1.104","TCP","54","36542 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24695","11.366778","172.30.1.205","172.30.1.104","TCP","74","43908 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914593 TSecr=0 WS=128" "24696","11.367103","172.30.1.104","172.30.1.205","TCP","66","135 > 43908 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24697","11.367114","172.30.1.205","172.30.1.104","TCP","54","43908 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24698","11.367463","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24699","11.367788","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24700","11.367797","172.30.1.205","172.30.1.104","TCP","54","43908 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24701","11.370081","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24702","11.370522","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24703","11.370529","172.30.1.205","172.30.1.104","TCP","54","43908 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24704","11.372342","172.30.1.205","172.30.1.104","TCP","54","43908 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24705","11.372452","172.30.1.205","172.30.1.104","TCP","74","36546 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914598 TSecr=0 WS=128" "24706","11.372624","172.30.1.104","172.30.1.205","TCP","54","135 > 43908 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24707","11.372666","172.30.1.104","172.30.1.205","TCP","54","135 > 43908 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24708","11.372671","172.30.1.205","172.30.1.104","TCP","54","43908 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24709","11.372751","172.30.1.104","172.30.1.205","TCP","66","49671 > 36546 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24710","11.372759","172.30.1.205","172.30.1.104","TCP","54","36546 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24711","11.373124","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24712","11.373448","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24713","11.373457","172.30.1.205","172.30.1.104","TCP","54","36546 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24714","11.375377","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24715","11.375788","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24716","11.375795","172.30.1.205","172.30.1.104","TCP","54","36546 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24717","11.377177","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24718","11.379467","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24719","11.379477","172.30.1.205","172.30.1.104","TCP","54","36546 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24720","11.380408","172.30.1.205","172.30.1.104","TCP","74","43912 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914606 TSecr=0 WS=128" "24721","11.380750","172.30.1.104","172.30.1.205","TCP","66","135 > 43912 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24722","11.380761","172.30.1.205","172.30.1.104","TCP","54","43912 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24723","11.381135","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24724","11.381480","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24725","11.381490","172.30.1.205","172.30.1.104","TCP","54","43912 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24726","11.383666","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24727","11.384118","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24728","11.384124","172.30.1.205","172.30.1.104","TCP","54","43912 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24729","11.385003","172.30.1.205","172.30.1.104","TCP","54","36506 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24730","11.385052","172.30.1.205","172.30.1.104","TCP","54","36510 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24731","11.385084","172.30.1.205","172.30.1.104","TCP","54","36514 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24732","11.385117","172.30.1.205","172.30.1.104","TCP","54","36518 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24733","11.385145","172.30.1.205","172.30.1.104","TCP","54","36522 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24734","11.385172","172.30.1.205","172.30.1.104","TCP","54","36526 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24735","11.385200","172.30.1.205","172.30.1.104","TCP","54","36530 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24736","11.385228","172.30.1.205","172.30.1.104","TCP","54","36534 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24737","11.385258","172.30.1.205","172.30.1.104","TCP","54","36538 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24738","11.385285","172.30.1.205","172.30.1.104","TCP","54","36542 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24739","11.385311","172.30.1.205","172.30.1.104","TCP","54","36546 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24740","11.385379","172.30.1.205","172.30.1.104","TCP","54","36502 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "24741","11.385713","172.30.1.104","172.30.1.205","TCP","54","49671 > 36506 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24742","11.385739","172.30.1.104","172.30.1.205","TCP","54","49671 > 36510 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24743","11.385769","172.30.1.104","172.30.1.205","TCP","54","49671 > 36506 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24744","11.385776","172.30.1.205","172.30.1.104","TCP","54","36506 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24745","11.385798","172.30.1.104","172.30.1.205","TCP","54","49671 > 36514 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24746","11.385842","172.30.1.104","172.30.1.205","TCP","54","49671 > 36518 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24747","11.385879","172.30.1.104","172.30.1.205","TCP","54","49671 > 36518 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24748","11.385884","172.30.1.205","172.30.1.104","TCP","54","36518 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24749","11.385917","172.30.1.104","172.30.1.205","TCP","54","49671 > 36522 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24750","11.385942","172.30.1.104","172.30.1.205","TCP","54","49671 > 36522 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24751","11.385947","172.30.1.205","172.30.1.104","TCP","54","36522 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24752","11.385970","172.30.1.104","172.30.1.205","TCP","54","49671 > 36526 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24753","11.385997","172.30.1.104","172.30.1.205","TCP","54","49671 > 36510 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24754","11.386002","172.30.1.205","172.30.1.104","TCP","54","36510 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24755","11.386026","172.30.1.104","172.30.1.205","TCP","54","49671 > 36530 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24756","11.386052","172.30.1.104","172.30.1.205","TCP","54","49671 > 36530 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24757","11.386056","172.30.1.205","172.30.1.104","TCP","54","36530 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24758","11.386080","172.30.1.104","172.30.1.205","TCP","54","49671 > 36534 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24759","11.386107","172.30.1.104","172.30.1.205","TCP","54","49671 > 36534 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24760","11.386111","172.30.1.205","172.30.1.104","TCP","54","36534 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24761","11.386134","172.30.1.104","172.30.1.205","TCP","54","49671 > 36538 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24762","11.386161","172.30.1.104","172.30.1.205","TCP","54","49671 > 36514 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24763","11.386165","172.30.1.205","172.30.1.104","TCP","54","36514 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24764","11.386189","172.30.1.104","172.30.1.205","TCP","54","49671 > 36542 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24765","11.386216","172.30.1.104","172.30.1.205","TCP","54","49671 > 36542 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24766","11.386220","172.30.1.205","172.30.1.104","TCP","54","36542 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24767","11.386243","172.30.1.104","172.30.1.205","TCP","54","49671 > 36546 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24768","11.386271","172.30.1.104","172.30.1.205","TCP","54","49671 > 36526 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24769","11.386274","172.30.1.205","172.30.1.104","TCP","54","36526 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24770","11.386485","172.30.1.104","172.30.1.205","TCP","54","49671 > 36502 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24771","11.386510","172.30.1.104","172.30.1.205","TCP","54","49671 > 36538 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24772","11.386515","172.30.1.205","172.30.1.104","TCP","54","36538 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24773","11.386538","172.30.1.104","172.30.1.205","TCP","54","49671 > 36546 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24774","11.386541","172.30.1.205","172.30.1.104","TCP","54","36546 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24775","11.386567","172.30.1.104","172.30.1.205","TCP","54","49671 > 36502 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "24776","11.386570","172.30.1.205","172.30.1.104","TCP","54","36502 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "24777","11.386981","172.30.1.205","172.30.1.104","TCP","54","43912 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24778","11.387092","172.30.1.205","172.30.1.104","TCP","74","36550 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914613 TSecr=0 WS=128" "24779","11.387320","172.30.1.104","172.30.1.205","TCP","54","135 > 43912 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24780","11.387355","172.30.1.104","172.30.1.205","TCP","54","135 > 43912 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24781","11.387360","172.30.1.205","172.30.1.104","TCP","54","43912 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24782","11.387478","172.30.1.104","172.30.1.205","TCP","66","49671 > 36550 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24783","11.387486","172.30.1.205","172.30.1.104","TCP","54","36550 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24784","11.387840","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24785","11.388189","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24786","11.388198","172.30.1.205","172.30.1.104","TCP","54","36550 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24787","11.390130","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24788","11.390580","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24789","11.390586","172.30.1.205","172.30.1.104","TCP","54","36550 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24790","11.391944","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24791","11.394200","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24792","11.394211","172.30.1.205","172.30.1.104","TCP","54","36550 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24793","11.395180","172.30.1.205","172.30.1.104","TCP","74","43916 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914621 TSecr=0 WS=128" "24794","11.395491","172.30.1.104","172.30.1.205","TCP","66","135 > 43916 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24795","11.395502","172.30.1.205","172.30.1.104","TCP","54","43916 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24796","11.395856","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24797","11.396194","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24798","11.396203","172.30.1.205","172.30.1.104","TCP","54","43916 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24799","11.398421","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24800","11.398847","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24801","11.398855","172.30.1.205","172.30.1.104","TCP","54","43916 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24802","11.400673","172.30.1.205","172.30.1.104","TCP","54","43916 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24803","11.400809","172.30.1.205","172.30.1.104","TCP","74","36554 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914627 TSecr=0 WS=128" "24804","11.400959","172.30.1.104","172.30.1.205","TCP","54","135 > 43916 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24805","11.400995","172.30.1.104","172.30.1.205","TCP","54","135 > 43916 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24806","11.401001","172.30.1.205","172.30.1.104","TCP","54","43916 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24807","11.401142","172.30.1.104","172.30.1.205","TCP","66","49671 > 36554 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24808","11.401150","172.30.1.205","172.30.1.104","TCP","54","36554 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24809","11.401493","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24810","11.401806","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24811","11.401815","172.30.1.205","172.30.1.104","TCP","54","36554 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24812","11.403689","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24813","11.404097","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24814","11.404103","172.30.1.205","172.30.1.104","TCP","54","36554 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24815","11.405476","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24816","11.407735","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24817","11.407745","172.30.1.205","172.30.1.104","TCP","54","36554 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24818","11.408691","172.30.1.205","172.30.1.104","TCP","74","43920 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914635 TSecr=0 WS=128" "24819","11.409054","172.30.1.104","172.30.1.205","TCP","66","135 > 43920 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24820","11.409066","172.30.1.205","172.30.1.104","TCP","54","43920 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24821","11.409434","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24822","11.409753","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24823","11.409762","172.30.1.205","172.30.1.104","TCP","54","43920 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24824","11.411975","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24825","11.412427","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24826","11.412434","172.30.1.205","172.30.1.104","TCP","54","43920 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24827","11.414286","172.30.1.205","172.30.1.104","TCP","54","43920 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24828","11.414406","172.30.1.205","172.30.1.104","TCP","74","36558 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914640 TSecr=0 WS=128" "24829","11.414593","172.30.1.104","172.30.1.205","TCP","54","135 > 43920 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24830","11.414662","172.30.1.104","172.30.1.205","TCP","54","135 > 43920 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24831","11.414669","172.30.1.205","172.30.1.104","TCP","54","43920 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24832","11.414726","172.30.1.104","172.30.1.205","TCP","66","49671 > 36558 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24833","11.414734","172.30.1.205","172.30.1.104","TCP","54","36558 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24834","11.415078","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24835","11.415388","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24836","11.415397","172.30.1.205","172.30.1.104","TCP","54","36558 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24837","11.417321","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24838","11.417739","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24839","11.417746","172.30.1.205","172.30.1.104","TCP","54","36558 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24840","11.419102","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24841","11.421378","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24842","11.421388","172.30.1.205","172.30.1.104","TCP","54","36558 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24843","11.422421","172.30.1.205","172.30.1.104","TCP","74","43924 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914648 TSecr=0 WS=128" "24844","11.422736","172.30.1.104","172.30.1.205","TCP","66","135 > 43924 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24845","11.422747","172.30.1.205","172.30.1.104","TCP","54","43924 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24846","11.423098","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24847","11.423435","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24848","11.423444","172.30.1.205","172.30.1.104","TCP","54","43924 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24849","11.425706","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24850","11.426139","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24851","11.426145","172.30.1.205","172.30.1.104","TCP","54","43924 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24852","11.427968","172.30.1.205","172.30.1.104","TCP","54","43924 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24853","11.428078","172.30.1.205","172.30.1.104","TCP","74","36562 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914654 TSecr=0 WS=128" "24854","11.428335","172.30.1.104","172.30.1.205","TCP","54","135 > 43924 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24855","11.428378","172.30.1.104","172.30.1.205","TCP","54","135 > 43924 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24856","11.428384","172.30.1.205","172.30.1.104","TCP","54","43924 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24857","11.428415","172.30.1.104","172.30.1.205","TCP","66","49671 > 36562 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24858","11.428424","172.30.1.205","172.30.1.104","TCP","54","36562 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24859","11.428773","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24860","11.431041","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24861","11.431048","172.30.1.205","172.30.1.104","TCP","54","36562 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24862","11.432945","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24863","11.433361","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24864","11.433368","172.30.1.205","172.30.1.104","TCP","54","36562 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24865","11.434778","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24866","11.438474","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24867","11.438484","172.30.1.205","172.30.1.104","TCP","54","36562 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24868","11.439443","172.30.1.205","172.30.1.104","TCP","74","43928 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914665 TSecr=0 WS=128" "24869","11.439777","172.30.1.104","172.30.1.205","TCP","66","135 > 43928 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24870","11.439790","172.30.1.205","172.30.1.104","TCP","54","43928 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24871","11.440148","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24872","11.440489","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24873","11.440498","172.30.1.205","172.30.1.104","TCP","54","43928 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24874","11.442691","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24875","11.443124","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24876","11.443131","172.30.1.205","172.30.1.104","TCP","54","43928 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24877","11.444966","172.30.1.205","172.30.1.104","TCP","54","43928 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24878","11.445077","172.30.1.205","172.30.1.104","TCP","74","36566 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914671 TSecr=0 WS=128" "24879","11.445259","172.30.1.104","172.30.1.205","TCP","54","135 > 43928 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24880","11.445305","172.30.1.104","172.30.1.205","TCP","54","135 > 43928 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24881","11.445311","172.30.1.205","172.30.1.104","TCP","54","43928 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24882","11.445395","172.30.1.104","172.30.1.205","TCP","66","49671 > 36566 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24883","11.445404","172.30.1.205","172.30.1.104","TCP","54","36566 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24884","11.445748","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24885","11.446062","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24886","11.446071","172.30.1.205","172.30.1.104","TCP","54","36566 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24887","11.447959","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24888","11.448360","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24889","11.448366","172.30.1.205","172.30.1.104","TCP","54","36566 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24890","11.449752","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24891","11.451965","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24892","11.451975","172.30.1.205","172.30.1.104","TCP","54","36566 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24893","11.452929","172.30.1.205","172.30.1.104","TCP","74","43932 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914679 TSecr=0 WS=128" "24894","11.453267","172.30.1.104","172.30.1.205","TCP","66","135 > 43932 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24895","11.453278","172.30.1.205","172.30.1.104","TCP","54","43932 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24896","11.453628","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24897","11.453965","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24898","11.453974","172.30.1.205","172.30.1.104","TCP","54","43932 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24899","11.456168","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24900","11.456601","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24901","11.456607","172.30.1.205","172.30.1.104","TCP","54","43932 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24902","11.458455","172.30.1.205","172.30.1.104","TCP","54","43932 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24903","11.458572","172.30.1.205","172.30.1.104","TCP","74","36570 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914684 TSecr=0 WS=128" "24904","11.458739","172.30.1.104","172.30.1.205","TCP","54","135 > 43932 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24905","11.458781","172.30.1.104","172.30.1.205","TCP","54","135 > 43932 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24906","11.458788","172.30.1.205","172.30.1.104","TCP","54","43932 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24907","11.458872","172.30.1.104","172.30.1.205","TCP","66","49671 > 36570 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24908","11.458880","172.30.1.205","172.30.1.104","TCP","54","36570 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24909","11.459229","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24910","11.459549","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24911","11.459558","172.30.1.205","172.30.1.104","TCP","54","36570 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24912","11.461483","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24913","11.461877","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24914","11.461883","172.30.1.205","172.30.1.104","TCP","54","36570 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24915","11.463244","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24916","11.465550","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24917","11.465560","172.30.1.205","172.30.1.104","TCP","54","36570 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24918","11.466513","172.30.1.205","172.30.1.104","TCP","74","43936 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914692 TSecr=0 WS=128" "24919","11.466835","172.30.1.104","172.30.1.205","TCP","66","135 > 43936 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24920","11.466846","172.30.1.205","172.30.1.104","TCP","54","43936 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24921","11.467194","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24922","11.467535","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24923","11.467544","172.30.1.205","172.30.1.104","TCP","54","43936 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24924","11.469768","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24925","11.470187","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24926","11.470194","172.30.1.205","172.30.1.104","TCP","54","43936 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24927","11.472023","172.30.1.205","172.30.1.104","TCP","54","43936 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24928","11.472135","172.30.1.205","172.30.1.104","TCP","74","36574 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914698 TSecr=0 WS=128" "24929","11.472342","172.30.1.104","172.30.1.205","TCP","54","135 > 43936 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24930","11.472369","172.30.1.104","172.30.1.205","TCP","54","135 > 43936 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24931","11.472375","172.30.1.205","172.30.1.104","TCP","54","43936 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24932","11.472459","172.30.1.104","172.30.1.205","TCP","66","49671 > 36574 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24933","11.472468","172.30.1.205","172.30.1.104","TCP","54","36574 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24934","11.472837","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24935","11.475223","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24936","11.475230","172.30.1.205","172.30.1.104","TCP","54","36574 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24937","11.477140","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24938","11.477569","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24939","11.477575","172.30.1.205","172.30.1.104","TCP","54","36574 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24940","11.478940","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24941","11.481905","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24942","11.481915","172.30.1.205","172.30.1.104","TCP","54","36574 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24943","11.482880","172.30.1.205","172.30.1.104","TCP","74","43940 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914709 TSecr=0 WS=128" "24944","11.483198","172.30.1.104","172.30.1.205","TCP","66","135 > 43940 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24945","11.483209","172.30.1.205","172.30.1.104","TCP","54","43940 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24946","11.483561","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24947","11.483883","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24948","11.483892","172.30.1.205","172.30.1.104","TCP","54","43940 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24949","11.486124","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24950","11.486548","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24951","11.486554","172.30.1.205","172.30.1.104","TCP","54","43940 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24952","11.488362","172.30.1.205","172.30.1.104","TCP","54","43940 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24953","11.488473","172.30.1.205","172.30.1.104","TCP","74","36578 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914714 TSecr=0 WS=128" "24954","11.488641","172.30.1.104","172.30.1.205","TCP","54","135 > 43940 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24955","11.488676","172.30.1.104","172.30.1.205","TCP","54","135 > 43940 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24956","11.488682","172.30.1.205","172.30.1.104","TCP","54","43940 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24957","11.488766","172.30.1.104","172.30.1.205","TCP","66","49671 > 36578 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24958","11.488785","172.30.1.205","172.30.1.104","TCP","54","36578 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24959","11.489136","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24960","11.489464","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24961","11.489473","172.30.1.205","172.30.1.104","TCP","54","36578 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24962","11.491332","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24963","11.491718","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24964","11.491725","172.30.1.205","172.30.1.104","TCP","54","36578 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24965","11.493127","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24966","11.495378","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24967","11.495389","172.30.1.205","172.30.1.104","TCP","54","36578 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24968","11.496341","172.30.1.205","172.30.1.104","TCP","74","43944 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914722 TSecr=0 WS=128" "24969","11.496672","172.30.1.104","172.30.1.205","TCP","66","135 > 43944 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24970","11.496682","172.30.1.205","172.30.1.104","TCP","54","43944 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24971","11.497061","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24972","11.497421","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24973","11.497430","172.30.1.205","172.30.1.104","TCP","54","43944 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24974","11.499608","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "24975","11.500013","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "24976","11.500020","172.30.1.205","172.30.1.104","TCP","54","43944 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "24977","11.501859","172.30.1.205","172.30.1.104","TCP","54","43944 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "24978","11.501982","172.30.1.205","172.30.1.104","TCP","74","36582 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914728 TSecr=0 WS=128" "24979","11.502137","172.30.1.104","172.30.1.205","TCP","54","135 > 43944 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24980","11.502167","172.30.1.104","172.30.1.205","TCP","54","135 > 43944 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "24981","11.502173","172.30.1.205","172.30.1.104","TCP","54","43944 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "24982","11.502313","172.30.1.104","172.30.1.205","TCP","66","49671 > 36582 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24983","11.502321","172.30.1.205","172.30.1.104","TCP","54","36582 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24984","11.502671","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "24985","11.502963","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24986","11.502972","172.30.1.205","172.30.1.104","TCP","54","36582 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24987","11.504865","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "24988","11.505232","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "24989","11.505239","172.30.1.205","172.30.1.104","TCP","54","36582 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "24990","11.506600","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "24991","11.508862","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "24992","11.508872","172.30.1.205","172.30.1.104","TCP","54","36582 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "24993","11.509860","172.30.1.205","172.30.1.104","TCP","74","43948 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914736 TSecr=0 WS=128" "24994","11.510166","172.30.1.104","172.30.1.205","TCP","66","135 > 43948 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "24995","11.510178","172.30.1.205","172.30.1.104","TCP","54","43948 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "24996","11.510532","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "24997","11.510880","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "24998","11.510889","172.30.1.205","172.30.1.104","TCP","54","43948 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "24999","11.513121","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25000","11.513537","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25001","11.513544","172.30.1.205","172.30.1.104","TCP","54","43948 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25002","11.515363","172.30.1.205","172.30.1.104","TCP","54","43948 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25003","11.515480","172.30.1.205","172.30.1.104","TCP","74","36586 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914741 TSecr=0 WS=128" "25004","11.515639","172.30.1.104","172.30.1.205","TCP","54","135 > 43948 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25005","11.515674","172.30.1.104","172.30.1.205","TCP","54","135 > 43948 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25006","11.515681","172.30.1.205","172.30.1.104","TCP","54","43948 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25007","11.515752","172.30.1.104","172.30.1.205","TCP","66","49671 > 36586 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25008","11.515760","172.30.1.205","172.30.1.104","TCP","54","36586 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25009","11.516108","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25010","11.516442","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25011","11.516451","172.30.1.205","172.30.1.104","TCP","54","36586 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25012","11.518371","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25013","11.518790","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25014","11.518796","172.30.1.205","172.30.1.104","TCP","54","36586 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25015","11.520146","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25016","11.522455","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25017","11.522467","172.30.1.205","172.30.1.104","TCP","54","36586 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25018","11.523429","172.30.1.205","172.30.1.104","TCP","74","43952 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914749 TSecr=0 WS=128" "25019","11.523743","172.30.1.104","172.30.1.205","TCP","66","135 > 43952 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25020","11.523754","172.30.1.205","172.30.1.104","TCP","54","43952 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25021","11.524110","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25022","11.524424","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25023","11.524433","172.30.1.205","172.30.1.104","TCP","54","43952 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25024","11.526673","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25025","11.527083","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25026","11.527091","172.30.1.205","172.30.1.104","TCP","54","43952 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25027","11.528957","172.30.1.205","172.30.1.104","TCP","54","43952 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25028","11.529071","172.30.1.205","172.30.1.104","TCP","74","36590 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914755 TSecr=0 WS=128" "25029","11.529242","172.30.1.104","172.30.1.205","TCP","54","135 > 43952 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25030","11.529277","172.30.1.104","172.30.1.205","TCP","54","135 > 43952 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25031","11.529283","172.30.1.205","172.30.1.104","TCP","54","43952 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25032","11.529407","172.30.1.104","172.30.1.205","TCP","66","49671 > 36590 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25033","11.529415","172.30.1.205","172.30.1.104","TCP","54","36590 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25034","11.529765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25035","11.530067","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25036","11.530076","172.30.1.205","172.30.1.104","TCP","54","36590 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25037","11.531977","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25038","11.532380","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25039","11.532387","172.30.1.205","172.30.1.104","TCP","54","36590 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25040","11.533762","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25041","11.536549","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25042","11.536562","172.30.1.205","172.30.1.104","TCP","54","36590 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25043","11.537565","172.30.1.205","172.30.1.104","TCP","74","43956 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914763 TSecr=0 WS=128" "25044","11.537928","172.30.1.104","172.30.1.205","TCP","66","135 > 43956 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25045","11.537939","172.30.1.205","172.30.1.104","TCP","54","43956 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25046","11.538298","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25047","11.538620","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25048","11.538635","172.30.1.205","172.30.1.104","TCP","54","43956 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25049","11.540959","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25050","11.541405","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25051","11.541412","172.30.1.205","172.30.1.104","TCP","54","43956 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25052","11.543246","172.30.1.205","172.30.1.104","TCP","54","43956 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25053","11.543377","172.30.1.205","172.30.1.104","TCP","74","36594 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914769 TSecr=0 WS=128" "25054","11.543562","172.30.1.104","172.30.1.205","TCP","54","135 > 43956 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25055","11.543596","172.30.1.104","172.30.1.205","TCP","54","135 > 43956 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25056","11.543603","172.30.1.205","172.30.1.104","TCP","54","43956 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25057","11.543677","172.30.1.104","172.30.1.205","TCP","66","49671 > 36594 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25058","11.543686","172.30.1.205","172.30.1.104","TCP","54","36594 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25059","11.544038","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25060","11.544344","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25061","11.544353","172.30.1.205","172.30.1.104","TCP","54","36594 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25062","11.546275","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25063","11.546650","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25064","11.546656","172.30.1.205","172.30.1.104","TCP","54","36594 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25065","11.548012","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25066","11.550335","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25067","11.550345","172.30.1.205","172.30.1.104","TCP","54","36594 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25068","11.551325","172.30.1.205","172.30.1.104","TCP","74","43960 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914777 TSecr=0 WS=128" "25069","11.551633","172.30.1.104","172.30.1.205","TCP","66","135 > 43960 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25070","11.551644","172.30.1.205","172.30.1.104","TCP","54","43960 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25071","11.552008","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25072","11.552312","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25073","11.552321","172.30.1.205","172.30.1.104","TCP","54","43960 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25074","11.554540","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25075","11.554947","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25076","11.554953","172.30.1.205","172.30.1.104","TCP","54","43960 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25077","11.555802","172.30.1.205","172.30.1.104","TCP","54","36554 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25078","11.555864","172.30.1.205","172.30.1.104","TCP","54","36558 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25079","11.555903","172.30.1.205","172.30.1.104","TCP","54","36562 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25080","11.555937","172.30.1.205","172.30.1.104","TCP","54","36566 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25081","11.555965","172.30.1.205","172.30.1.104","TCP","54","36570 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25082","11.555988","172.30.1.205","172.30.1.104","TCP","54","36574 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25083","11.556015","172.30.1.205","172.30.1.104","TCP","54","36578 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25084","11.556043","172.30.1.205","172.30.1.104","TCP","54","36582 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25085","11.556064","172.30.1.205","172.30.1.104","TCP","54","36586 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25086","11.556090","172.30.1.205","172.30.1.104","TCP","54","36590 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25087","11.556117","172.30.1.205","172.30.1.104","TCP","54","36594 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25088","11.556190","172.30.1.205","172.30.1.104","TCP","54","36550 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25089","11.556254","172.30.1.104","172.30.1.205","TCP","54","49671 > 36554 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25090","11.556605","172.30.1.104","172.30.1.205","TCP","54","49671 > 36558 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25091","11.556623","172.30.1.104","172.30.1.205","TCP","54","49671 > 36554 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25092","11.556629","172.30.1.205","172.30.1.104","TCP","54","36554 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25093","11.556668","172.30.1.104","172.30.1.205","TCP","54","49671 > 36558 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25094","11.556672","172.30.1.205","172.30.1.104","TCP","54","36558 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25095","11.556688","172.30.1.104","172.30.1.205","TCP","54","49671 > 36562 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25096","11.556709","172.30.1.104","172.30.1.205","TCP","54","49671 > 36562 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25097","11.556712","172.30.1.205","172.30.1.104","TCP","54","36562 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25098","11.556791","172.30.1.104","172.30.1.205","TCP","54","49671 > 36566 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25099","11.556808","172.30.1.104","172.30.1.205","TCP","54","49671 > 36570 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25100","11.556847","172.30.1.104","172.30.1.205","TCP","54","49671 > 36566 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25101","11.556852","172.30.1.205","172.30.1.104","TCP","54","36566 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25102","11.556959","172.30.1.104","172.30.1.205","TCP","54","49671 > 36570 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25103","11.556962","172.30.1.205","172.30.1.104","TCP","54","36570 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25104","11.556967","172.30.1.104","172.30.1.205","TCP","54","49671 > 36574 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25105","11.556972","172.30.1.104","172.30.1.205","TCP","54","49671 > 36574 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25106","11.556974","172.30.1.205","172.30.1.104","TCP","54","36574 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25107","11.557004","172.30.1.104","172.30.1.205","TCP","54","49671 > 36578 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25108","11.557024","172.30.1.104","172.30.1.205","TCP","54","49671 > 36578 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25109","11.557028","172.30.1.205","172.30.1.104","TCP","54","36578 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25110","11.557254","172.30.1.104","172.30.1.205","TCP","54","49671 > 36582 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25111","11.557261","172.30.1.104","172.30.1.205","TCP","54","49671 > 36582 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25112","11.557266","172.30.1.205","172.30.1.104","TCP","54","36582 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25113","11.557271","172.30.1.104","172.30.1.205","TCP","54","49671 > 36586 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25114","11.557274","172.30.1.104","172.30.1.205","TCP","54","49671 > 36586 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25115","11.557280","172.30.1.205","172.30.1.104","TCP","54","36586 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25116","11.557281","172.30.1.104","172.30.1.205","TCP","54","49671 > 36590 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25117","11.557284","172.30.1.104","172.30.1.205","TCP","54","49671 > 36590 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25118","11.557285","172.30.1.205","172.30.1.104","TCP","54","36590 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25119","11.557287","172.30.1.104","172.30.1.205","TCP","54","49671 > 36594 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25120","11.557296","172.30.1.104","172.30.1.205","TCP","54","49671 > 36594 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25121","11.557298","172.30.1.205","172.30.1.104","TCP","54","36594 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25122","11.557746","172.30.1.205","172.30.1.104","TCP","54","43960 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25123","11.557778","172.30.1.104","172.30.1.205","TCP","54","49671 > 36550 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25124","11.557785","172.30.1.104","172.30.1.205","TCP","54","49671 > 36550 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25125","11.557790","172.30.1.205","172.30.1.104","TCP","54","36550 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25126","11.557882","172.30.1.205","172.30.1.104","TCP","74","36598 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914784 TSecr=0 WS=128" "25127","11.558044","172.30.1.104","172.30.1.205","TCP","54","135 > 43960 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25128","11.558094","172.30.1.104","172.30.1.205","TCP","54","135 > 43960 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25129","11.558099","172.30.1.205","172.30.1.104","TCP","54","43960 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25130","11.558173","172.30.1.104","172.30.1.205","TCP","66","49671 > 36598 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25131","11.558181","172.30.1.205","172.30.1.104","TCP","54","36598 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25132","11.558540","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25133","11.558845","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25134","11.558854","172.30.1.205","172.30.1.104","TCP","54","36598 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25135","11.560723","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25136","11.561115","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25137","11.561122","172.30.1.205","172.30.1.104","TCP","54","36598 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25138","11.562496","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25139","11.564714","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25140","11.564723","172.30.1.205","172.30.1.104","TCP","54","36598 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25141","11.565708","172.30.1.205","172.30.1.104","TCP","74","43964 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914792 TSecr=0 WS=128" "25142","11.566010","172.30.1.104","172.30.1.205","TCP","66","135 > 43964 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25143","11.566021","172.30.1.205","172.30.1.104","TCP","54","43964 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25144","11.566374","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25145","11.566686","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25146","11.566695","172.30.1.205","172.30.1.104","TCP","54","43964 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25147","11.568908","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25148","11.569328","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25149","11.569334","172.30.1.205","172.30.1.104","TCP","54","43964 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25150","11.571156","172.30.1.205","172.30.1.104","TCP","54","43964 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25151","11.571268","172.30.1.205","172.30.1.104","TCP","74","36602 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914797 TSecr=0 WS=128" "25152","11.571434","172.30.1.104","172.30.1.205","TCP","54","135 > 43964 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25153","11.571466","172.30.1.104","172.30.1.205","TCP","54","135 > 43964 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25154","11.571471","172.30.1.205","172.30.1.104","TCP","54","43964 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25155","11.571555","172.30.1.104","172.30.1.205","TCP","66","49671 > 36602 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25156","11.571563","172.30.1.205","172.30.1.104","TCP","54","36602 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25157","11.571930","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25158","11.572248","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25159","11.572259","172.30.1.205","172.30.1.104","TCP","54","36602 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25160","11.574165","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25161","11.574626","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25162","11.574634","172.30.1.205","172.30.1.104","TCP","54","36602 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25163","11.576007","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25164","11.578259","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25165","11.578270","172.30.1.205","172.30.1.104","TCP","54","36602 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25166","11.579227","172.30.1.205","172.30.1.104","TCP","74","43968 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914805 TSecr=0 WS=128" "25167","11.579615","172.30.1.104","172.30.1.205","TCP","66","135 > 43968 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25168","11.579626","172.30.1.205","172.30.1.104","TCP","54","43968 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25169","11.579984","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25170","11.580299","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25171","11.580308","172.30.1.205","172.30.1.104","TCP","54","43968 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25172","11.582535","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25173","11.582949","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25174","11.582956","172.30.1.205","172.30.1.104","TCP","54","43968 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25175","11.584769","172.30.1.205","172.30.1.104","TCP","54","43968 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25176","11.584891","172.30.1.205","172.30.1.104","TCP","74","36606 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914811 TSecr=0 WS=128" "25177","11.585075","172.30.1.104","172.30.1.205","TCP","54","135 > 43968 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25178","11.585105","172.30.1.104","172.30.1.205","TCP","54","135 > 43968 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25179","11.585111","172.30.1.205","172.30.1.104","TCP","54","43968 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25180","11.585187","172.30.1.104","172.30.1.205","TCP","66","49671 > 36606 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25181","11.585195","172.30.1.205","172.30.1.104","TCP","54","36606 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25182","11.585544","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25183","11.585844","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25184","11.585852","172.30.1.205","172.30.1.104","TCP","54","36606 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25185","11.587778","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25186","11.588164","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25187","11.588170","172.30.1.205","172.30.1.104","TCP","54","36606 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25188","11.589559","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25189","11.591881","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25190","11.591890","172.30.1.205","172.30.1.104","TCP","54","36606 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25191","11.592864","172.30.1.205","172.30.1.104","TCP","74","43972 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914819 TSecr=0 WS=128" "25192","11.593175","172.30.1.104","172.30.1.205","TCP","66","135 > 43972 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25193","11.593186","172.30.1.205","172.30.1.104","TCP","54","43972 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25194","11.593538","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25195","11.593846","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25196","11.593855","172.30.1.205","172.30.1.104","TCP","54","43972 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25197","11.596121","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25198","11.596537","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25199","11.596543","172.30.1.205","172.30.1.104","TCP","54","43972 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25200","11.598381","172.30.1.205","172.30.1.104","TCP","54","43972 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25201","11.598493","172.30.1.205","172.30.1.104","TCP","74","36610 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914824 TSecr=0 WS=128" "25202","11.598668","172.30.1.104","172.30.1.205","TCP","54","135 > 43972 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25203","11.598679","172.30.1.104","172.30.1.205","TCP","54","135 > 43972 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25204","11.598684","172.30.1.205","172.30.1.104","TCP","54","43972 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25205","11.598765","172.30.1.104","172.30.1.205","TCP","66","49671 > 36610 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25206","11.598773","172.30.1.205","172.30.1.104","TCP","54","36610 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25207","11.599129","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25208","11.599435","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25209","11.599444","172.30.1.205","172.30.1.104","TCP","54","36610 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25210","11.601347","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25211","11.601740","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25212","11.601746","172.30.1.205","172.30.1.104","TCP","54","36610 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25213","11.603103","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25214","11.605449","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25215","11.605459","172.30.1.205","172.30.1.104","TCP","54","36610 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25216","11.606401","172.30.1.205","172.30.1.104","TCP","74","43976 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914832 TSecr=0 WS=128" "25217","11.606739","172.30.1.104","172.30.1.205","TCP","66","135 > 43976 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25218","11.606750","172.30.1.205","172.30.1.104","TCP","54","43976 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25219","11.607099","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25220","11.607428","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25221","11.607437","172.30.1.205","172.30.1.104","TCP","54","43976 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25222","11.609649","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25223","11.610091","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25224","11.610098","172.30.1.205","172.30.1.104","TCP","54","43976 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25225","11.611955","172.30.1.205","172.30.1.104","TCP","54","43976 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25226","11.612076","172.30.1.205","172.30.1.104","TCP","74","36614 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914838 TSecr=0 WS=128" "25227","11.612252","172.30.1.104","172.30.1.205","TCP","54","135 > 43976 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25228","11.612293","172.30.1.104","172.30.1.205","TCP","54","135 > 43976 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25229","11.612298","172.30.1.205","172.30.1.104","TCP","54","43976 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25230","11.612370","172.30.1.104","172.30.1.205","TCP","66","49671 > 36614 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25231","11.612378","172.30.1.205","172.30.1.104","TCP","54","36614 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25232","11.612735","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25233","11.613069","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25234","11.613078","172.30.1.205","172.30.1.104","TCP","54","36614 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25235","11.614950","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25236","11.616772","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25237","11.616788","172.30.1.205","172.30.1.104","TCP","54","36614 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25238","11.618149","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25239","11.620555","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25240","11.620564","172.30.1.205","172.30.1.104","TCP","54","36614 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25241","11.621523","172.30.1.205","172.30.1.104","TCP","74","43980 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914847 TSecr=0 WS=128" "25242","11.621875","172.30.1.104","172.30.1.205","TCP","66","135 > 43980 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25243","11.621886","172.30.1.205","172.30.1.104","TCP","54","43980 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25244","11.622244","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25245","11.622580","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25246","11.622589","172.30.1.205","172.30.1.104","TCP","54","43980 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25247","11.624769","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25248","11.625238","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25249","11.625245","172.30.1.205","172.30.1.104","TCP","54","43980 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25250","11.627059","172.30.1.205","172.30.1.104","TCP","54","43980 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25251","11.627170","172.30.1.205","172.30.1.104","TCP","74","36618 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914853 TSecr=0 WS=128" "25252","11.627456","172.30.1.104","172.30.1.205","TCP","66","49671 > 36618 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25253","11.627466","172.30.1.205","172.30.1.104","TCP","54","36618 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25254","11.627524","172.30.1.104","172.30.1.205","TCP","54","135 > 43980 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25255","11.627532","172.30.1.104","172.30.1.205","TCP","54","135 > 43980 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25256","11.627542","172.30.1.205","172.30.1.104","TCP","54","43980 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25257","11.628162","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25258","11.628510","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25259","11.628519","172.30.1.205","172.30.1.104","TCP","54","36618 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25260","11.630413","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25261","11.630803","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25262","11.630809","172.30.1.205","172.30.1.104","TCP","54","36618 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25263","11.632163","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25264","11.634422","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25265","11.634432","172.30.1.205","172.30.1.104","TCP","54","36618 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25266","11.635370","172.30.1.205","172.30.1.104","TCP","74","43984 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914861 TSecr=0 WS=128" "25267","11.635680","172.30.1.104","172.30.1.205","TCP","66","135 > 43984 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25268","11.635691","172.30.1.205","172.30.1.104","TCP","54","43984 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25269","11.636041","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25270","11.636352","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25271","11.636360","172.30.1.205","172.30.1.104","TCP","54","43984 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25272","11.638581","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25273","11.638972","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25274","11.638979","172.30.1.205","172.30.1.104","TCP","54","43984 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25275","11.640804","172.30.1.205","172.30.1.104","TCP","54","43984 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25276","11.640915","172.30.1.205","172.30.1.104","TCP","74","36622 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914867 TSecr=0 WS=128" "25277","11.641095","172.30.1.104","172.30.1.205","TCP","54","135 > 43984 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25278","11.641157","172.30.1.104","172.30.1.205","TCP","54","135 > 43984 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25279","11.641163","172.30.1.205","172.30.1.104","TCP","54","43984 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25280","11.641237","172.30.1.104","172.30.1.205","TCP","66","49671 > 36622 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25281","11.641246","172.30.1.205","172.30.1.104","TCP","54","36622 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25282","11.641612","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25283","11.641947","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25284","11.641955","172.30.1.205","172.30.1.104","TCP","54","36622 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25285","11.643817","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25286","11.644205","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25287","11.644211","172.30.1.205","172.30.1.104","TCP","54","36622 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25288","11.645600","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25289","11.647842","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25290","11.647852","172.30.1.205","172.30.1.104","TCP","54","36622 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25291","11.648805","172.30.1.205","172.30.1.104","TCP","74","43988 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914875 TSecr=0 WS=128" "25292","11.649108","172.30.1.104","172.30.1.205","TCP","66","135 > 43988 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25293","11.649118","172.30.1.205","172.30.1.104","TCP","54","43988 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25294","11.649463","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25295","11.649780","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25296","11.649789","172.30.1.205","172.30.1.104","TCP","54","43988 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25297","11.651968","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25298","11.652470","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25299","11.652477","172.30.1.205","172.30.1.104","TCP","54","43988 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25300","11.654316","172.30.1.205","172.30.1.104","TCP","54","43988 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25301","11.654427","172.30.1.205","172.30.1.104","TCP","74","36626 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914880 TSecr=0 WS=128" "25302","11.654623","172.30.1.104","172.30.1.205","TCP","54","135 > 43988 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25303","11.654632","172.30.1.104","172.30.1.205","TCP","54","135 > 43988 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25304","11.654637","172.30.1.205","172.30.1.104","TCP","54","43988 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25305","11.654709","172.30.1.104","172.30.1.205","TCP","66","49671 > 36626 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25306","11.654717","172.30.1.205","172.30.1.104","TCP","54","36626 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25307","11.655058","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25308","11.655372","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25309","11.655380","172.30.1.205","172.30.1.104","TCP","54","36626 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25310","11.657292","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25311","11.657661","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25312","11.657668","172.30.1.205","172.30.1.104","TCP","54","36626 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25313","11.659014","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25314","11.662213","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25315","11.662222","172.30.1.205","172.30.1.104","TCP","54","36626 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25316","11.663162","172.30.1.205","172.30.1.104","TCP","74","43992 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914889 TSecr=0 WS=128" "25317","11.663462","172.30.1.104","172.30.1.205","TCP","66","135 > 43992 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25318","11.663472","172.30.1.205","172.30.1.104","TCP","54","43992 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25319","11.663824","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25320","11.664154","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25321","11.664168","172.30.1.205","172.30.1.104","TCP","54","43992 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25322","11.666484","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25323","11.666917","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25324","11.666924","172.30.1.205","172.30.1.104","TCP","54","43992 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25325","11.668763","172.30.1.205","172.30.1.104","TCP","54","43992 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25326","11.668899","172.30.1.205","172.30.1.104","TCP","74","36630 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914895 TSecr=0 WS=128" "25327","11.669076","172.30.1.104","172.30.1.205","TCP","54","135 > 43992 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25328","11.669086","172.30.1.104","172.30.1.205","TCP","54","135 > 43992 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25329","11.669092","172.30.1.205","172.30.1.104","TCP","54","43992 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25330","11.669193","172.30.1.104","172.30.1.205","TCP","66","49671 > 36630 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25331","11.669202","172.30.1.205","172.30.1.104","TCP","54","36630 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25332","11.669548","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25333","11.669867","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25334","11.669876","172.30.1.205","172.30.1.104","TCP","54","36630 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25335","11.671757","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25336","11.672157","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25337","11.672163","172.30.1.205","172.30.1.104","TCP","54","36630 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25338","11.673545","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25339","11.675755","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25340","11.675767","172.30.1.205","172.30.1.104","TCP","54","36630 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25341","11.676737","172.30.1.205","172.30.1.104","TCP","74","43996 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914903 TSecr=0 WS=128" "25342","11.677065","172.30.1.104","172.30.1.205","TCP","66","135 > 43996 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25343","11.677076","172.30.1.205","172.30.1.104","TCP","54","43996 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25344","11.677437","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25345","11.677735","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25346","11.677744","172.30.1.205","172.30.1.104","TCP","54","43996 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25347","11.679927","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25348","11.680343","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25349","11.680350","172.30.1.205","172.30.1.104","TCP","54","43996 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25350","11.682186","172.30.1.205","172.30.1.104","TCP","54","43996 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25351","11.682299","172.30.1.205","172.30.1.104","TCP","74","36634 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914908 TSecr=0 WS=128" "25352","11.682456","172.30.1.104","172.30.1.205","TCP","54","135 > 43996 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25353","11.682516","172.30.1.104","172.30.1.205","TCP","54","135 > 43996 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25354","11.682522","172.30.1.205","172.30.1.104","TCP","54","43996 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25355","11.682649","172.30.1.104","172.30.1.205","TCP","66","49671 > 36634 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25356","11.682657","172.30.1.205","172.30.1.104","TCP","54","36634 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25357","11.683001","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25358","11.683301","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25359","11.683308","172.30.1.205","172.30.1.104","TCP","54","36634 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25360","11.685203","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25361","11.685589","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25362","11.685595","172.30.1.205","172.30.1.104","TCP","54","36634 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25363","11.686956","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25364","11.689145","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25365","11.689155","172.30.1.205","172.30.1.104","TCP","54","36634 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25366","11.690101","172.30.1.205","172.30.1.104","TCP","74","44000 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914916 TSecr=0 WS=128" "25367","11.690417","172.30.1.104","172.30.1.205","TCP","66","135 > 44000 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25368","11.690427","172.30.1.205","172.30.1.104","TCP","54","44000 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25369","11.690779","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25370","11.691144","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25371","11.691155","172.30.1.205","172.30.1.104","TCP","54","44000 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25372","11.693399","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25373","11.693811","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25374","11.693818","172.30.1.205","172.30.1.104","TCP","54","44000 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25375","11.695624","172.30.1.205","172.30.1.104","TCP","54","44000 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25376","11.695735","172.30.1.205","172.30.1.104","TCP","74","36638 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914922 TSecr=0 WS=128" "25377","11.695897","172.30.1.104","172.30.1.205","TCP","54","135 > 44000 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25378","11.695953","172.30.1.104","172.30.1.205","TCP","54","135 > 44000 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25379","11.695958","172.30.1.205","172.30.1.104","TCP","54","44000 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25380","11.696030","172.30.1.104","172.30.1.205","TCP","66","49671 > 36638 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25381","11.696039","172.30.1.205","172.30.1.104","TCP","54","36638 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25382","11.696387","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25383","11.697885","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25384","11.697893","172.30.1.205","172.30.1.104","TCP","54","36638 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25385","11.699768","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25386","11.700142","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25387","11.700149","172.30.1.205","172.30.1.104","TCP","54","36638 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25388","11.701524","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25389","11.703736","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25390","11.703747","172.30.1.205","172.30.1.104","TCP","54","36638 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25391","11.704685","172.30.1.205","172.30.1.104","TCP","74","44004 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914931 TSecr=0 WS=128" "25392","11.705013","172.30.1.104","172.30.1.205","TCP","66","135 > 44004 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25393","11.705025","172.30.1.205","172.30.1.104","TCP","54","44004 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25394","11.705387","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25395","11.705716","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25396","11.705725","172.30.1.205","172.30.1.104","TCP","54","44004 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25397","11.707937","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25398","11.708331","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25399","11.708341","172.30.1.205","172.30.1.104","TCP","54","44004 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25400","11.710289","172.30.1.205","172.30.1.104","TCP","54","44004 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25401","11.710421","172.30.1.205","172.30.1.104","TCP","74","36642 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914936 TSecr=0 WS=128" "25402","11.710617","172.30.1.104","172.30.1.205","TCP","54","135 > 44004 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25403","11.710627","172.30.1.104","172.30.1.205","TCP","54","135 > 44004 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25404","11.710634","172.30.1.205","172.30.1.104","TCP","54","44004 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25405","11.710721","172.30.1.104","172.30.1.205","TCP","66","49671 > 36642 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25406","11.710730","172.30.1.205","172.30.1.104","TCP","54","36642 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25407","11.711081","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25408","11.711383","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25409","11.711392","172.30.1.205","172.30.1.104","TCP","54","36642 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25410","11.713333","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25411","11.713737","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25412","11.713744","172.30.1.205","172.30.1.104","TCP","54","36642 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25413","11.715100","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25414","11.717431","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25415","11.717442","172.30.1.205","172.30.1.104","TCP","54","36642 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25416","11.718414","172.30.1.205","172.30.1.104","TCP","74","44008 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914944 TSecr=0 WS=128" "25417","11.718792","172.30.1.104","172.30.1.205","TCP","66","135 > 44008 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25418","11.718802","172.30.1.205","172.30.1.104","TCP","54","44008 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25419","11.719152","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25420","11.719501","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25421","11.719514","172.30.1.205","172.30.1.104","TCP","54","44008 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25422","11.721731","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25423","11.722155","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25424","11.722162","172.30.1.205","172.30.1.104","TCP","54","44008 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25425","11.723031","172.30.1.205","172.30.1.104","TCP","54","36602 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25426","11.723081","172.30.1.205","172.30.1.104","TCP","54","36606 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25427","11.723120","172.30.1.205","172.30.1.104","TCP","54","36610 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25428","11.723149","172.30.1.205","172.30.1.104","TCP","54","36614 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25429","11.723183","172.30.1.205","172.30.1.104","TCP","54","36618 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25430","11.723210","172.30.1.205","172.30.1.104","TCP","54","36622 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25431","11.723238","172.30.1.205","172.30.1.104","TCP","54","36626 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25432","11.723270","172.30.1.205","172.30.1.104","TCP","54","36630 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25433","11.723297","172.30.1.205","172.30.1.104","TCP","54","36634 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25434","11.723318","172.30.1.205","172.30.1.104","TCP","54","36638 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25435","11.723345","172.30.1.205","172.30.1.104","TCP","54","36642 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25436","11.723418","172.30.1.205","172.30.1.104","TCP","54","36598 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25437","11.723646","172.30.1.104","172.30.1.205","TCP","54","49671 > 36602 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25438","11.723666","172.30.1.104","172.30.1.205","TCP","54","49671 > 36606 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25439","11.723694","172.30.1.104","172.30.1.205","TCP","54","49671 > 36610 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25440","11.723735","172.30.1.104","172.30.1.205","TCP","54","49671 > 36614 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25441","11.723760","172.30.1.104","172.30.1.205","TCP","54","49671 > 36618 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25442","11.723796","172.30.1.104","172.30.1.205","TCP","54","49671 > 36622 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25443","11.723825","172.30.1.104","172.30.1.205","TCP","54","49671 > 36626 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25444","11.723850","172.30.1.104","172.30.1.205","TCP","54","49671 > 36630 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25445","11.723874","172.30.1.104","172.30.1.205","TCP","54","49671 > 36634 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25446","11.723900","172.30.1.104","172.30.1.205","TCP","54","49671 > 36638 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25447","11.723925","172.30.1.104","172.30.1.205","TCP","54","49671 > 36642 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25448","11.723958","172.30.1.104","172.30.1.205","TCP","54","49671 > 36598 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25449","11.724150","172.30.1.104","172.30.1.205","TCP","54","49671 > 36598 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25450","11.724157","172.30.1.205","172.30.1.104","TCP","54","36598 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25451","11.724205","172.30.1.104","172.30.1.205","TCP","54","49671 > 36642 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25452","11.724209","172.30.1.205","172.30.1.104","TCP","54","36642 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25453","11.724291","172.30.1.104","172.30.1.205","TCP","54","49671 > 36638 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25454","11.724294","172.30.1.205","172.30.1.104","TCP","54","36638 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25455","11.724351","172.30.1.104","172.30.1.205","TCP","54","49671 > 36634 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25456","11.724354","172.30.1.205","172.30.1.104","TCP","54","36634 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25457","11.724379","172.30.1.104","172.30.1.205","TCP","54","49671 > 36630 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25458","11.724381","172.30.1.205","172.30.1.104","TCP","54","36630 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25459","11.724415","172.30.1.104","172.30.1.205","TCP","54","49671 > 36626 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25460","11.724418","172.30.1.205","172.30.1.104","TCP","54","36626 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25461","11.724443","172.30.1.104","172.30.1.205","TCP","54","49671 > 36622 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25462","11.724446","172.30.1.205","172.30.1.104","TCP","54","36622 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25463","11.724479","172.30.1.104","172.30.1.205","TCP","54","49671 > 36618 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25464","11.724483","172.30.1.205","172.30.1.104","TCP","54","36618 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25465","11.724517","172.30.1.104","172.30.1.205","TCP","54","49671 > 36614 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25466","11.724520","172.30.1.205","172.30.1.104","TCP","54","36614 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25467","11.724547","172.30.1.104","172.30.1.205","TCP","54","49671 > 36602 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25468","11.724550","172.30.1.205","172.30.1.104","TCP","54","36602 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25469","11.724573","172.30.1.104","172.30.1.205","TCP","54","49671 > 36606 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25470","11.724576","172.30.1.205","172.30.1.104","TCP","54","36606 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25471","11.724598","172.30.1.104","172.30.1.205","TCP","54","49671 > 36610 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25472","11.724601","172.30.1.205","172.30.1.104","TCP","54","36610 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25473","11.725080","172.30.1.205","172.30.1.104","TCP","54","44008 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25474","11.725194","172.30.1.205","172.30.1.104","TCP","74","36646 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914951 TSecr=0 WS=128" "25475","11.725368","172.30.1.104","172.30.1.205","TCP","54","135 > 44008 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25476","11.725437","172.30.1.104","172.30.1.205","TCP","54","135 > 44008 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25477","11.725442","172.30.1.205","172.30.1.104","TCP","54","44008 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25478","11.725522","172.30.1.104","172.30.1.205","TCP","66","49671 > 36646 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25479","11.725530","172.30.1.205","172.30.1.104","TCP","54","36646 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25480","11.725883","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25481","11.726217","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25482","11.726226","172.30.1.205","172.30.1.104","TCP","54","36646 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25483","11.728110","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25484","11.728515","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25485","11.728521","172.30.1.205","172.30.1.104","TCP","54","36646 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25486","11.729913","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25487","11.732618","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25488","11.732627","172.30.1.205","172.30.1.104","TCP","54","36646 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25489","11.733600","172.30.1.205","172.30.1.104","TCP","74","44012 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914960 TSecr=0 WS=128" "25490","11.733895","172.30.1.104","172.30.1.205","TCP","66","135 > 44012 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25491","11.733906","172.30.1.205","172.30.1.104","TCP","54","44012 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25492","11.734259","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25493","11.734566","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25494","11.734575","172.30.1.205","172.30.1.104","TCP","54","44012 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25495","11.736798","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25496","11.737189","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25497","11.737195","172.30.1.205","172.30.1.104","TCP","54","44012 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25498","11.739013","172.30.1.205","172.30.1.104","TCP","54","44012 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25499","11.739124","172.30.1.205","172.30.1.104","TCP","74","36650 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914965 TSecr=0 WS=128" "25500","11.739311","172.30.1.104","172.30.1.205","TCP","54","135 > 44012 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25501","11.739335","172.30.1.104","172.30.1.205","TCP","54","135 > 44012 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25502","11.739340","172.30.1.205","172.30.1.104","TCP","54","44012 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25503","11.739428","172.30.1.104","172.30.1.205","TCP","66","49671 > 36650 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25504","11.739436","172.30.1.205","172.30.1.104","TCP","54","36650 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25505","11.739784","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25506","11.742299","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25507","11.742310","172.30.1.205","172.30.1.104","TCP","54","36650 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25508","11.744202","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25509","11.744582","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25510","11.744589","172.30.1.205","172.30.1.104","TCP","54","36650 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25511","11.745972","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25512","11.748292","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25513","11.748301","172.30.1.205","172.30.1.104","TCP","54","36650 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25514","11.749263","172.30.1.205","172.30.1.104","TCP","74","44016 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914975 TSecr=0 WS=128" "25515","11.749588","172.30.1.104","172.30.1.205","TCP","66","135 > 44016 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25516","11.749599","172.30.1.205","172.30.1.104","TCP","54","44016 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25517","11.749954","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25518","11.750258","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25519","11.750267","172.30.1.205","172.30.1.104","TCP","54","44016 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25520","11.752459","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25521","11.752862","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25522","11.752869","172.30.1.205","172.30.1.104","TCP","54","44016 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25523","11.754685","172.30.1.205","172.30.1.104","TCP","54","44016 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25524","11.754797","172.30.1.205","172.30.1.104","TCP","74","36654 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914981 TSecr=0 WS=128" "25525","11.755000","172.30.1.104","172.30.1.205","TCP","54","135 > 44016 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25526","11.755036","172.30.1.104","172.30.1.205","TCP","54","135 > 44016 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25527","11.755041","172.30.1.205","172.30.1.104","TCP","54","44016 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25528","11.755138","172.30.1.104","172.30.1.205","TCP","66","49671 > 36654 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25529","11.755147","172.30.1.205","172.30.1.104","TCP","54","36654 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25530","11.755492","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25531","11.755805","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25532","11.755814","172.30.1.205","172.30.1.104","TCP","54","36654 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25533","11.757717","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25534","11.758136","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25535","11.758142","172.30.1.205","172.30.1.104","TCP","54","36654 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25536","11.759490","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25537","11.761702","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25538","11.761712","172.30.1.205","172.30.1.104","TCP","54","36654 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25539","11.762671","172.30.1.205","172.30.1.104","TCP","74","44020 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914989 TSecr=0 WS=128" "25540","11.762992","172.30.1.104","172.30.1.205","TCP","66","135 > 44020 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25541","11.763003","172.30.1.205","172.30.1.104","TCP","54","44020 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25542","11.763354","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25543","11.763648","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25544","11.763657","172.30.1.205","172.30.1.104","TCP","54","44020 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25545","11.765885","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25546","11.766302","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25547","11.766308","172.30.1.205","172.30.1.104","TCP","54","44020 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25548","11.768135","172.30.1.205","172.30.1.104","TCP","54","44020 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25549","11.768247","172.30.1.205","172.30.1.104","TCP","74","36658 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499914994 TSecr=0 WS=128" "25550","11.768446","172.30.1.104","172.30.1.205","TCP","54","135 > 44020 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25551","11.768476","172.30.1.104","172.30.1.205","TCP","54","135 > 44020 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25552","11.768482","172.30.1.205","172.30.1.104","TCP","54","44020 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25553","11.768570","172.30.1.104","172.30.1.205","TCP","66","49671 > 36658 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25554","11.768579","172.30.1.205","172.30.1.104","TCP","54","36658 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25555","11.768957","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25556","11.769284","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25557","11.769291","172.30.1.205","172.30.1.104","TCP","54","36658 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25558","11.771160","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25559","11.771561","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25560","11.771567","172.30.1.205","172.30.1.104","TCP","54","36658 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25561","11.772953","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25562","11.775329","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25563","11.775338","172.30.1.205","172.30.1.104","TCP","54","36658 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25564","11.776285","172.30.1.205","172.30.1.104","TCP","74","44024 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915002 TSecr=0 WS=128" "25565","11.776641","172.30.1.104","172.30.1.205","TCP","66","135 > 44024 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25566","11.776652","172.30.1.205","172.30.1.104","TCP","54","44024 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25567","11.777040","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25568","11.777413","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25569","11.777422","172.30.1.205","172.30.1.104","TCP","54","44024 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25570","11.779598","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25571","11.780032","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25572","11.780039","172.30.1.205","172.30.1.104","TCP","54","44024 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25573","11.781870","172.30.1.205","172.30.1.104","TCP","54","44024 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25574","11.781986","172.30.1.205","172.30.1.104","TCP","74","36662 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915008 TSecr=0 WS=128" "25575","11.782154","172.30.1.104","172.30.1.205","TCP","54","135 > 44024 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25576","11.782189","172.30.1.104","172.30.1.205","TCP","54","135 > 44024 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25577","11.782195","172.30.1.205","172.30.1.104","TCP","54","44024 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25578","11.782294","172.30.1.104","172.30.1.205","TCP","66","49671 > 36662 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25579","11.782303","172.30.1.205","172.30.1.104","TCP","54","36662 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25580","11.782686","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25581","11.782996","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25582","11.783006","172.30.1.205","172.30.1.104","TCP","54","36662 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25583","11.784909","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25584","11.785347","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25585","11.785354","172.30.1.205","172.30.1.104","TCP","54","36662 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25586","11.786704","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25587","11.789059","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25588","11.789068","172.30.1.205","172.30.1.104","TCP","54","36662 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25589","11.790008","172.30.1.205","172.30.1.104","TCP","74","44028 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915016 TSecr=0 WS=128" "25590","11.790311","172.30.1.104","172.30.1.205","TCP","66","135 > 44028 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25591","11.790321","172.30.1.205","172.30.1.104","TCP","54","44028 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25592","11.790681","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25593","11.791166","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25594","11.791175","172.30.1.205","172.30.1.104","TCP","54","44028 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25595","11.793397","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25596","11.793872","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25597","11.793879","172.30.1.205","172.30.1.104","TCP","54","44028 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25598","11.795705","172.30.1.205","172.30.1.104","TCP","54","44028 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25599","11.795837","172.30.1.205","172.30.1.104","TCP","74","36666 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915022 TSecr=0 WS=128" "25600","11.796002","172.30.1.104","172.30.1.205","TCP","54","135 > 44028 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25601","11.796033","172.30.1.104","172.30.1.205","TCP","54","135 > 44028 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25602","11.796039","172.30.1.205","172.30.1.104","TCP","54","44028 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25603","11.796123","172.30.1.104","172.30.1.205","TCP","66","49671 > 36666 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25604","11.796132","172.30.1.205","172.30.1.104","TCP","54","36666 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25605","11.796480","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25606","11.796792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25607","11.796802","172.30.1.205","172.30.1.104","TCP","54","36666 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25608","11.798703","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25609","11.799130","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25610","11.799136","172.30.1.205","172.30.1.104","TCP","54","36666 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25611","11.800494","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25612","11.802837","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25613","11.802849","172.30.1.205","172.30.1.104","TCP","54","36666 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25614","11.803828","172.30.1.205","172.30.1.104","TCP","74","44032 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915030 TSecr=0 WS=128" "25615","11.804156","172.30.1.104","172.30.1.205","TCP","66","135 > 44032 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25616","11.804167","172.30.1.205","172.30.1.104","TCP","54","44032 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25617","11.804515","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25618","11.804857","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25619","11.804866","172.30.1.205","172.30.1.104","TCP","54","44032 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25620","11.807081","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25621","11.807562","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25622","11.807569","172.30.1.205","172.30.1.104","TCP","54","44032 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25623","11.809411","172.30.1.205","172.30.1.104","TCP","54","44032 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25624","11.809523","172.30.1.205","172.30.1.104","TCP","74","36670 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915035 TSecr=0 WS=128" "25625","11.809713","172.30.1.104","172.30.1.205","TCP","54","135 > 44032 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25626","11.809760","172.30.1.104","172.30.1.205","TCP","54","135 > 44032 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25627","11.809766","172.30.1.205","172.30.1.104","TCP","54","44032 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25628","11.809853","172.30.1.104","172.30.1.205","TCP","66","49671 > 36670 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25629","11.809861","172.30.1.205","172.30.1.104","TCP","54","36670 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25630","11.810208","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25631","11.810577","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25632","11.810586","172.30.1.205","172.30.1.104","TCP","54","36670 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25633","11.812474","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25634","11.812865","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25635","11.812874","172.30.1.205","172.30.1.104","TCP","54","36670 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25636","11.814325","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25637","11.816617","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25638","11.816629","172.30.1.205","172.30.1.104","TCP","54","36670 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25639","11.817635","172.30.1.205","172.30.1.104","TCP","74","44036 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915044 TSecr=0 WS=128" "25640","11.817968","172.30.1.104","172.30.1.205","TCP","66","135 > 44036 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25641","11.817980","172.30.1.205","172.30.1.104","TCP","54","44036 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25642","11.818330","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25643","11.818654","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25644","11.818663","172.30.1.205","172.30.1.104","TCP","54","44036 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25645","11.820875","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25646","11.821293","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25647","11.821300","172.30.1.205","172.30.1.104","TCP","54","44036 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25648","11.823099","172.30.1.205","172.30.1.104","TCP","54","44036 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25649","11.823209","172.30.1.205","172.30.1.104","TCP","74","36674 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915049 TSecr=0 WS=128" "25650","11.823389","172.30.1.104","172.30.1.205","TCP","54","135 > 44036 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25651","11.823422","172.30.1.104","172.30.1.205","TCP","54","135 > 44036 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25652","11.823428","172.30.1.205","172.30.1.104","TCP","54","44036 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25653","11.823487","172.30.1.104","172.30.1.205","TCP","66","49671 > 36674 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25654","11.823495","172.30.1.205","172.30.1.104","TCP","54","36674 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25655","11.823844","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25656","11.824162","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25657","11.824171","172.30.1.205","172.30.1.104","TCP","54","36674 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25658","11.826080","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25659","11.826481","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25660","11.826487","172.30.1.205","172.30.1.104","TCP","54","36674 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25661","11.827840","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25662","11.830941","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25663","11.830951","172.30.1.205","172.30.1.104","TCP","54","36674 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25664","11.831889","172.30.1.205","172.30.1.104","TCP","74","44040 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915058 TSecr=0 WS=128" "25665","11.832194","172.30.1.104","172.30.1.205","TCP","66","135 > 44040 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25666","11.832204","172.30.1.205","172.30.1.104","TCP","54","44040 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25667","11.832552","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25668","11.832860","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25669","11.832870","172.30.1.205","172.30.1.104","TCP","54","44040 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25670","11.835054","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25671","11.835489","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25672","11.835496","172.30.1.205","172.30.1.104","TCP","54","44040 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25673","11.837333","172.30.1.205","172.30.1.104","TCP","54","44040 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25674","11.837442","172.30.1.205","172.30.1.104","TCP","74","36678 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915063 TSecr=0 WS=128" "25675","11.837700","172.30.1.104","172.30.1.205","TCP","54","135 > 44040 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25676","11.837709","172.30.1.104","172.30.1.205","TCP","54","135 > 44040 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25677","11.837714","172.30.1.205","172.30.1.104","TCP","54","44040 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25678","11.837723","172.30.1.104","172.30.1.205","TCP","66","49671 > 36678 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25679","11.837734","172.30.1.205","172.30.1.104","TCP","54","36678 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25680","11.838078","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25681","11.838417","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25682","11.838433","172.30.1.205","172.30.1.104","TCP","54","36678 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25683","11.840299","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25684","11.840709","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25685","11.840715","172.30.1.205","172.30.1.104","TCP","54","36678 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25686","11.842074","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25687","11.844351","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25688","11.844360","172.30.1.205","172.30.1.104","TCP","54","36678 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25689","11.845312","172.30.1.205","172.30.1.104","TCP","74","44044 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915071 TSecr=0 WS=128" "25690","11.845649","172.30.1.104","172.30.1.205","TCP","66","135 > 44044 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25691","11.845659","172.30.1.205","172.30.1.104","TCP","54","44044 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25692","11.846004","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25693","11.846318","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25694","11.846327","172.30.1.205","172.30.1.104","TCP","54","44044 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25695","11.848505","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25696","11.848960","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25697","11.848967","172.30.1.205","172.30.1.104","TCP","54","44044 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25698","11.850787","172.30.1.205","172.30.1.104","TCP","54","44044 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25699","11.850896","172.30.1.205","172.30.1.104","TCP","74","36682 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915077 TSecr=0 WS=128" "25700","11.851081","172.30.1.104","172.30.1.205","TCP","54","135 > 44044 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25701","11.851112","172.30.1.104","172.30.1.205","TCP","54","135 > 44044 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25702","11.851118","172.30.1.205","172.30.1.104","TCP","54","44044 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25703","11.851194","172.30.1.104","172.30.1.205","TCP","66","49671 > 36682 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25704","11.851202","172.30.1.205","172.30.1.104","TCP","54","36682 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25705","11.851545","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25706","11.851866","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25707","11.851874","172.30.1.205","172.30.1.104","TCP","54","36682 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25708","11.853773","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25709","11.854213","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25710","11.854220","172.30.1.205","172.30.1.104","TCP","54","36682 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25711","11.855552","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25712","11.857872","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25713","11.857881","172.30.1.205","172.30.1.104","TCP","54","36682 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25714","11.858834","172.30.1.205","172.30.1.104","TCP","74","44048 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915085 TSecr=0 WS=128" "25715","11.859228","172.30.1.104","172.30.1.205","TCP","66","135 > 44048 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25716","11.859238","172.30.1.205","172.30.1.104","TCP","54","44048 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25717","11.859585","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25718","11.859898","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25719","11.859907","172.30.1.205","172.30.1.104","TCP","54","44048 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25720","11.862116","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25721","11.862546","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25722","11.862553","172.30.1.205","172.30.1.104","TCP","54","44048 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25723","11.864352","172.30.1.205","172.30.1.104","TCP","54","44048 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25724","11.864463","172.30.1.205","172.30.1.104","TCP","74","36686 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915090 TSecr=0 WS=128" "25725","11.864673","172.30.1.104","172.30.1.205","TCP","54","135 > 44048 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25726","11.864681","172.30.1.104","172.30.1.205","TCP","54","135 > 44048 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25727","11.864686","172.30.1.205","172.30.1.104","TCP","54","44048 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25728","11.864769","172.30.1.104","172.30.1.205","TCP","66","49671 > 36686 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25729","11.864787","172.30.1.205","172.30.1.104","TCP","54","36686 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25730","11.865143","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25731","11.865450","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25732","11.865459","172.30.1.205","172.30.1.104","TCP","54","36686 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25733","11.867334","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25734","11.867721","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25735","11.867727","172.30.1.205","172.30.1.104","TCP","54","36686 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25736","11.869119","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25737","11.871455","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25738","11.871466","172.30.1.205","172.30.1.104","TCP","54","36686 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25739","11.872404","172.30.1.205","172.30.1.104","TCP","74","44052 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915098 TSecr=0 WS=128" "25740","11.872707","172.30.1.104","172.30.1.205","TCP","66","135 > 44052 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25741","11.872718","172.30.1.205","172.30.1.104","TCP","54","44052 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25742","11.873108","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25743","11.873408","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25744","11.873417","172.30.1.205","172.30.1.104","TCP","54","44052 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25745","11.875600","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25746","11.876069","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25747","11.876076","172.30.1.205","172.30.1.104","TCP","54","44052 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25748","11.877897","172.30.1.205","172.30.1.104","TCP","54","44052 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25749","11.878005","172.30.1.205","172.30.1.104","TCP","74","36690 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915104 TSecr=0 WS=128" "25750","11.878186","172.30.1.104","172.30.1.205","TCP","54","135 > 44052 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25751","11.878219","172.30.1.104","172.30.1.205","TCP","54","135 > 44052 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25752","11.878224","172.30.1.205","172.30.1.104","TCP","54","44052 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25753","11.878312","172.30.1.104","172.30.1.205","TCP","66","49671 > 36690 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25754","11.878320","172.30.1.205","172.30.1.104","TCP","54","36690 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25755","11.878667","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25756","11.878963","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25757","11.878971","172.30.1.205","172.30.1.104","TCP","54","36690 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25758","11.880862","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25759","11.881241","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25760","11.881247","172.30.1.205","172.30.1.104","TCP","54","36690 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25761","11.882614","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25762","11.884928","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25763","11.884956","172.30.1.205","172.30.1.104","TCP","54","36690 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25764","11.885888","172.30.1.205","172.30.1.104","TCP","74","44056 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915112 TSecr=0 WS=128" "25765","11.886232","172.30.1.104","172.30.1.205","TCP","66","135 > 44056 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25766","11.886243","172.30.1.205","172.30.1.104","TCP","54","44056 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25767","11.886616","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25768","11.886913","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25769","11.886921","172.30.1.205","172.30.1.104","TCP","54","44056 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25770","11.889110","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25771","11.889541","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25772","11.889550","172.30.1.205","172.30.1.104","TCP","54","44056 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25773","11.890470","172.30.1.205","172.30.1.104","TCP","54","36650 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25774","11.890518","172.30.1.205","172.30.1.104","TCP","54","36654 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25775","11.890555","172.30.1.205","172.30.1.104","TCP","54","36658 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25776","11.890589","172.30.1.205","172.30.1.104","TCP","54","36662 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25777","11.890616","172.30.1.205","172.30.1.104","TCP","54","36666 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25778","11.890644","172.30.1.205","172.30.1.104","TCP","54","36670 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25779","11.890680","172.30.1.205","172.30.1.104","TCP","54","36674 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25780","11.890709","172.30.1.205","172.30.1.104","TCP","54","36678 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25781","11.890740","172.30.1.205","172.30.1.104","TCP","54","36682 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25782","11.890767","172.30.1.205","172.30.1.104","TCP","54","36686 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25783","11.890794","172.30.1.205","172.30.1.104","TCP","54","36690 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25784","11.890866","172.30.1.205","172.30.1.104","TCP","54","36646 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "25785","11.891127","172.30.1.104","172.30.1.205","TCP","54","49671 > 36650 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25786","11.891142","172.30.1.104","172.30.1.205","TCP","54","49671 > 36654 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25787","11.891177","172.30.1.104","172.30.1.205","TCP","54","49671 > 36650 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25788","11.891185","172.30.1.205","172.30.1.104","TCP","54","36650 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25789","11.891201","172.30.1.104","172.30.1.205","TCP","54","49671 > 36658 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25790","11.891256","172.30.1.104","172.30.1.205","TCP","54","49671 > 36662 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25791","11.891275","172.30.1.104","172.30.1.205","TCP","54","49671 > 36654 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25792","11.891280","172.30.1.205","172.30.1.104","TCP","54","36654 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25793","11.891295","172.30.1.104","172.30.1.205","TCP","54","49671 > 36666 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25794","11.891319","172.30.1.104","172.30.1.205","TCP","54","49671 > 36670 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25795","11.891339","172.30.1.104","172.30.1.205","TCP","54","49671 > 36666 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25796","11.891343","172.30.1.205","172.30.1.104","TCP","54","36666 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25797","11.891360","172.30.1.104","172.30.1.205","TCP","54","49671 > 36670 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25798","11.891362","172.30.1.205","172.30.1.104","TCP","54","36670 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25799","11.891427","172.30.1.104","172.30.1.205","TCP","54","49671 > 36658 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25800","11.891430","172.30.1.205","172.30.1.104","TCP","54","36658 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25801","11.891447","172.30.1.104","172.30.1.205","TCP","54","49671 > 36674 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25802","11.891468","172.30.1.104","172.30.1.205","TCP","54","49671 > 36662 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25803","11.891472","172.30.1.205","172.30.1.104","TCP","54","36662 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25804","11.891501","172.30.1.104","172.30.1.205","TCP","54","49671 > 36678 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25805","11.891522","172.30.1.104","172.30.1.205","TCP","54","49671 > 36674 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25806","11.891527","172.30.1.205","172.30.1.104","TCP","54","36674 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25807","11.891543","172.30.1.104","172.30.1.205","TCP","54","49671 > 36682 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25808","11.891566","172.30.1.104","172.30.1.205","TCP","54","49671 > 36678 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25809","11.891569","172.30.1.205","172.30.1.104","TCP","54","36678 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25810","11.891588","172.30.1.104","172.30.1.205","TCP","54","49671 > 36686 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25811","11.891716","172.30.1.104","172.30.1.205","TCP","54","49671 > 36682 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25812","11.891720","172.30.1.205","172.30.1.104","TCP","54","36682 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25813","11.891736","172.30.1.104","172.30.1.205","TCP","54","49671 > 36690 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25814","11.891760","172.30.1.104","172.30.1.205","TCP","54","49671 > 36686 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25815","11.891763","172.30.1.205","172.30.1.104","TCP","54","36686 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25816","11.892033","172.30.1.104","172.30.1.205","TCP","54","49671 > 36646 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25817","11.892118","172.30.1.104","172.30.1.205","TCP","54","49671 > 36690 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25818","11.892125","172.30.1.205","172.30.1.104","TCP","54","36690 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25819","11.892156","172.30.1.104","172.30.1.205","TCP","54","49671 > 36646 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "25820","11.892159","172.30.1.205","172.30.1.104","TCP","54","36646 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "25821","11.892482","172.30.1.205","172.30.1.104","TCP","54","44056 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25822","11.892598","172.30.1.205","172.30.1.104","TCP","74","36694 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915119 TSecr=0 WS=128" "25823","11.892747","172.30.1.104","172.30.1.205","TCP","54","135 > 44056 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25824","11.892792","172.30.1.104","172.30.1.205","TCP","54","135 > 44056 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25825","11.892798","172.30.1.205","172.30.1.104","TCP","54","44056 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25826","11.892890","172.30.1.104","172.30.1.205","TCP","66","49671 > 36694 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25827","11.892898","172.30.1.205","172.30.1.104","TCP","54","36694 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25828","11.893266","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25829","11.893567","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25830","11.893574","172.30.1.205","172.30.1.104","TCP","54","36694 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25831","11.895448","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25832","11.895831","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25833","11.895837","172.30.1.205","172.30.1.104","TCP","54","36694 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25834","11.897220","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25835","11.899553","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25836","11.899562","172.30.1.205","172.30.1.104","TCP","54","36694 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25837","11.900491","172.30.1.205","172.30.1.104","TCP","74","44060 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915126 TSecr=0 WS=128" "25838","11.900813","172.30.1.104","172.30.1.205","TCP","66","135 > 44060 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25839","11.900836","172.30.1.205","172.30.1.104","TCP","54","44060 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25840","11.901377","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25841","11.901716","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25842","11.901725","172.30.1.205","172.30.1.104","TCP","54","44060 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25843","11.903893","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25844","11.904281","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25845","11.904288","172.30.1.205","172.30.1.104","TCP","54","44060 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25846","11.906125","172.30.1.205","172.30.1.104","TCP","54","44060 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25847","11.906233","172.30.1.205","172.30.1.104","TCP","74","36698 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915132 TSecr=0 WS=128" "25848","11.906396","172.30.1.104","172.30.1.205","TCP","54","135 > 44060 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25849","11.906427","172.30.1.104","172.30.1.205","TCP","54","135 > 44060 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25850","11.906432","172.30.1.205","172.30.1.104","TCP","54","44060 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25851","11.906537","172.30.1.104","172.30.1.205","TCP","66","49671 > 36698 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25852","11.906545","172.30.1.205","172.30.1.104","TCP","54","36698 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25853","11.906886","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25854","11.907186","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25855","11.907195","172.30.1.205","172.30.1.104","TCP","54","36698 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25856","11.909074","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25857","11.909456","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25858","11.909460","172.30.1.205","172.30.1.104","TCP","54","36698 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25859","11.910797","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25860","11.913067","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25861","11.913080","172.30.1.205","172.30.1.104","TCP","54","36698 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25862","11.914121","172.30.1.205","172.30.1.104","TCP","74","44064 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915140 TSecr=0 WS=128" "25863","11.914434","172.30.1.104","172.30.1.205","TCP","66","135 > 44064 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25864","11.914446","172.30.1.205","172.30.1.104","TCP","54","44064 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25865","11.914799","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25866","11.915156","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25867","11.915170","172.30.1.205","172.30.1.104","TCP","54","44064 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25868","11.917523","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25869","11.917906","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25870","11.917913","172.30.1.205","172.30.1.104","TCP","54","44064 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25871","11.919753","172.30.1.205","172.30.1.104","TCP","54","44064 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25872","11.919887","172.30.1.205","172.30.1.104","TCP","74","36702 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915146 TSecr=0 WS=128" "25873","11.920026","172.30.1.104","172.30.1.205","TCP","54","135 > 44064 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25874","11.920093","172.30.1.104","172.30.1.205","TCP","54","135 > 44064 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25875","11.920100","172.30.1.205","172.30.1.104","TCP","54","44064 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25876","11.920173","172.30.1.104","172.30.1.205","TCP","66","49671 > 36702 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25877","11.920182","172.30.1.205","172.30.1.104","TCP","54","36702 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25878","11.920530","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25879","11.920832","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25880","11.920841","172.30.1.205","172.30.1.104","TCP","54","36702 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25881","11.922762","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25882","11.923166","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25883","11.923173","172.30.1.205","172.30.1.104","TCP","54","36702 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25884","11.924567","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25885","11.927860","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25886","11.927874","172.30.1.205","172.30.1.104","TCP","54","36702 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25887","11.928917","172.30.1.205","172.30.1.104","TCP","74","44068 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915155 TSecr=0 WS=128" "25888","11.929252","172.30.1.104","172.30.1.205","TCP","66","135 > 44068 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25889","11.929265","172.30.1.205","172.30.1.104","TCP","54","44068 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25890","11.929634","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25891","11.929955","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25892","11.929965","172.30.1.205","172.30.1.104","TCP","54","44068 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25893","11.932186","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25894","11.932596","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25895","11.932604","172.30.1.205","172.30.1.104","TCP","54","44068 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25896","11.934461","172.30.1.205","172.30.1.104","TCP","54","44068 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25897","11.934574","172.30.1.205","172.30.1.104","TCP","74","36706 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915160 TSecr=0 WS=128" "25898","11.934747","172.30.1.104","172.30.1.205","TCP","54","135 > 44068 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25899","11.934783","172.30.1.104","172.30.1.205","TCP","54","135 > 44068 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25900","11.934789","172.30.1.205","172.30.1.104","TCP","54","44068 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25901","11.934907","172.30.1.104","172.30.1.205","TCP","66","49671 > 36706 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25902","11.934915","172.30.1.205","172.30.1.104","TCP","54","36706 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25903","11.935263","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25904","11.935596","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25905","11.935605","172.30.1.205","172.30.1.104","TCP","54","36706 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25906","11.937538","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25907","11.937968","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25908","11.937975","172.30.1.205","172.30.1.104","TCP","54","36706 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25909","11.939334","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25910","11.941771","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25911","11.941789","172.30.1.205","172.30.1.104","TCP","54","36706 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25912","11.942787","172.30.1.205","172.30.1.104","TCP","74","44072 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915169 TSecr=0 WS=128" "25913","11.943101","172.30.1.104","172.30.1.205","TCP","66","135 > 44072 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25914","11.943112","172.30.1.205","172.30.1.104","TCP","54","44072 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25915","11.943464","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25916","11.943770","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25917","11.943779","172.30.1.205","172.30.1.104","TCP","54","44072 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25918","11.945999","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25919","11.946444","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25920","11.946451","172.30.1.205","172.30.1.104","TCP","54","44072 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25921","11.948258","172.30.1.205","172.30.1.104","TCP","54","44072 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25922","11.948368","172.30.1.205","172.30.1.104","TCP","74","36710 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915174 TSecr=0 WS=128" "25923","11.948533","172.30.1.104","172.30.1.205","TCP","54","135 > 44072 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25924","11.948566","172.30.1.104","172.30.1.205","TCP","54","135 > 44072 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25925","11.948571","172.30.1.205","172.30.1.104","TCP","54","44072 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25926","11.948667","172.30.1.104","172.30.1.205","TCP","66","49671 > 36710 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25927","11.948675","172.30.1.205","172.30.1.104","TCP","54","36710 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25928","11.949056","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25929","11.949378","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25930","11.949385","172.30.1.205","172.30.1.104","TCP","54","36710 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25931","11.951260","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25932","11.951642","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25933","11.951648","172.30.1.205","172.30.1.104","TCP","54","36710 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25934","11.953037","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25935","11.955453","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25936","11.955464","172.30.1.205","172.30.1.104","TCP","54","36710 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25937","11.956430","172.30.1.205","172.30.1.104","TCP","74","44076 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915182 TSecr=0 WS=128" "25938","11.956768","172.30.1.104","172.30.1.205","TCP","66","135 > 44076 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25939","11.956788","172.30.1.205","172.30.1.104","TCP","54","44076 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25940","11.957152","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25941","11.957472","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25942","11.957482","172.30.1.205","172.30.1.104","TCP","54","44076 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25943","11.959676","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25944","11.960096","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25945","11.960108","172.30.1.205","172.30.1.104","TCP","54","44076 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25946","11.961950","172.30.1.205","172.30.1.104","TCP","54","44076 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25947","11.962062","172.30.1.205","172.30.1.104","TCP","74","36714 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915188 TSecr=0 WS=128" "25948","11.962245","172.30.1.104","172.30.1.205","TCP","54","135 > 44076 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25949","11.962273","172.30.1.104","172.30.1.205","TCP","54","135 > 44076 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25950","11.962279","172.30.1.205","172.30.1.104","TCP","54","44076 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25951","11.962318","172.30.1.104","172.30.1.205","TCP","66","49671 > 36714 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25952","11.962326","172.30.1.205","172.30.1.104","TCP","54","36714 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25953","11.962674","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25954","11.962965","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25955","11.962974","172.30.1.205","172.30.1.104","TCP","54","36714 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25956","11.964890","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25957","11.965308","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25958","11.965314","172.30.1.205","172.30.1.104","TCP","54","36714 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25959","11.966674","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25960","11.969020","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25961","11.969030","172.30.1.205","172.30.1.104","TCP","54","36714 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25962","11.969979","172.30.1.205","172.30.1.104","TCP","74","44080 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915196 TSecr=0 WS=128" "25963","11.970270","172.30.1.104","172.30.1.205","TCP","66","135 > 44080 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25964","11.970281","172.30.1.205","172.30.1.104","TCP","54","44080 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25965","11.970633","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25966","11.970928","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25967","11.970936","172.30.1.205","172.30.1.104","TCP","54","44080 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25968","11.973180","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25969","11.973579","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25970","11.973586","172.30.1.205","172.30.1.104","TCP","54","44080 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25971","11.975397","172.30.1.205","172.30.1.104","TCP","54","44080 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25972","11.975508","172.30.1.205","172.30.1.104","TCP","74","36718 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915201 TSecr=0 WS=128" "25973","11.975683","172.30.1.104","172.30.1.205","TCP","54","135 > 44080 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25974","11.975730","172.30.1.104","172.30.1.205","TCP","54","135 > 44080 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25975","11.975736","172.30.1.205","172.30.1.104","TCP","54","44080 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "25976","11.975815","172.30.1.104","172.30.1.205","TCP","66","49671 > 36718 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25977","11.975823","172.30.1.205","172.30.1.104","TCP","54","36718 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25978","11.976167","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "25979","11.976497","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25980","11.976506","172.30.1.205","172.30.1.104","TCP","54","36718 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25981","11.978416","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "25982","11.978794","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "25983","11.978800","172.30.1.205","172.30.1.104","TCP","54","36718 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "25984","11.980155","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "25985","11.982551","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "25986","11.982560","172.30.1.205","172.30.1.104","TCP","54","36718 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "25987","11.983498","172.30.1.205","172.30.1.104","TCP","74","44084 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915209 TSecr=0 WS=128" "25988","11.983813","172.30.1.104","172.30.1.205","TCP","66","135 > 44084 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "25989","11.983824","172.30.1.205","172.30.1.104","TCP","54","44084 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "25990","11.984177","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "25991","11.984478","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "25992","11.984487","172.30.1.205","172.30.1.104","TCP","54","44084 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "25993","11.986800","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "25994","11.987236","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "25995","11.987242","172.30.1.205","172.30.1.104","TCP","54","44084 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "25996","11.989070","172.30.1.205","172.30.1.104","TCP","54","44084 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "25997","11.989183","172.30.1.205","172.30.1.104","TCP","74","36722 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915215 TSecr=0 WS=128" "25998","11.989361","172.30.1.104","172.30.1.205","TCP","54","135 > 44084 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "25999","11.989384","172.30.1.104","172.30.1.205","TCP","54","135 > 44084 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26000","11.989389","172.30.1.205","172.30.1.104","TCP","54","44084 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26001","11.989490","172.30.1.104","172.30.1.205","TCP","66","49671 > 36722 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26002","11.989509","172.30.1.205","172.30.1.104","TCP","54","36722 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26003","11.989862","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26004","11.990185","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26005","11.990202","172.30.1.205","172.30.1.104","TCP","54","36722 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26006","11.992248","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26007","11.992757","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26008","11.992764","172.30.1.205","172.30.1.104","TCP","54","36722 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26009","11.994151","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26010","11.996612","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26011","11.996621","172.30.1.205","172.30.1.104","TCP","54","36722 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26012","11.997623","172.30.1.205","172.30.1.104","TCP","74","44088 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915224 TSecr=0 WS=128" "26013","11.998005","172.30.1.104","172.30.1.205","TCP","66","135 > 44088 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26014","11.998026","172.30.1.205","172.30.1.104","TCP","54","44088 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26015","11.998623","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26016","11.998946","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26017","11.998954","172.30.1.205","172.30.1.104","TCP","54","44088 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26018","12.001155","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26019","12.001581","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26020","12.001588","172.30.1.205","172.30.1.104","TCP","54","44088 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26021","12.003414","172.30.1.205","172.30.1.104","TCP","54","44088 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26022","12.003525","172.30.1.205","172.30.1.104","TCP","74","36726 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915229 TSecr=0 WS=128" "26023","12.003718","172.30.1.104","172.30.1.205","TCP","54","135 > 44088 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26024","12.003775","172.30.1.104","172.30.1.205","TCP","54","135 > 44088 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26025","12.003785","172.30.1.205","172.30.1.104","TCP","54","44088 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26026","12.003857","172.30.1.104","172.30.1.205","TCP","66","49671 > 36726 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26027","12.003868","172.30.1.205","172.30.1.104","TCP","54","36726 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26028","12.004289","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26029","12.004601","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26030","12.004613","172.30.1.205","172.30.1.104","TCP","54","36726 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26031","12.006535","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26032","12.006916","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26033","12.006929","172.30.1.205","172.30.1.104","TCP","54","36726 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26034","12.008294","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26035","12.010659","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26036","12.010670","172.30.1.205","172.30.1.104","TCP","54","36726 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26037","12.011648","172.30.1.205","172.30.1.104","TCP","74","44092 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915238 TSecr=0 WS=128" "26038","12.012025","172.30.1.104","172.30.1.205","TCP","66","135 > 44092 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26039","12.012036","172.30.1.205","172.30.1.104","TCP","54","44092 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26040","12.012388","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26041","12.012712","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26042","12.012721","172.30.1.205","172.30.1.104","TCP","54","44092 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26043","12.014955","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26044","12.015418","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26045","12.015426","172.30.1.205","172.30.1.104","TCP","54","44092 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26046","12.017300","172.30.1.205","172.30.1.104","TCP","54","44092 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26047","12.017419","172.30.1.205","172.30.1.104","TCP","74","36730 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915243 TSecr=0 WS=128" "26048","12.017624","172.30.1.104","172.30.1.205","TCP","54","135 > 44092 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26049","12.017636","172.30.1.104","172.30.1.205","TCP","54","135 > 44092 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26050","12.017643","172.30.1.205","172.30.1.104","TCP","54","44092 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26051","12.017725","172.30.1.104","172.30.1.205","TCP","66","49671 > 36730 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26052","12.017733","172.30.1.205","172.30.1.104","TCP","54","36730 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26053","12.018083","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26054","12.018381","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26055","12.018390","172.30.1.205","172.30.1.104","TCP","54","36730 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26056","12.020270","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26057","12.022380","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26058","12.022388","172.30.1.205","172.30.1.104","TCP","54","36730 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26059","12.023771","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26060","12.026253","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26061","12.026266","172.30.1.205","172.30.1.104","TCP","54","36730 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26062","12.027308","172.30.1.205","172.30.1.104","TCP","74","44096 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915253 TSecr=0 WS=128" "26063","12.027647","172.30.1.104","172.30.1.205","TCP","66","135 > 44096 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26064","12.027658","172.30.1.205","172.30.1.104","TCP","54","44096 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26065","12.028021","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26066","12.028359","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26067","12.028368","172.30.1.205","172.30.1.104","TCP","54","44096 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26068","12.030604","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26069","12.031019","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26070","12.031026","172.30.1.205","172.30.1.104","TCP","54","44096 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26071","12.032856","172.30.1.205","172.30.1.104","TCP","54","44096 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26072","12.032975","172.30.1.205","172.30.1.104","TCP","74","36734 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915259 TSecr=0 WS=128" "26073","12.033273","172.30.1.104","172.30.1.205","TCP","54","135 > 44096 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26074","12.033282","172.30.1.104","172.30.1.205","TCP","54","135 > 44096 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26075","12.033295","172.30.1.205","172.30.1.104","TCP","54","44096 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26076","12.033303","172.30.1.104","172.30.1.205","TCP","66","49671 > 36734 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26077","12.033311","172.30.1.205","172.30.1.104","TCP","54","36734 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26078","12.033661","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26079","12.034009","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26080","12.034018","172.30.1.205","172.30.1.104","TCP","54","36734 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26081","12.035908","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26082","12.036303","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26083","12.036309","172.30.1.205","172.30.1.104","TCP","54","36734 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26084","12.037695","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26085","12.041960","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26086","12.041970","172.30.1.205","172.30.1.104","TCP","54","36734 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26087","12.042914","172.30.1.205","172.30.1.104","TCP","74","44100 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915269 TSecr=0 WS=128" "26088","12.043256","172.30.1.104","172.30.1.205","TCP","66","135 > 44100 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26089","12.043266","172.30.1.205","172.30.1.104","TCP","54","44100 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26090","12.043611","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26091","12.043975","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26092","12.043983","172.30.1.205","172.30.1.104","TCP","54","44100 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26093","12.046182","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26094","12.046592","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26095","12.046598","172.30.1.205","172.30.1.104","TCP","54","44100 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26096","12.048392","172.30.1.205","172.30.1.104","TCP","54","44100 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26097","12.048501","172.30.1.205","172.30.1.104","TCP","74","36738 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915274 TSecr=0 WS=128" "26098","12.048687","172.30.1.104","172.30.1.205","TCP","54","135 > 44100 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26099","12.048766","172.30.1.104","172.30.1.205","TCP","54","135 > 44100 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26100","12.048771","172.30.1.205","172.30.1.104","TCP","54","44100 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26101","12.048858","172.30.1.104","172.30.1.205","TCP","66","49671 > 36738 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26102","12.048867","172.30.1.205","172.30.1.104","TCP","54","36738 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26103","12.049215","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26104","12.049524","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26105","12.049533","172.30.1.205","172.30.1.104","TCP","54","36738 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26106","12.051391","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26107","12.051784","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26108","12.051791","172.30.1.205","172.30.1.104","TCP","54","36738 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26109","12.053173","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26110","12.055469","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26111","12.055478","172.30.1.205","172.30.1.104","TCP","54","36738 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26112","12.056405","172.30.1.205","172.30.1.104","TCP","74","44104 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915282 TSecr=0 WS=128" "26113","12.056717","172.30.1.104","172.30.1.205","TCP","66","135 > 44104 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26114","12.056738","172.30.1.205","172.30.1.104","TCP","54","44104 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26115","12.057271","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26116","12.057592","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26117","12.057604","172.30.1.205","172.30.1.104","TCP","54","44104 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26118","12.059790","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26119","12.060224","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26120","12.060231","172.30.1.205","172.30.1.104","TCP","54","44104 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26121","12.061090","172.30.1.205","172.30.1.104","TCP","54","36698 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26122","12.061137","172.30.1.205","172.30.1.104","TCP","54","36702 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26123","12.061181","172.30.1.205","172.30.1.104","TCP","54","36706 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26124","12.061212","172.30.1.205","172.30.1.104","TCP","54","36710 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26125","12.061243","172.30.1.205","172.30.1.104","TCP","54","36714 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26126","12.061269","172.30.1.205","172.30.1.104","TCP","54","36718 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26127","12.061297","172.30.1.205","172.30.1.104","TCP","54","36722 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26128","12.061323","172.30.1.205","172.30.1.104","TCP","54","36726 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26129","12.061350","172.30.1.205","172.30.1.104","TCP","54","36730 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26130","12.061376","172.30.1.205","172.30.1.104","TCP","54","36734 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26131","12.061408","172.30.1.205","172.30.1.104","TCP","54","36738 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26132","12.061477","172.30.1.205","172.30.1.104","TCP","54","36694 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26133","12.061726","172.30.1.104","172.30.1.205","TCP","54","49671 > 36698 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26134","12.061747","172.30.1.104","172.30.1.205","TCP","54","49671 > 36702 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26135","12.061771","172.30.1.104","172.30.1.205","TCP","54","49671 > 36702 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26136","12.061778","172.30.1.205","172.30.1.104","TCP","54","36702 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26137","12.061796","172.30.1.104","172.30.1.205","TCP","54","49671 > 36706 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26138","12.061822","172.30.1.104","172.30.1.205","TCP","54","49671 > 36710 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26139","12.061873","172.30.1.104","172.30.1.205","TCP","54","49671 > 36698 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26140","12.061878","172.30.1.205","172.30.1.104","TCP","54","36698 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26141","12.061896","172.30.1.104","172.30.1.205","TCP","54","49671 > 36714 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26142","12.061924","172.30.1.104","172.30.1.205","TCP","54","49671 > 36718 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26143","12.061947","172.30.1.104","172.30.1.205","TCP","54","49671 > 36714 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26144","12.061951","172.30.1.205","172.30.1.104","TCP","54","36714 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26145","12.061973","172.30.1.104","172.30.1.205","TCP","54","49671 > 36722 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26146","12.061996","172.30.1.104","172.30.1.205","TCP","54","49671 > 36710 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26147","12.061999","172.30.1.205","172.30.1.104","TCP","54","36710 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26148","12.062033","172.30.1.104","172.30.1.205","TCP","54","49671 > 36726 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26149","12.062060","172.30.1.104","172.30.1.205","TCP","54","49671 > 36726 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26150","12.062064","172.30.1.205","172.30.1.104","TCP","54","36726 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26151","12.062098","172.30.1.104","172.30.1.205","TCP","54","49671 > 36730 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26152","12.062124","172.30.1.104","172.30.1.205","TCP","54","49671 > 36722 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26153","12.062131","172.30.1.205","172.30.1.104","TCP","54","36722 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26154","12.062241","172.30.1.104","172.30.1.205","TCP","54","49671 > 36718 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26155","12.062245","172.30.1.205","172.30.1.104","TCP","54","36718 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26156","12.062267","172.30.1.104","172.30.1.205","TCP","54","49671 > 36734 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26157","12.062293","172.30.1.104","172.30.1.205","TCP","54","49671 > 36738 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26158","12.062324","172.30.1.104","172.30.1.205","TCP","54","49671 > 36734 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26159","12.062328","172.30.1.205","172.30.1.104","TCP","54","36734 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26160","12.062352","172.30.1.104","172.30.1.205","TCP","54","49671 > 36730 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26161","12.062355","172.30.1.205","172.30.1.104","TCP","54","36730 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26162","12.062505","172.30.1.104","172.30.1.205","TCP","54","49671 > 36694 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26163","12.062529","172.30.1.104","172.30.1.205","TCP","54","49671 > 36694 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26164","12.062533","172.30.1.205","172.30.1.104","TCP","54","36694 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26165","12.062555","172.30.1.104","172.30.1.205","TCP","54","49671 > 36738 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26166","12.062558","172.30.1.205","172.30.1.104","TCP","54","36738 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26167","12.062585","172.30.1.104","172.30.1.205","TCP","54","49671 > 36706 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26168","12.062589","172.30.1.205","172.30.1.104","TCP","54","36706 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26169","12.063062","172.30.1.205","172.30.1.104","TCP","54","44104 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26170","12.063171","172.30.1.205","172.30.1.104","TCP","74","36742 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915289 TSecr=0 WS=128" "26171","12.063349","172.30.1.104","172.30.1.205","TCP","54","135 > 44104 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26172","12.063373","172.30.1.104","172.30.1.205","TCP","54","135 > 44104 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26173","12.063378","172.30.1.205","172.30.1.104","TCP","54","44104 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26174","12.063461","172.30.1.104","172.30.1.205","TCP","66","49671 > 36742 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26175","12.063470","172.30.1.205","172.30.1.104","TCP","54","36742 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26176","12.063827","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26177","12.064146","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26178","12.064154","172.30.1.205","172.30.1.104","TCP","54","36742 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26179","12.066067","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26180","12.066456","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26181","12.066462","172.30.1.205","172.30.1.104","TCP","54","36742 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26182","12.067814","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26183","12.070145","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26184","12.070155","172.30.1.205","172.30.1.104","TCP","54","36742 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26185","12.071090","172.30.1.205","172.30.1.104","TCP","74","44108 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915297 TSecr=0 WS=128" "26186","12.071396","172.30.1.104","172.30.1.205","TCP","66","135 > 44108 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26187","12.071406","172.30.1.205","172.30.1.104","TCP","54","44108 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26188","12.071754","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26189","12.072087","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26190","12.072101","172.30.1.205","172.30.1.104","TCP","54","44108 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26191","12.074420","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26192","12.074885","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26193","12.074892","172.30.1.205","172.30.1.104","TCP","54","44108 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26194","12.076732","172.30.1.205","172.30.1.104","TCP","54","44108 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26195","12.076877","172.30.1.205","172.30.1.104","TCP","74","36746 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915303 TSecr=0 WS=128" "26196","12.077055","172.30.1.104","172.30.1.205","TCP","54","135 > 44108 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26197","12.077091","172.30.1.104","172.30.1.205","TCP","54","135 > 44108 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26198","12.077097","172.30.1.205","172.30.1.104","TCP","54","44108 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26199","12.077175","172.30.1.104","172.30.1.205","TCP","66","49671 > 36746 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26200","12.077184","172.30.1.205","172.30.1.104","TCP","54","36746 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26201","12.077531","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26202","12.077861","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26203","12.077870","172.30.1.205","172.30.1.104","TCP","54","36746 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26204","12.079757","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26205","12.080139","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26206","12.080144","172.30.1.205","172.30.1.104","TCP","54","36746 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26207","12.081530","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26208","12.083885","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26209","12.083895","172.30.1.205","172.30.1.104","TCP","54","36746 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26210","12.084857","172.30.1.205","172.30.1.104","TCP","74","44112 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915311 TSecr=0 WS=128" "26211","12.085187","172.30.1.104","172.30.1.205","TCP","66","135 > 44112 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26212","12.085198","172.30.1.205","172.30.1.104","TCP","54","44112 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26213","12.085555","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26214","12.085860","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26215","12.085869","172.30.1.205","172.30.1.104","TCP","54","44112 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26216","12.088072","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26217","12.088500","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26218","12.088507","172.30.1.205","172.30.1.104","TCP","54","44112 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26219","12.090336","172.30.1.205","172.30.1.104","TCP","54","44112 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26220","12.090457","172.30.1.205","172.30.1.104","TCP","74","36750 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915316 TSecr=0 WS=128" "26221","12.090639","172.30.1.104","172.30.1.205","TCP","54","135 > 44112 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26222","12.090669","172.30.1.104","172.30.1.205","TCP","54","135 > 44112 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26223","12.090676","172.30.1.205","172.30.1.104","TCP","54","44112 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26224","12.090758","172.30.1.104","172.30.1.205","TCP","66","49671 > 36750 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26225","12.090767","172.30.1.205","172.30.1.104","TCP","54","36750 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26226","12.091114","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26227","12.091441","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26228","12.091450","172.30.1.205","172.30.1.104","TCP","54","36750 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26229","12.093355","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26230","12.093744","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26231","12.093751","172.30.1.205","172.30.1.104","TCP","54","36750 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26232","12.095105","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26233","12.097488","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26234","12.097499","172.30.1.205","172.30.1.104","TCP","54","36750 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26235","12.098453","172.30.1.205","172.30.1.104","TCP","74","44116 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915324 TSecr=0 WS=128" "26236","12.098760","172.30.1.104","172.30.1.205","TCP","66","135 > 44116 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26237","12.098771","172.30.1.205","172.30.1.104","TCP","54","44116 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26238","12.099120","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26239","12.099428","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26240","12.099437","172.30.1.205","172.30.1.104","TCP","54","44116 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26241","12.101661","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26242","12.102097","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26243","12.102104","172.30.1.205","172.30.1.104","TCP","54","44116 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26244","12.103925","172.30.1.205","172.30.1.104","TCP","54","44116 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26245","12.104037","172.30.1.205","172.30.1.104","TCP","74","36754 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915330 TSecr=0 WS=128" "26246","12.104216","172.30.1.104","172.30.1.205","TCP","54","135 > 44116 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26247","12.104246","172.30.1.104","172.30.1.205","TCP","54","135 > 44116 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26248","12.104252","172.30.1.205","172.30.1.104","TCP","54","44116 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26249","12.104289","172.30.1.104","172.30.1.205","TCP","66","49671 > 36754 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26250","12.104297","172.30.1.205","172.30.1.104","TCP","54","36754 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26251","12.104647","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26252","12.105812","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26253","12.105823","172.30.1.205","172.30.1.104","TCP","54","36754 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26254","12.107731","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26255","12.108156","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26256","12.108162","172.30.1.205","172.30.1.104","TCP","54","36754 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26257","12.109559","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26258","12.112002","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26259","12.112013","172.30.1.205","172.30.1.104","TCP","54","36754 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26260","12.112992","172.30.1.205","172.30.1.104","TCP","74","44120 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915339 TSecr=0 WS=128" "26261","12.113308","172.30.1.104","172.30.1.205","TCP","66","135 > 44120 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26262","12.113319","172.30.1.205","172.30.1.104","TCP","54","44120 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26263","12.113669","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26264","12.113987","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26265","12.114001","172.30.1.205","172.30.1.104","TCP","54","44120 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26266","12.116190","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26267","12.116690","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26268","12.116698","172.30.1.205","172.30.1.104","TCP","54","44120 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26269","12.118568","172.30.1.205","172.30.1.104","TCP","54","44120 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26270","12.118682","172.30.1.205","172.30.1.104","TCP","74","36758 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915345 TSecr=0 WS=128" "26271","12.118867","172.30.1.104","172.30.1.205","TCP","54","135 > 44120 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26272","12.118894","172.30.1.104","172.30.1.205","TCP","54","135 > 44120 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26273","12.118900","172.30.1.205","172.30.1.104","TCP","54","44120 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26274","12.118971","172.30.1.104","172.30.1.205","TCP","66","49671 > 36758 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26275","12.118980","172.30.1.205","172.30.1.104","TCP","54","36758 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26276","12.119326","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26277","12.119637","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26278","12.119646","172.30.1.205","172.30.1.104","TCP","54","36758 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26279","12.121559","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26280","12.123693","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26281","12.123699","172.30.1.205","172.30.1.104","TCP","54","36758 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26282","12.125092","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26283","12.127497","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26284","12.127516","172.30.1.205","172.30.1.104","TCP","54","36758 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26285","12.128471","172.30.1.205","172.30.1.104","TCP","74","44124 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915354 TSecr=0 WS=128" "26286","12.128821","172.30.1.104","172.30.1.205","TCP","66","135 > 44124 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26287","12.128833","172.30.1.205","172.30.1.104","TCP","54","44124 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26288","12.129199","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26289","12.129522","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26290","12.129531","172.30.1.205","172.30.1.104","TCP","54","44124 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26291","12.131750","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26292","12.132171","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26293","12.132178","172.30.1.205","172.30.1.104","TCP","54","44124 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26294","12.134023","172.30.1.205","172.30.1.104","TCP","54","44124 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26295","12.134135","172.30.1.205","172.30.1.104","TCP","74","36762 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915360 TSecr=0 WS=128" "26296","12.134462","172.30.1.104","172.30.1.205","TCP","66","49671 > 36762 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26297","12.134474","172.30.1.205","172.30.1.104","TCP","54","36762 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26298","12.134486","172.30.1.104","172.30.1.205","TCP","54","135 > 44124 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26299","12.134557","172.30.1.104","172.30.1.205","TCP","54","135 > 44124 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26300","12.134563","172.30.1.205","172.30.1.104","TCP","54","44124 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26301","12.134879","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26302","12.135259","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26303","12.135269","172.30.1.205","172.30.1.104","TCP","54","36762 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26304","12.137201","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26305","12.137613","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26306","12.137623","172.30.1.205","172.30.1.104","TCP","54","36762 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26307","12.139093","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26308","12.141415","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26309","12.141427","172.30.1.205","172.30.1.104","TCP","54","36762 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26310","12.142398","172.30.1.205","172.30.1.104","TCP","74","44128 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915368 TSecr=0 WS=128" "26311","12.142784","172.30.1.104","172.30.1.205","TCP","66","135 > 44128 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26312","12.142794","172.30.1.205","172.30.1.104","TCP","54","44128 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26313","12.143151","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26314","12.143487","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26315","12.143498","172.30.1.205","172.30.1.104","TCP","54","44128 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26316","12.145742","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26317","12.146163","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26318","12.146170","172.30.1.205","172.30.1.104","TCP","54","44128 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26319","12.148001","172.30.1.205","172.30.1.104","TCP","54","44128 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26320","12.148113","172.30.1.205","172.30.1.104","TCP","74","36766 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915374 TSecr=0 WS=128" "26321","12.148311","172.30.1.104","172.30.1.205","TCP","54","135 > 44128 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26322","12.148342","172.30.1.104","172.30.1.205","TCP","54","135 > 44128 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26323","12.148348","172.30.1.205","172.30.1.104","TCP","54","44128 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26324","12.148442","172.30.1.104","172.30.1.205","TCP","66","49671 > 36766 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26325","12.148450","172.30.1.205","172.30.1.104","TCP","54","36766 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26326","12.148822","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26327","12.149145","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26328","12.149154","172.30.1.205","172.30.1.104","TCP","54","36766 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26329","12.151048","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26330","12.151424","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26331","12.151430","172.30.1.205","172.30.1.104","TCP","54","36766 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26332","12.152815","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26333","12.155034","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26334","12.155043","172.30.1.205","172.30.1.104","TCP","54","36766 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26335","12.156002","172.30.1.205","172.30.1.104","TCP","74","44132 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915382 TSecr=0 WS=128" "26336","12.156312","172.30.1.104","172.30.1.205","TCP","66","135 > 44132 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26337","12.156323","172.30.1.205","172.30.1.104","TCP","54","44132 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26338","12.156670","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26339","12.156980","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26340","12.156990","172.30.1.205","172.30.1.104","TCP","54","44132 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26341","12.159187","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26342","12.159592","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26343","12.159599","172.30.1.205","172.30.1.104","TCP","54","44132 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26344","12.161433","172.30.1.205","172.30.1.104","TCP","54","44132 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26345","12.161544","172.30.1.205","172.30.1.104","TCP","74","36770 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915387 TSecr=0 WS=128" "26346","12.161745","172.30.1.104","172.30.1.205","TCP","54","135 > 44132 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26347","12.161778","172.30.1.104","172.30.1.205","TCP","54","135 > 44132 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26348","12.161784","172.30.1.205","172.30.1.104","TCP","54","44132 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26349","12.161820","172.30.1.104","172.30.1.205","TCP","66","49671 > 36770 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26350","12.161828","172.30.1.205","172.30.1.104","TCP","54","36770 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26351","12.162169","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26352","12.162483","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26353","12.162492","172.30.1.205","172.30.1.104","TCP","54","36770 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26354","12.164375","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26355","12.164812","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26356","12.164820","172.30.1.205","172.30.1.104","TCP","54","36770 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26357","12.166191","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26358","12.168632","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26359","12.168642","172.30.1.205","172.30.1.104","TCP","54","36770 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26360","12.169603","172.30.1.205","172.30.1.104","TCP","74","44136 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915396 TSecr=0 WS=128" "26361","12.169891","172.30.1.104","172.30.1.205","TCP","66","135 > 44136 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26362","12.169902","172.30.1.205","172.30.1.104","TCP","54","44136 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26363","12.170258","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26364","12.170553","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26365","12.170562","172.30.1.205","172.30.1.104","TCP","54","44136 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26366","12.172743","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26367","12.173179","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26368","12.173187","172.30.1.205","172.30.1.104","TCP","54","44136 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26369","12.175017","172.30.1.205","172.30.1.104","TCP","54","44136 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26370","12.175130","172.30.1.205","172.30.1.104","TCP","74","36774 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915401 TSecr=0 WS=128" "26371","12.175325","172.30.1.104","172.30.1.205","TCP","54","135 > 44136 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26372","12.175354","172.30.1.104","172.30.1.205","TCP","54","135 > 44136 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26373","12.175359","172.30.1.205","172.30.1.104","TCP","54","44136 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26374","12.175452","172.30.1.104","172.30.1.205","TCP","66","49671 > 36774 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26375","12.175460","172.30.1.205","172.30.1.104","TCP","54","36774 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26376","12.175811","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26377","12.176139","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26378","12.176148","172.30.1.205","172.30.1.104","TCP","54","36774 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26379","12.178045","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26380","12.178433","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26381","12.178439","172.30.1.205","172.30.1.104","TCP","54","36774 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26382","12.179794","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26383","12.182181","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26384","12.182191","172.30.1.205","172.30.1.104","TCP","54","36774 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26385","12.183134","172.30.1.205","172.30.1.104","TCP","74","44140 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915409 TSecr=0 WS=128" "26386","12.183453","172.30.1.104","172.30.1.205","TCP","66","135 > 44140 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26387","12.183464","172.30.1.205","172.30.1.104","TCP","54","44140 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26388","12.183816","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26389","12.184225","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26390","12.184240","172.30.1.205","172.30.1.104","TCP","54","44140 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26391","12.186548","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26392","12.186962","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26393","12.186968","172.30.1.205","172.30.1.104","TCP","54","44140 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26394","12.188800","172.30.1.205","172.30.1.104","TCP","54","44140 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26395","12.188918","172.30.1.205","172.30.1.104","TCP","74","36778 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915415 TSecr=0 WS=128" "26396","12.189110","172.30.1.104","172.30.1.205","TCP","54","135 > 44140 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26397","12.189125","172.30.1.104","172.30.1.205","TCP","54","135 > 44140 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26398","12.189130","172.30.1.205","172.30.1.104","TCP","54","44140 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26399","12.189271","172.30.1.104","172.30.1.205","TCP","66","49671 > 36778 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26400","12.189280","172.30.1.205","172.30.1.104","TCP","54","36778 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26401","12.189628","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26402","12.189936","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26403","12.189947","172.30.1.205","172.30.1.104","TCP","54","36778 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26404","12.191830","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26405","12.192278","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26406","12.192290","172.30.1.205","172.30.1.104","TCP","54","36778 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26407","12.193660","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26408","12.196028","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26409","12.196051","172.30.1.205","172.30.1.104","TCP","54","36778 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26410","12.197064","172.30.1.205","172.30.1.104","TCP","74","44144 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915423 TSecr=0 WS=128" "26411","12.197412","172.30.1.104","172.30.1.205","TCP","66","135 > 44144 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26412","12.197422","172.30.1.205","172.30.1.104","TCP","54","44144 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26413","12.197773","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26414","12.198062","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26415","12.198071","172.30.1.205","172.30.1.104","TCP","54","44144 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26416","12.200260","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26417","12.200656","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26418","12.200663","172.30.1.205","172.30.1.104","TCP","54","44144 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26419","12.202484","172.30.1.205","172.30.1.104","TCP","54","44144 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26420","12.202592","172.30.1.205","172.30.1.104","TCP","74","36782 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915429 TSecr=0 WS=128" "26421","12.202753","172.30.1.104","172.30.1.205","TCP","54","135 > 44144 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26422","12.202795","172.30.1.104","172.30.1.205","TCP","54","135 > 44144 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26423","12.202800","172.30.1.205","172.30.1.104","TCP","54","44144 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26424","12.202888","172.30.1.104","172.30.1.205","TCP","66","49671 > 36782 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26425","12.202897","172.30.1.205","172.30.1.104","TCP","54","36782 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26426","12.203245","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26427","12.203533","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26428","12.203540","172.30.1.205","172.30.1.104","TCP","54","36782 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26429","12.205437","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26430","12.205814","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26431","12.205820","172.30.1.205","172.30.1.104","TCP","54","36782 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26432","12.207159","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26433","12.209450","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26434","12.209459","172.30.1.205","172.30.1.104","TCP","54","36782 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26435","12.210405","172.30.1.205","172.30.1.104","TCP","74","44148 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915436 TSecr=0 WS=128" "26436","12.210730","172.30.1.104","172.30.1.205","TCP","66","135 > 44148 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26437","12.210740","172.30.1.205","172.30.1.104","TCP","54","44148 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26438","12.211089","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26439","12.211509","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26440","12.211518","172.30.1.205","172.30.1.104","TCP","54","44148 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26441","12.213724","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26442","12.214141","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26443","12.214147","172.30.1.205","172.30.1.104","TCP","54","44148 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26444","12.215947","172.30.1.205","172.30.1.104","TCP","54","44148 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26445","12.216056","172.30.1.205","172.30.1.104","TCP","74","36786 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915442 TSecr=0 WS=128" "26446","12.216262","172.30.1.104","172.30.1.205","TCP","54","135 > 44148 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26447","12.216375","172.30.1.104","172.30.1.205","TCP","66","49671 > 36786 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26448","12.216393","172.30.1.205","172.30.1.104","TCP","54","36786 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26449","12.216733","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26450","12.218487","172.30.1.104","172.30.1.205","TCP","54","135 > 44148 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26451","12.218495","172.30.1.205","172.30.1.104","TCP","54","44148 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26452","12.218507","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26453","12.218518","172.30.1.205","172.30.1.104","TCP","54","36786 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26454","12.220381","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26455","12.220796","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26456","12.220802","172.30.1.205","172.30.1.104","TCP","54","36786 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26457","12.222173","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26458","12.224540","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26459","12.224549","172.30.1.205","172.30.1.104","TCP","54","36786 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26460","12.225508","172.30.1.205","172.30.1.104","TCP","74","44152 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915451 TSecr=0 WS=128" "26461","12.225848","172.30.1.104","172.30.1.205","TCP","66","135 > 44152 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26462","12.225859","172.30.1.205","172.30.1.104","TCP","54","44152 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26463","12.226218","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26464","12.226536","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26465","12.226545","172.30.1.205","172.30.1.104","TCP","54","44152 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26466","12.228702","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26467","12.229131","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26468","12.229143","172.30.1.205","172.30.1.104","TCP","54","44152 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26469","12.230175","172.30.1.205","172.30.1.104","TCP","54","36746 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26470","12.230224","172.30.1.205","172.30.1.104","TCP","54","36750 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26471","12.230261","172.30.1.205","172.30.1.104","TCP","54","36754 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26472","12.230292","172.30.1.205","172.30.1.104","TCP","54","36758 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26473","12.230324","172.30.1.205","172.30.1.104","TCP","54","36762 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26474","12.230351","172.30.1.205","172.30.1.104","TCP","54","36766 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26475","12.230378","172.30.1.205","172.30.1.104","TCP","54","36770 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26476","12.230404","172.30.1.205","172.30.1.104","TCP","54","36774 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26477","12.230426","172.30.1.205","172.30.1.104","TCP","54","36778 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26478","12.230456","172.30.1.205","172.30.1.104","TCP","54","36782 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26479","12.230481","172.30.1.205","172.30.1.104","TCP","54","36786 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26480","12.230550","172.30.1.205","172.30.1.104","TCP","54","36742 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26481","12.230806","172.30.1.104","172.30.1.205","TCP","54","49671 > 36746 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26482","12.230827","172.30.1.104","172.30.1.205","TCP","54","49671 > 36750 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26483","12.230847","172.30.1.104","172.30.1.205","TCP","54","49671 > 36754 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26484","12.230890","172.30.1.104","172.30.1.205","TCP","54","49671 > 36758 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26485","12.230922","172.30.1.104","172.30.1.205","TCP","54","49671 > 36762 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26486","12.230941","172.30.1.104","172.30.1.205","TCP","54","49671 > 36766 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26487","12.230960","172.30.1.104","172.30.1.205","TCP","54","49671 > 36770 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26488","12.231035","172.30.1.104","172.30.1.205","TCP","54","49671 > 36774 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26489","12.231054","172.30.1.104","172.30.1.205","TCP","54","49671 > 36770 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26490","12.231060","172.30.1.205","172.30.1.104","TCP","54","36770 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26491","12.231097","172.30.1.104","172.30.1.205","TCP","54","49671 > 36778 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26492","12.231116","172.30.1.104","172.30.1.205","TCP","54","49671 > 36782 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26493","12.231137","172.30.1.104","172.30.1.205","TCP","54","49671 > 36762 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26494","12.231142","172.30.1.205","172.30.1.104","TCP","54","36762 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26495","12.231208","172.30.1.104","172.30.1.205","TCP","54","49671 > 36786 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26496","12.231234","172.30.1.104","172.30.1.205","TCP","54","49671 > 36758 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26497","12.231238","172.30.1.205","172.30.1.104","TCP","54","36758 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26498","12.231286","172.30.1.104","172.30.1.205","TCP","54","49671 > 36742 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26499","12.231306","172.30.1.104","172.30.1.205","TCP","54","49671 > 36754 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26500","12.231309","172.30.1.205","172.30.1.104","TCP","54","36754 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26501","12.231351","172.30.1.104","172.30.1.205","TCP","54","49671 > 36750 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26502","12.231354","172.30.1.205","172.30.1.104","TCP","54","36750 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26503","12.231371","172.30.1.104","172.30.1.205","TCP","54","49671 > 36742 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26504","12.231373","172.30.1.205","172.30.1.104","TCP","54","36742 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26505","12.231437","172.30.1.104","172.30.1.205","TCP","54","49671 > 36786 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26506","12.231440","172.30.1.205","172.30.1.104","TCP","54","36786 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26507","12.231458","172.30.1.104","172.30.1.205","TCP","54","49671 > 36782 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26508","12.231461","172.30.1.205","172.30.1.104","TCP","54","36782 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26509","12.231486","172.30.1.104","172.30.1.205","TCP","54","49671 > 36778 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26510","12.231489","172.30.1.205","172.30.1.104","TCP","54","36778 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26511","12.231514","172.30.1.104","172.30.1.205","TCP","54","49671 > 36774 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26512","12.231517","172.30.1.205","172.30.1.104","TCP","54","36774 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26513","12.231541","172.30.1.104","172.30.1.205","TCP","54","49671 > 36746 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26514","12.231544","172.30.1.205","172.30.1.104","TCP","54","36746 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26515","12.231600","172.30.1.104","172.30.1.205","TCP","54","49671 > 36766 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26516","12.231603","172.30.1.205","172.30.1.104","TCP","54","36766 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26517","12.232148","172.30.1.205","172.30.1.104","TCP","54","44152 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26518","12.232256","172.30.1.205","172.30.1.104","TCP","74","36790 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915458 TSecr=0 WS=128" "26519","12.232411","172.30.1.104","172.30.1.205","TCP","54","135 > 44152 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26520","12.232447","172.30.1.104","172.30.1.205","TCP","54","135 > 44152 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26521","12.232452","172.30.1.205","172.30.1.104","TCP","54","44152 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26522","12.232580","172.30.1.104","172.30.1.205","TCP","66","49671 > 36790 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26523","12.232589","172.30.1.205","172.30.1.104","TCP","54","36790 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26524","12.232988","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26525","12.233342","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26526","12.233350","172.30.1.205","172.30.1.104","TCP","54","36790 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26527","12.235238","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26528","12.235631","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26529","12.235637","172.30.1.205","172.30.1.104","TCP","54","36790 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26530","12.237046","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26531","12.239401","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26532","12.239410","172.30.1.205","172.30.1.104","TCP","54","36790 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26533","12.240333","172.30.1.205","172.30.1.104","TCP","74","44156 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915466 TSecr=0 WS=128" "26534","12.240659","172.30.1.104","172.30.1.205","TCP","66","135 > 44156 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26535","12.240669","172.30.1.205","172.30.1.104","TCP","54","44156 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26536","12.241082","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26537","12.241436","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26538","12.241445","172.30.1.205","172.30.1.104","TCP","54","44156 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26539","12.243645","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26540","12.244086","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26541","12.244092","172.30.1.205","172.30.1.104","TCP","54","44156 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26542","12.245925","172.30.1.205","172.30.1.104","TCP","54","44156 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26543","12.246066","172.30.1.205","172.30.1.104","TCP","74","36794 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915472 TSecr=0 WS=128" "26544","12.246204","172.30.1.104","172.30.1.205","TCP","54","135 > 44156 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26545","12.246217","172.30.1.104","172.30.1.205","TCP","54","135 > 44156 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26546","12.246230","172.30.1.205","172.30.1.104","TCP","54","44156 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26547","12.246368","172.30.1.104","172.30.1.205","TCP","66","49671 > 36794 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26548","12.246376","172.30.1.205","172.30.1.104","TCP","54","36794 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26549","12.246716","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26550","12.247032","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26551","12.247040","172.30.1.205","172.30.1.104","TCP","54","36794 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26552","12.248984","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26553","12.249361","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26554","12.249367","172.30.1.205","172.30.1.104","TCP","54","36794 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26555","12.250706","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26556","12.253198","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26557","12.253207","172.30.1.205","172.30.1.104","TCP","54","36794 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26558","12.254133","172.30.1.205","172.30.1.104","TCP","74","44160 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915480 TSecr=0 WS=128" "26559","12.254478","172.30.1.104","172.30.1.205","TCP","66","135 > 44160 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26560","12.254489","172.30.1.205","172.30.1.104","TCP","54","44160 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26561","12.254836","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26562","12.255172","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26563","12.255181","172.30.1.205","172.30.1.104","TCP","54","44160 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26564","12.257397","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26565","12.257843","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26566","12.257849","172.30.1.205","172.30.1.104","TCP","54","44160 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26567","12.259643","172.30.1.205","172.30.1.104","TCP","54","44160 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26568","12.259754","172.30.1.205","172.30.1.104","TCP","74","36798 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915486 TSecr=0 WS=128" "26569","12.259925","172.30.1.104","172.30.1.205","TCP","54","135 > 44160 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26570","12.259957","172.30.1.104","172.30.1.205","TCP","54","135 > 44160 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26571","12.259962","172.30.1.205","172.30.1.104","TCP","54","44160 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26572","12.260048","172.30.1.104","172.30.1.205","TCP","66","49671 > 36798 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26573","12.260056","172.30.1.205","172.30.1.104","TCP","54","36798 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26574","12.260412","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26575","12.260814","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26576","12.260822","172.30.1.205","172.30.1.104","TCP","54","36798 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26577","12.262690","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26578","12.263106","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26579","12.263112","172.30.1.205","172.30.1.104","TCP","54","36798 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26580","12.264455","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26581","12.266902","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26582","12.266911","172.30.1.205","172.30.1.104","TCP","54","36798 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26583","12.267858","172.30.1.205","172.30.1.104","TCP","74","44164 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915494 TSecr=0 WS=128" "26584","12.268216","172.30.1.104","172.30.1.205","TCP","66","135 > 44164 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26585","12.268227","172.30.1.205","172.30.1.104","TCP","54","44164 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26586","12.268572","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26587","12.268888","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26588","12.268897","172.30.1.205","172.30.1.104","TCP","54","44164 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26589","12.271093","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26590","12.271548","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26591","12.271555","172.30.1.205","172.30.1.104","TCP","54","44164 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26592","12.273385","172.30.1.205","172.30.1.104","TCP","54","44164 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26593","12.273496","172.30.1.205","172.30.1.104","TCP","74","36802 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915499 TSecr=0 WS=128" "26594","12.273699","172.30.1.104","172.30.1.205","TCP","54","135 > 44164 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26595","12.273707","172.30.1.104","172.30.1.205","TCP","54","135 > 44164 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26596","12.273713","172.30.1.205","172.30.1.104","TCP","54","44164 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26597","12.273786","172.30.1.104","172.30.1.205","TCP","66","49671 > 36802 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26598","12.273796","172.30.1.205","172.30.1.104","TCP","54","36802 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26599","12.274139","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26600","12.274440","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26601","12.274448","172.30.1.205","172.30.1.104","TCP","54","36802 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26602","12.276325","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26603","12.276739","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26604","12.276745","172.30.1.205","172.30.1.104","TCP","54","36802 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26605","12.278107","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26606","12.280535","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26607","12.280544","172.30.1.205","172.30.1.104","TCP","54","36802 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26608","12.281495","172.30.1.205","172.30.1.104","TCP","74","44168 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915507 TSecr=0 WS=128" "26609","12.281788","172.30.1.104","172.30.1.205","TCP","66","135 > 44168 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26610","12.281798","172.30.1.205","172.30.1.104","TCP","54","44168 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26611","12.282145","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26612","12.282441","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26613","12.282450","172.30.1.205","172.30.1.104","TCP","54","44168 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26614","12.284611","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26615","12.285045","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26616","12.285052","172.30.1.205","172.30.1.104","TCP","54","44168 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26617","12.286859","172.30.1.205","172.30.1.104","TCP","54","44168 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26618","12.286969","172.30.1.205","172.30.1.104","TCP","74","36806 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915513 TSecr=0 WS=128" "26619","12.287143","172.30.1.104","172.30.1.205","TCP","54","135 > 44168 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26620","12.287170","172.30.1.104","172.30.1.205","TCP","54","135 > 44168 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26621","12.287176","172.30.1.205","172.30.1.104","TCP","54","44168 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26622","12.287251","172.30.1.104","172.30.1.205","TCP","66","49671 > 36806 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26623","12.287259","172.30.1.205","172.30.1.104","TCP","54","36806 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26624","12.287620","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26625","12.287940","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26626","12.287948","172.30.1.205","172.30.1.104","TCP","54","36806 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26627","12.289831","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26628","12.290257","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26629","12.290263","172.30.1.205","172.30.1.104","TCP","54","36806 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26630","12.291596","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26631","12.293987","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26632","12.293996","172.30.1.205","172.30.1.104","TCP","54","36806 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26633","12.294941","172.30.1.205","172.30.1.104","TCP","74","44172 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915521 TSecr=0 WS=128" "26634","12.295249","172.30.1.104","172.30.1.205","TCP","66","135 > 44172 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26635","12.295260","172.30.1.205","172.30.1.104","TCP","54","44172 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26636","12.295604","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26637","12.295909","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26638","12.295917","172.30.1.205","172.30.1.104","TCP","54","44172 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26639","12.298119","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26640","12.298585","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26641","12.298592","172.30.1.205","172.30.1.104","TCP","54","44172 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26642","12.300392","172.30.1.205","172.30.1.104","TCP","54","44172 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26643","12.300501","172.30.1.205","172.30.1.104","TCP","74","36810 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915526 TSecr=0 WS=128" "26644","12.300660","172.30.1.104","172.30.1.205","TCP","54","135 > 44172 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26645","12.300695","172.30.1.104","172.30.1.205","TCP","54","135 > 44172 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26646","12.300701","172.30.1.205","172.30.1.104","TCP","54","44172 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26647","12.300817","172.30.1.104","172.30.1.205","TCP","66","49671 > 36810 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26648","12.300826","172.30.1.205","172.30.1.104","TCP","54","36810 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26649","12.301182","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26650","12.301483","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26651","12.301492","172.30.1.205","172.30.1.104","TCP","54","36810 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26652","12.303380","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26653","12.303769","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26654","12.303775","172.30.1.205","172.30.1.104","TCP","54","36810 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26655","12.305161","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26656","12.307577","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26657","12.307588","172.30.1.205","172.30.1.104","TCP","54","36810 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26658","12.308552","172.30.1.205","172.30.1.104","TCP","74","44176 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915534 TSecr=0 WS=128" "26659","12.308909","172.30.1.104","172.30.1.205","TCP","66","135 > 44176 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26660","12.308920","172.30.1.205","172.30.1.104","TCP","54","44176 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26661","12.309276","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26662","12.309585","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26663","12.309594","172.30.1.205","172.30.1.104","TCP","54","44176 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26664","12.311778","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26665","12.312208","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26666","12.312215","172.30.1.205","172.30.1.104","TCP","54","44176 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26667","12.314044","172.30.1.205","172.30.1.104","TCP","54","44176 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26668","12.314163","172.30.1.205","172.30.1.104","TCP","74","36814 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915540 TSecr=0 WS=128" "26669","12.314331","172.30.1.104","172.30.1.205","TCP","54","135 > 44176 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26670","12.314369","172.30.1.104","172.30.1.205","TCP","54","135 > 44176 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26671","12.314376","172.30.1.205","172.30.1.104","TCP","54","44176 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26672","12.314460","172.30.1.104","172.30.1.205","TCP","66","49671 > 36814 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26673","12.314468","172.30.1.205","172.30.1.104","TCP","54","36814 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26674","12.314810","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26675","12.315173","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26676","12.315184","172.30.1.205","172.30.1.104","TCP","54","36814 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26677","12.317138","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26678","12.317539","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26679","12.317545","172.30.1.205","172.30.1.104","TCP","54","36814 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26680","12.318896","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26681","12.321235","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26682","12.321249","172.30.1.205","172.30.1.104","TCP","54","36814 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26683","12.322293","172.30.1.205","172.30.1.104","TCP","74","44180 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915548 TSecr=0 WS=128" "26684","12.322602","172.30.1.104","172.30.1.205","TCP","66","135 > 44180 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26685","12.322613","172.30.1.205","172.30.1.104","TCP","54","44180 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26686","12.322969","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26687","12.323340","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26688","12.323349","172.30.1.205","172.30.1.104","TCP","54","44180 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26689","12.325601","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26690","12.326046","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26691","12.326053","172.30.1.205","172.30.1.104","TCP","54","44180 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26692","12.327870","172.30.1.205","172.30.1.104","TCP","54","44180 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26693","12.327984","172.30.1.205","172.30.1.104","TCP","74","36818 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915554 TSecr=0 WS=128" "26694","12.328156","172.30.1.104","172.30.1.205","TCP","54","135 > 44180 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26695","12.328224","172.30.1.104","172.30.1.205","TCP","54","135 > 44180 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26696","12.328231","172.30.1.205","172.30.1.104","TCP","54","44180 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26697","12.328307","172.30.1.104","172.30.1.205","TCP","66","49671 > 36818 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26698","12.328315","172.30.1.205","172.30.1.104","TCP","54","36818 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26699","12.328660","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26700","12.328971","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26701","12.328980","172.30.1.205","172.30.1.104","TCP","54","36818 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26702","12.330854","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26703","12.331284","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26704","12.331291","172.30.1.205","172.30.1.104","TCP","54","36818 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26705","12.332646","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26706","12.335011","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26707","12.335021","172.30.1.205","172.30.1.104","TCP","54","36818 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26708","12.335966","172.30.1.205","172.30.1.104","TCP","74","44184 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915562 TSecr=0 WS=128" "26709","12.336276","172.30.1.104","172.30.1.205","TCP","66","135 > 44184 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26710","12.336286","172.30.1.205","172.30.1.104","TCP","54","44184 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26711","12.336633","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26712","12.336949","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26713","12.336958","172.30.1.205","172.30.1.104","TCP","54","44184 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26714","12.339143","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26715","12.339557","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26716","12.339564","172.30.1.205","172.30.1.104","TCP","54","44184 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26717","12.341388","172.30.1.205","172.30.1.104","TCP","54","44184 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26718","12.341498","172.30.1.205","172.30.1.104","TCP","74","36822 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915567 TSecr=0 WS=128" "26719","12.341681","172.30.1.104","172.30.1.205","TCP","54","135 > 44184 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26720","12.341712","172.30.1.104","172.30.1.205","TCP","54","135 > 44184 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26721","12.341718","172.30.1.205","172.30.1.104","TCP","54","44184 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26722","12.341795","172.30.1.104","172.30.1.205","TCP","66","49671 > 36822 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26723","12.341804","172.30.1.205","172.30.1.104","TCP","54","36822 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26724","12.342146","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26725","12.342449","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26726","12.342461","172.30.1.205","172.30.1.104","TCP","54","36822 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26727","12.344615","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26728","12.345002","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26729","12.345009","172.30.1.205","172.30.1.104","TCP","54","36822 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26730","12.346359","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26731","12.348768","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26732","12.348788","172.30.1.205","172.30.1.104","TCP","54","36822 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26733","12.349725","172.30.1.205","172.30.1.104","TCP","74","44188 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915576 TSecr=0 WS=128" "26734","12.350015","172.30.1.104","172.30.1.205","TCP","66","135 > 44188 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26735","12.350026","172.30.1.205","172.30.1.104","TCP","54","44188 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26736","12.350378","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26737","12.350710","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26738","12.350720","172.30.1.205","172.30.1.104","TCP","54","44188 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26739","12.352917","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26740","12.353303","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26741","12.353310","172.30.1.205","172.30.1.104","TCP","54","44188 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26742","12.355132","172.30.1.205","172.30.1.104","TCP","54","44188 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26743","12.355242","172.30.1.205","172.30.1.104","TCP","74","36826 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915581 TSecr=0 WS=128" "26744","12.355404","172.30.1.104","172.30.1.205","TCP","54","135 > 44188 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26745","12.355439","172.30.1.104","172.30.1.205","TCP","54","135 > 44188 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26746","12.355444","172.30.1.205","172.30.1.104","TCP","54","44188 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26747","12.355604","172.30.1.104","172.30.1.205","TCP","66","49671 > 36826 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26748","12.355612","172.30.1.205","172.30.1.104","TCP","54","36826 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26749","12.355957","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26750","12.356275","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26751","12.356284","172.30.1.205","172.30.1.104","TCP","54","36826 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26752","12.358171","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26753","12.358555","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26754","12.358561","172.30.1.205","172.30.1.104","TCP","54","36826 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26755","12.359907","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26756","12.362263","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26757","12.362272","172.30.1.205","172.30.1.104","TCP","54","36826 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26758","12.363209","172.30.1.205","172.30.1.104","TCP","74","44192 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915589 TSecr=0 WS=128" "26759","12.363506","172.30.1.104","172.30.1.205","TCP","66","135 > 44192 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26760","12.363517","172.30.1.205","172.30.1.104","TCP","54","44192 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26761","12.363871","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26762","12.364199","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26763","12.364208","172.30.1.205","172.30.1.104","TCP","54","44192 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26764","12.366418","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26765","12.366841","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26766","12.366848","172.30.1.205","172.30.1.104","TCP","54","44192 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26767","12.368650","172.30.1.205","172.30.1.104","TCP","54","44192 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26768","12.368761","172.30.1.205","172.30.1.104","TCP","74","36830 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915595 TSecr=0 WS=128" "26769","12.368947","172.30.1.104","172.30.1.205","TCP","54","135 > 44192 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26770","12.368976","172.30.1.104","172.30.1.205","TCP","54","135 > 44192 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26771","12.368982","172.30.1.205","172.30.1.104","TCP","54","44192 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26772","12.369058","172.30.1.104","172.30.1.205","TCP","66","49671 > 36830 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26773","12.369066","172.30.1.205","172.30.1.104","TCP","54","36830 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26774","12.369415","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26775","12.369728","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26776","12.369736","172.30.1.205","172.30.1.104","TCP","54","36830 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26777","12.371633","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26778","12.372067","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26779","12.372074","172.30.1.205","172.30.1.104","TCP","54","36830 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26780","12.373486","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26781","12.375850","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26782","12.375861","172.30.1.205","172.30.1.104","TCP","54","36830 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26783","12.376831","172.30.1.205","172.30.1.104","TCP","74","44196 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915603 TSecr=0 WS=128" "26784","12.377149","172.30.1.104","172.30.1.205","TCP","66","135 > 44196 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26785","12.377160","172.30.1.205","172.30.1.104","TCP","54","44196 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26786","12.377512","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26787","12.377825","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26788","12.377843","172.30.1.205","172.30.1.104","TCP","54","44196 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26789","12.380270","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26790","12.380680","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26791","12.380687","172.30.1.205","172.30.1.104","TCP","54","44196 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26792","12.382543","172.30.1.205","172.30.1.104","TCP","54","44196 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26793","12.382654","172.30.1.205","172.30.1.104","TCP","74","36834 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915609 TSecr=0 WS=128" "26794","12.382818","172.30.1.104","172.30.1.205","TCP","54","135 > 44196 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26795","12.382853","172.30.1.104","172.30.1.205","TCP","54","135 > 44196 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26796","12.382858","172.30.1.205","172.30.1.104","TCP","54","44196 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26797","12.382944","172.30.1.104","172.30.1.205","TCP","66","49671 > 36834 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26798","12.382952","172.30.1.205","172.30.1.104","TCP","54","36834 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26799","12.383296","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26800","12.383605","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26801","12.383613","172.30.1.205","172.30.1.104","TCP","54","36834 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26802","12.385561","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26803","12.385955","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26804","12.385961","172.30.1.205","172.30.1.104","TCP","54","36834 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26805","12.387364","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26806","12.389686","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26807","12.389696","172.30.1.205","172.30.1.104","TCP","54","36834 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26808","12.390655","172.30.1.205","172.30.1.104","TCP","74","44200 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915617 TSecr=0 WS=128" "26809","12.390945","172.30.1.104","172.30.1.205","TCP","66","135 > 44200 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26810","12.390956","172.30.1.205","172.30.1.104","TCP","54","44200 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26811","12.391334","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26812","12.391641","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26813","12.391649","172.30.1.205","172.30.1.104","TCP","54","44200 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26814","12.393928","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26815","12.394383","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26816","12.394393","172.30.1.205","172.30.1.104","TCP","54","44200 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26817","12.395313","172.30.1.205","172.30.1.104","TCP","54","36794 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26818","12.395365","172.30.1.205","172.30.1.104","TCP","54","36798 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26819","12.395402","172.30.1.205","172.30.1.104","TCP","54","36802 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26820","12.395435","172.30.1.205","172.30.1.104","TCP","54","36806 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26821","12.395467","172.30.1.205","172.30.1.104","TCP","54","36810 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26822","12.395501","172.30.1.205","172.30.1.104","TCP","54","36814 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26823","12.395527","172.30.1.205","172.30.1.104","TCP","54","36818 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26824","12.395560","172.30.1.205","172.30.1.104","TCP","54","36822 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26825","12.395593","172.30.1.205","172.30.1.104","TCP","54","36826 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26826","12.395622","172.30.1.205","172.30.1.104","TCP","54","36830 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26827","12.395640","172.30.1.104","172.30.1.205","TCP","54","49671 > 36794 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26828","12.395661","172.30.1.104","172.30.1.205","TCP","54","49671 > 36798 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26829","12.395679","172.30.1.205","172.30.1.104","TCP","54","36834 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26830","12.395683","172.30.1.104","172.30.1.205","TCP","54","49671 > 36802 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26831","12.395762","172.30.1.205","172.30.1.104","TCP","54","36790 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "26832","12.395938","172.30.1.104","172.30.1.205","TCP","54","49671 > 36794 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26833","12.395946","172.30.1.205","172.30.1.104","TCP","54","36794 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26834","12.395954","172.30.1.104","172.30.1.205","TCP","54","49671 > 36806 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26835","12.395981","172.30.1.104","172.30.1.205","TCP","54","49671 > 36806 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26836","12.395984","172.30.1.205","172.30.1.104","TCP","54","36806 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26837","12.396001","172.30.1.104","172.30.1.205","TCP","54","49671 > 36798 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26838","12.396004","172.30.1.205","172.30.1.104","TCP","54","36798 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26839","12.396069","172.30.1.104","172.30.1.205","TCP","54","49671 > 36802 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26840","12.396074","172.30.1.205","172.30.1.104","TCP","54","36802 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26841","12.396089","172.30.1.104","172.30.1.205","TCP","54","49671 > 36810 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26842","12.396110","172.30.1.104","172.30.1.205","TCP","54","49671 > 36814 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26843","12.396132","172.30.1.104","172.30.1.205","TCP","54","49671 > 36810 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26844","12.396136","172.30.1.205","172.30.1.104","TCP","54","36810 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26845","12.396155","172.30.1.104","172.30.1.205","TCP","54","49671 > 36818 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26846","12.396174","172.30.1.104","172.30.1.205","TCP","54","49671 > 36814 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26847","12.396178","172.30.1.205","172.30.1.104","TCP","54","36814 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26848","12.396195","172.30.1.104","172.30.1.205","TCP","54","49671 > 36822 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26849","12.396215","172.30.1.104","172.30.1.205","TCP","54","49671 > 36826 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26850","12.396235","172.30.1.104","172.30.1.205","TCP","54","49671 > 36826 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26851","12.396239","172.30.1.205","172.30.1.104","TCP","54","36826 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26852","12.396257","172.30.1.104","172.30.1.205","TCP","54","49671 > 36830 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26853","12.396394","172.30.1.104","172.30.1.205","TCP","54","49671 > 36830 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26854","12.396399","172.30.1.205","172.30.1.104","TCP","54","36830 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26855","12.396440","172.30.1.104","172.30.1.205","TCP","54","49671 > 36834 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26856","12.396491","172.30.1.104","172.30.1.205","TCP","54","49671 > 36834 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26857","12.396495","172.30.1.205","172.30.1.104","TCP","54","36834 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26858","12.396511","172.30.1.104","172.30.1.205","TCP","54","49671 > 36818 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26859","12.396514","172.30.1.205","172.30.1.104","TCP","54","36818 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26860","12.396534","172.30.1.104","172.30.1.205","TCP","54","49671 > 36822 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26861","12.396537","172.30.1.205","172.30.1.104","TCP","54","36822 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26862","12.396554","172.30.1.104","172.30.1.205","TCP","54","49671 > 36790 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26863","12.396873","172.30.1.104","172.30.1.205","TCP","54","49671 > 36790 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "26864","12.396880","172.30.1.205","172.30.1.104","TCP","54","36790 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "26865","12.397382","172.30.1.205","172.30.1.104","TCP","54","44200 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26866","12.397500","172.30.1.205","172.30.1.104","TCP","74","36838 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915623 TSecr=0 WS=128" "26867","12.397654","172.30.1.104","172.30.1.205","TCP","54","135 > 44200 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26868","12.397716","172.30.1.104","172.30.1.205","TCP","54","135 > 44200 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26869","12.397721","172.30.1.205","172.30.1.104","TCP","54","44200 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26870","12.397793","172.30.1.104","172.30.1.205","TCP","66","49671 > 36838 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26871","12.397801","172.30.1.205","172.30.1.104","TCP","54","36838 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26872","12.398175","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26873","12.399171","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26874","12.399183","172.30.1.205","172.30.1.104","TCP","54","36838 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26875","12.401115","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26876","12.402582","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26877","12.402589","172.30.1.205","172.30.1.104","TCP","54","36838 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26878","12.403958","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26879","12.406404","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26880","12.406413","172.30.1.205","172.30.1.104","TCP","54","36838 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26881","12.407369","172.30.1.205","172.30.1.104","TCP","74","44204 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915633 TSecr=0 WS=128" "26882","12.407687","172.30.1.104","172.30.1.205","TCP","66","135 > 44204 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26883","12.407699","172.30.1.205","172.30.1.104","TCP","54","44204 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26884","12.408051","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26885","12.408432","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26886","12.408444","172.30.1.205","172.30.1.104","TCP","54","44204 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26887","12.410653","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26888","12.411071","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26889","12.411078","172.30.1.205","172.30.1.104","TCP","54","44204 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26890","12.412901","172.30.1.205","172.30.1.104","TCP","54","44204 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26891","12.413018","172.30.1.205","172.30.1.104","TCP","74","36842 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915639 TSecr=0 WS=128" "26892","12.413171","172.30.1.104","172.30.1.205","TCP","54","135 > 44204 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26893","12.413198","172.30.1.104","172.30.1.205","TCP","54","135 > 44204 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26894","12.413204","172.30.1.205","172.30.1.104","TCP","54","44204 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26895","12.413279","172.30.1.104","172.30.1.205","TCP","66","49671 > 36842 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26896","12.413288","172.30.1.205","172.30.1.104","TCP","54","36842 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26897","12.413647","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26898","12.413955","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26899","12.413963","172.30.1.205","172.30.1.104","TCP","54","36842 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26900","12.415821","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26901","12.416198","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26902","12.416204","172.30.1.205","172.30.1.104","TCP","54","36842 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26903","12.417577","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26904","12.420113","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26905","12.420123","172.30.1.205","172.30.1.104","TCP","54","36842 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26906","12.421093","172.30.1.205","172.30.1.104","TCP","74","44208 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915647 TSecr=0 WS=128" "26907","12.421429","172.30.1.104","172.30.1.205","TCP","66","135 > 44208 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26908","12.421442","172.30.1.205","172.30.1.104","TCP","54","44208 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26909","12.421799","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26910","12.422123","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26911","12.422132","172.30.1.205","172.30.1.104","TCP","54","44208 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26912","12.424331","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26913","12.424768","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26914","12.424785","172.30.1.205","172.30.1.104","TCP","54","44208 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26915","12.426623","172.30.1.205","172.30.1.104","TCP","54","44208 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26916","12.426736","172.30.1.205","172.30.1.104","TCP","74","36846 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915653 TSecr=0 WS=128" "26917","12.426914","172.30.1.104","172.30.1.205","TCP","54","135 > 44208 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26918","12.426950","172.30.1.104","172.30.1.205","TCP","54","135 > 44208 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26919","12.426956","172.30.1.205","172.30.1.104","TCP","54","44208 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26920","12.427044","172.30.1.104","172.30.1.205","TCP","66","49671 > 36846 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26921","12.427053","172.30.1.205","172.30.1.104","TCP","54","36846 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26922","12.427394","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26923","12.427694","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26924","12.427703","172.30.1.205","172.30.1.104","TCP","54","36846 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26925","12.429589","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26926","12.429981","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26927","12.429987","172.30.1.205","172.30.1.104","TCP","54","36846 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26928","12.431334","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26929","12.433802","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26930","12.433812","172.30.1.205","172.30.1.104","TCP","54","36846 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26931","12.434770","172.30.1.205","172.30.1.104","TCP","74","44212 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915661 TSecr=0 WS=128" "26932","12.435109","172.30.1.104","172.30.1.205","TCP","66","135 > 44212 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26933","12.435119","172.30.1.205","172.30.1.104","TCP","54","44212 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26934","12.435466","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26935","12.435801","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26936","12.435810","172.30.1.205","172.30.1.104","TCP","54","44212 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26937","12.438025","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26938","12.438434","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26939","12.438441","172.30.1.205","172.30.1.104","TCP","54","44212 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26940","12.440254","172.30.1.205","172.30.1.104","TCP","54","44212 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26941","12.440362","172.30.1.205","172.30.1.104","TCP","74","36850 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915666 TSecr=0 WS=128" "26942","12.440529","172.30.1.104","172.30.1.205","TCP","54","135 > 44212 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26943","12.440571","172.30.1.104","172.30.1.205","TCP","54","135 > 44212 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26944","12.440576","172.30.1.205","172.30.1.104","TCP","54","44212 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26945","12.440667","172.30.1.104","172.30.1.205","TCP","66","49671 > 36850 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26946","12.440675","172.30.1.205","172.30.1.104","TCP","54","36850 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26947","12.441054","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26948","12.441366","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26949","12.441386","172.30.1.205","172.30.1.104","TCP","54","36850 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26950","12.443252","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26951","12.443644","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26952","12.443650","172.30.1.205","172.30.1.104","TCP","54","36850 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26953","12.445025","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26954","12.447425","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26955","12.447434","172.30.1.205","172.30.1.104","TCP","54","36850 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26956","12.448361","172.30.1.205","172.30.1.104","TCP","74","44216 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915674 TSecr=0 WS=128" "26957","12.449043","172.30.1.104","172.30.1.205","TCP","66","135 > 44216 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26958","12.449054","172.30.1.205","172.30.1.104","TCP","54","44216 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26959","12.449411","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26960","12.449789","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26961","12.449798","172.30.1.205","172.30.1.104","TCP","54","44216 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26962","12.451970","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26963","12.452379","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26964","12.452385","172.30.1.205","172.30.1.104","TCP","54","44216 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26965","12.454200","172.30.1.205","172.30.1.104","TCP","54","44216 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26966","12.454314","172.30.1.205","172.30.1.104","TCP","74","36854 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915680 TSecr=0 WS=128" "26967","12.454500","172.30.1.104","172.30.1.205","TCP","54","135 > 44216 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26968","12.454534","172.30.1.104","172.30.1.205","TCP","54","135 > 44216 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26969","12.454539","172.30.1.205","172.30.1.104","TCP","54","44216 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26970","12.454615","172.30.1.104","172.30.1.205","TCP","66","49671 > 36854 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26971","12.454623","172.30.1.205","172.30.1.104","TCP","54","36854 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26972","12.454965","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26973","12.455273","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26974","12.455280","172.30.1.205","172.30.1.104","TCP","54","36854 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26975","12.457176","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "26976","12.457549","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "26977","12.457555","172.30.1.205","172.30.1.104","TCP","54","36854 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "26978","12.458893","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "26979","12.462450","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "26980","12.462460","172.30.1.205","172.30.1.104","TCP","54","36854 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "26981","12.463402","172.30.1.205","172.30.1.104","TCP","74","44220 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915689 TSecr=0 WS=128" "26982","12.463705","172.30.1.104","172.30.1.205","TCP","66","135 > 44220 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26983","12.463715","172.30.1.205","172.30.1.104","TCP","54","44220 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26984","12.464062","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "26985","12.464371","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26986","12.464379","172.30.1.205","172.30.1.104","TCP","54","44220 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "26987","12.466671","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "26988","12.467123","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "26989","12.467129","172.30.1.205","172.30.1.104","TCP","54","44220 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "26990","12.468981","172.30.1.205","172.30.1.104","TCP","54","44220 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "26991","12.469087","172.30.1.205","172.30.1.104","TCP","74","36858 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915695 TSecr=0 WS=128" "26992","12.469272","172.30.1.104","172.30.1.205","TCP","54","135 > 44220 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26993","12.469397","172.30.1.104","172.30.1.205","TCP","54","135 > 44220 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "26994","12.469402","172.30.1.205","172.30.1.104","TCP","54","44220 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "26995","12.469503","172.30.1.104","172.30.1.205","TCP","66","49671 > 36858 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "26996","12.469520","172.30.1.205","172.30.1.104","TCP","54","36858 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "26997","12.469940","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "26998","12.470271","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "26999","12.470280","172.30.1.205","172.30.1.104","TCP","54","36858 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27000","12.472208","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27001","12.472610","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27002","12.472617","172.30.1.205","172.30.1.104","TCP","54","36858 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27003","12.474014","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27004","12.476398","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27005","12.476409","172.30.1.205","172.30.1.104","TCP","54","36858 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27006","12.477390","172.30.1.205","172.30.1.104","TCP","74","44224 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915703 TSecr=0 WS=128" "27007","12.477682","172.30.1.104","172.30.1.205","TCP","66","135 > 44224 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27008","12.477697","172.30.1.205","172.30.1.104","TCP","54","44224 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27009","12.478079","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27010","12.478388","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27011","12.478397","172.30.1.205","172.30.1.104","TCP","54","44224 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27012","12.480597","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27013","12.481036","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27014","12.481043","172.30.1.205","172.30.1.104","TCP","54","44224 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27015","12.482851","172.30.1.205","172.30.1.104","TCP","54","44224 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27016","12.482963","172.30.1.205","172.30.1.104","TCP","74","36862 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915709 TSecr=0 WS=128" "27017","12.483155","172.30.1.104","172.30.1.205","TCP","54","135 > 44224 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27018","12.483190","172.30.1.104","172.30.1.205","TCP","54","135 > 44224 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27019","12.483196","172.30.1.205","172.30.1.104","TCP","54","44224 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27020","12.483313","172.30.1.104","172.30.1.205","TCP","66","49671 > 36862 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27021","12.483321","172.30.1.205","172.30.1.104","TCP","54","36862 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27022","12.483669","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27023","12.483968","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27024","12.483977","172.30.1.205","172.30.1.104","TCP","54","36862 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27025","12.485914","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27026","12.486349","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27027","12.486355","172.30.1.205","172.30.1.104","TCP","54","36862 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27028","12.487704","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27029","12.490104","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27030","12.490114","172.30.1.205","172.30.1.104","TCP","54","36862 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27031","12.491064","172.30.1.205","172.30.1.104","TCP","74","44228 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915717 TSecr=0 WS=128" "27032","12.491402","172.30.1.104","172.30.1.205","TCP","66","135 > 44228 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27033","12.491413","172.30.1.205","172.30.1.104","TCP","54","44228 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27034","12.491766","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27035","12.492064","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27036","12.492073","172.30.1.205","172.30.1.104","TCP","54","44228 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27037","12.494274","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27038","12.494715","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27039","12.494724","172.30.1.205","172.30.1.104","TCP","54","44228 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27040","12.496609","172.30.1.205","172.30.1.104","TCP","54","44228 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27041","12.496730","172.30.1.205","172.30.1.104","TCP","74","36866 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915723 TSecr=0 WS=128" "27042","12.496905","172.30.1.104","172.30.1.205","TCP","54","135 > 44228 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27043","12.496931","172.30.1.104","172.30.1.205","TCP","54","135 > 44228 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27044","12.496938","172.30.1.205","172.30.1.104","TCP","54","44228 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27045","12.497029","172.30.1.104","172.30.1.205","TCP","66","49671 > 36866 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27046","12.497038","172.30.1.205","172.30.1.104","TCP","54","36866 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27047","12.497408","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27048","12.497738","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27049","12.497746","172.30.1.205","172.30.1.104","TCP","54","36866 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27050","12.499614","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27051","12.500075","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27052","12.500081","172.30.1.205","172.30.1.104","TCP","54","36866 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27053","12.501463","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27054","12.503750","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27055","12.503762","172.30.1.205","172.30.1.104","TCP","54","36866 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27056","12.504728","172.30.1.205","172.30.1.104","TCP","74","44232 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915731 TSecr=0 WS=128" "27057","12.505020","172.30.1.104","172.30.1.205","TCP","66","135 > 44232 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27058","12.505031","172.30.1.205","172.30.1.104","TCP","54","44232 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27059","12.505389","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27060","12.505689","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27061","12.505698","172.30.1.205","172.30.1.104","TCP","54","44232 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27062","12.507877","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27063","12.508277","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27064","12.508289","172.30.1.205","172.30.1.104","TCP","54","44232 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27065","12.510342","172.30.1.205","172.30.1.104","TCP","54","44232 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27066","12.510452","172.30.1.205","172.30.1.104","TCP","74","36870 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915736 TSecr=0 WS=128" "27067","12.510609","172.30.1.104","172.30.1.205","TCP","54","135 > 44232 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27068","12.510644","172.30.1.104","172.30.1.205","TCP","54","135 > 44232 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27069","12.510649","172.30.1.205","172.30.1.104","TCP","54","44232 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27070","12.510754","172.30.1.104","172.30.1.205","TCP","66","49671 > 36870 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27071","12.510762","172.30.1.205","172.30.1.104","TCP","54","36870 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27072","12.511111","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27073","12.511907","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27074","12.511925","172.30.1.205","172.30.1.104","TCP","54","36870 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27075","12.514007","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27076","12.515974","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27077","12.515980","172.30.1.205","172.30.1.104","TCP","54","36870 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27078","12.517356","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27079","12.519751","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27080","12.519759","172.30.1.205","172.30.1.104","TCP","54","36870 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27081","12.520688","172.30.1.205","172.30.1.104","TCP","74","44236 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915747 TSecr=0 WS=128" "27082","12.520977","172.30.1.104","172.30.1.205","TCP","66","135 > 44236 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27083","12.520991","172.30.1.205","172.30.1.104","TCP","54","44236 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27084","12.521349","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27085","12.521748","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27086","12.521757","172.30.1.205","172.30.1.104","TCP","54","44236 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27087","12.523946","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27088","12.524356","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27089","12.524364","172.30.1.205","172.30.1.104","TCP","54","44236 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27090","12.526194","172.30.1.205","172.30.1.104","TCP","54","44236 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27091","12.526309","172.30.1.205","172.30.1.104","TCP","74","36874 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915752 TSecr=0 WS=128" "27092","12.526506","172.30.1.104","172.30.1.205","TCP","54","135 > 44236 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27093","12.526526","172.30.1.104","172.30.1.205","TCP","54","135 > 44236 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27094","12.526536","172.30.1.205","172.30.1.104","TCP","54","44236 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27095","12.526583","172.30.1.104","172.30.1.205","TCP","66","49671 > 36874 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27096","12.526599","172.30.1.205","172.30.1.104","TCP","54","36874 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27097","12.527148","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27098","12.527524","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27099","12.527533","172.30.1.205","172.30.1.104","TCP","54","36874 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27100","12.529437","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27101","12.529851","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27102","12.529857","172.30.1.205","172.30.1.104","TCP","54","36874 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27103","12.531195","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27104","12.533564","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27105","12.533574","172.30.1.205","172.30.1.104","TCP","54","36874 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27106","12.534509","172.30.1.205","172.30.1.104","TCP","74","44240 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915760 TSecr=0 WS=128" "27107","12.534802","172.30.1.104","172.30.1.205","TCP","66","135 > 44240 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27108","12.534812","172.30.1.205","172.30.1.104","TCP","54","44240 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27109","12.535160","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27110","12.535448","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27111","12.535458","172.30.1.205","172.30.1.104","TCP","54","44240 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27112","12.537667","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27113","12.538071","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27114","12.538077","172.30.1.205","172.30.1.104","TCP","54","44240 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27115","12.539893","172.30.1.205","172.30.1.104","TCP","54","44240 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27116","12.540006","172.30.1.205","172.30.1.104","TCP","74","36878 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915766 TSecr=0 WS=128" "27117","12.540166","172.30.1.104","172.30.1.205","TCP","54","135 > 44240 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27118","12.540198","172.30.1.104","172.30.1.205","TCP","54","135 > 44240 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27119","12.540204","172.30.1.205","172.30.1.104","TCP","54","44240 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27120","12.540271","172.30.1.104","172.30.1.205","TCP","66","49671 > 36878 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27121","12.540280","172.30.1.205","172.30.1.104","TCP","54","36878 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27122","12.540626","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27123","12.540936","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27124","12.540945","172.30.1.205","172.30.1.104","TCP","54","36878 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27125","12.542840","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27126","12.543240","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27127","12.543246","172.30.1.205","172.30.1.104","TCP","54","36878 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27128","12.544637","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27129","12.547090","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27130","12.547101","172.30.1.205","172.30.1.104","TCP","54","36878 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27131","12.548051","172.30.1.205","172.30.1.104","TCP","74","44244 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915774 TSecr=0 WS=128" "27132","12.548401","172.30.1.104","172.30.1.205","TCP","66","135 > 44244 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27133","12.548415","172.30.1.205","172.30.1.104","TCP","54","44244 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27134","12.548799","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27135","12.549106","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27136","12.549115","172.30.1.205","172.30.1.104","TCP","54","44244 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27137","12.551292","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27138","12.551706","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27139","12.551713","172.30.1.205","172.30.1.104","TCP","54","44244 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27140","12.553531","172.30.1.205","172.30.1.104","TCP","54","44244 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27141","12.553641","172.30.1.205","172.30.1.104","TCP","74","36882 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915780 TSecr=0 WS=128" "27142","12.553815","172.30.1.104","172.30.1.205","TCP","54","135 > 44244 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27143","12.553883","172.30.1.104","172.30.1.205","TCP","54","135 > 44244 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27144","12.553888","172.30.1.205","172.30.1.104","TCP","54","44244 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27145","12.553963","172.30.1.104","172.30.1.205","TCP","66","49671 > 36882 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27146","12.553971","172.30.1.205","172.30.1.104","TCP","54","36882 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27147","12.554319","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27148","12.554610","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27149","12.554617","172.30.1.205","172.30.1.104","TCP","54","36882 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27150","12.556470","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27151","12.556874","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27152","12.556881","172.30.1.205","172.30.1.104","TCP","54","36882 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27153","12.558231","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27154","12.560792","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27155","12.560801","172.30.1.205","172.30.1.104","TCP","54","36882 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27156","12.561738","172.30.1.205","172.30.1.104","TCP","74","44248 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915788 TSecr=0 WS=128" "27157","12.562051","172.30.1.104","172.30.1.205","TCP","66","135 > 44248 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27158","12.562062","172.30.1.205","172.30.1.104","TCP","54","44248 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27159","12.562409","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27160","12.562756","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27161","12.562765","172.30.1.205","172.30.1.104","TCP","54","44248 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27162","12.564949","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27163","12.565387","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27164","12.565394","172.30.1.205","172.30.1.104","TCP","54","44248 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27165","12.566236","172.30.1.205","172.30.1.104","TCP","54","36842 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27166","12.566283","172.30.1.205","172.30.1.104","TCP","54","36846 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27167","12.566330","172.30.1.205","172.30.1.104","TCP","54","36850 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27168","12.566363","172.30.1.205","172.30.1.104","TCP","54","36854 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27169","12.566395","172.30.1.205","172.30.1.104","TCP","54","36858 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27170","12.566427","172.30.1.205","172.30.1.104","TCP","54","36862 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27171","12.566458","172.30.1.205","172.30.1.104","TCP","54","36866 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27172","12.566485","172.30.1.205","172.30.1.104","TCP","54","36870 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27173","12.566511","172.30.1.205","172.30.1.104","TCP","54","36874 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27174","12.566541","172.30.1.205","172.30.1.104","TCP","54","36878 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27175","12.566563","172.30.1.205","172.30.1.104","TCP","54","36882 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27176","12.566634","172.30.1.205","172.30.1.104","TCP","54","36838 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27177","12.566924","172.30.1.104","172.30.1.205","TCP","54","49671 > 36842 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27178","12.566939","172.30.1.104","172.30.1.205","TCP","54","49671 > 36846 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27179","12.566967","172.30.1.104","172.30.1.205","TCP","54","49671 > 36842 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27180","12.566973","172.30.1.205","172.30.1.104","TCP","54","36842 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27181","12.566991","172.30.1.104","172.30.1.205","TCP","54","49671 > 36850 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27182","12.567038","172.30.1.104","172.30.1.205","TCP","54","49671 > 36854 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27183","12.567057","172.30.1.104","172.30.1.205","TCP","54","49671 > 36846 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27184","12.567060","172.30.1.205","172.30.1.104","TCP","54","36846 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27185","12.567080","172.30.1.104","172.30.1.205","TCP","54","49671 > 36858 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27186","12.567105","172.30.1.104","172.30.1.205","TCP","54","49671 > 36858 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27187","12.567108","172.30.1.205","172.30.1.104","TCP","54","36858 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27188","12.567148","172.30.1.104","172.30.1.205","TCP","54","49671 > 36862 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27189","12.567166","172.30.1.104","172.30.1.205","TCP","54","49671 > 36862 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27190","12.567169","172.30.1.205","172.30.1.104","TCP","54","36862 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27191","12.567211","172.30.1.104","172.30.1.205","TCP","54","49671 > 36866 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27192","12.567230","172.30.1.104","172.30.1.205","TCP","54","49671 > 36866 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27193","12.567234","172.30.1.205","172.30.1.104","TCP","54","36866 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27194","12.567256","172.30.1.104","172.30.1.205","TCP","54","49671 > 36850 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27195","12.567259","172.30.1.205","172.30.1.104","TCP","54","36850 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27196","12.567331","172.30.1.104","172.30.1.205","TCP","54","49671 > 36870 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27197","12.567350","172.30.1.104","172.30.1.205","TCP","54","49671 > 36854 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27198","12.567354","172.30.1.205","172.30.1.104","TCP","54","36854 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27199","12.567398","172.30.1.104","172.30.1.205","TCP","54","49671 > 36874 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27200","12.567419","172.30.1.104","172.30.1.205","TCP","54","49671 > 36870 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27201","12.567422","172.30.1.205","172.30.1.104","TCP","54","36870 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27202","12.567436","172.30.1.104","172.30.1.205","TCP","54","49671 > 36878 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27203","12.567502","172.30.1.104","172.30.1.205","TCP","54","49671 > 36882 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27204","12.567519","172.30.1.104","172.30.1.205","TCP","54","49671 > 36874 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27205","12.567531","172.30.1.205","172.30.1.104","TCP","54","36874 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27206","12.567551","172.30.1.104","172.30.1.205","TCP","54","49671 > 36878 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27207","12.567554","172.30.1.205","172.30.1.104","TCP","54","36878 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27208","12.567986","172.30.1.104","172.30.1.205","TCP","54","49671 > 36838 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27209","12.568003","172.30.1.104","172.30.1.205","TCP","54","49671 > 36882 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27210","12.568008","172.30.1.205","172.30.1.104","TCP","54","36882 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27211","12.568031","172.30.1.104","172.30.1.205","TCP","54","49671 > 36838 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27212","12.568033","172.30.1.205","172.30.1.104","TCP","54","36838 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27213","12.568218","172.30.1.205","172.30.1.104","TCP","54","44248 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27214","12.568334","172.30.1.205","172.30.1.104","TCP","74","36886 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915794 TSecr=0 WS=128" "27215","12.568477","172.30.1.104","172.30.1.205","TCP","54","135 > 44248 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27216","12.568514","172.30.1.104","172.30.1.205","TCP","54","135 > 44248 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27217","12.568518","172.30.1.205","172.30.1.104","TCP","54","44248 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27218","12.568593","172.30.1.104","172.30.1.205","TCP","66","49671 > 36886 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27219","12.568601","172.30.1.205","172.30.1.104","TCP","54","36886 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27220","12.568983","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27221","12.569275","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27222","12.569283","172.30.1.205","172.30.1.104","TCP","54","36886 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27223","12.571134","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27224","12.571554","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27225","12.571560","172.30.1.205","172.30.1.104","TCP","54","36886 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27226","12.572925","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27227","12.575361","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27228","12.575379","172.30.1.205","172.30.1.104","TCP","54","36886 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27229","12.576500","172.30.1.205","172.30.1.104","TCP","74","44252 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915802 TSecr=0 WS=128" "27230","12.576804","172.30.1.104","172.30.1.205","TCP","66","135 > 44252 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27231","12.576815","172.30.1.205","172.30.1.104","TCP","54","44252 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27232","12.577171","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27233","12.577480","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27234","12.577489","172.30.1.205","172.30.1.104","TCP","54","44252 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27235","12.579682","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27236","12.580073","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27237","12.580080","172.30.1.205","172.30.1.104","TCP","54","44252 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27238","12.581942","172.30.1.205","172.30.1.104","TCP","54","44252 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27239","12.582052","172.30.1.205","172.30.1.104","TCP","74","36890 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915808 TSecr=0 WS=128" "27240","12.582235","172.30.1.104","172.30.1.205","TCP","54","135 > 44252 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27241","12.582268","172.30.1.104","172.30.1.205","TCP","54","135 > 44252 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27242","12.582274","172.30.1.205","172.30.1.104","TCP","54","44252 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27243","12.582345","172.30.1.104","172.30.1.205","TCP","66","49671 > 36890 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27244","12.582353","172.30.1.205","172.30.1.104","TCP","54","36890 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27245","12.582691","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27246","12.582993","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27247","12.583001","172.30.1.205","172.30.1.104","TCP","54","36890 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27248","12.584898","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27249","12.585271","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27250","12.585277","172.30.1.205","172.30.1.104","TCP","54","36890 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27251","12.586611","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27252","12.589508","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27253","12.589520","172.30.1.205","172.30.1.104","TCP","54","36890 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27254","12.590540","172.30.1.205","172.30.1.104","TCP","74","44256 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915816 TSecr=0 WS=128" "27255","12.590866","172.30.1.104","172.30.1.205","TCP","66","135 > 44256 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27256","12.590877","172.30.1.205","172.30.1.104","TCP","54","44256 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27257","12.591234","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27258","12.591566","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27259","12.591584","172.30.1.205","172.30.1.104","TCP","54","44256 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27260","12.594145","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27261","12.594541","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27262","12.594547","172.30.1.205","172.30.1.104","TCP","54","44256 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27263","12.596368","172.30.1.205","172.30.1.104","TCP","54","44256 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27264","12.596480","172.30.1.205","172.30.1.104","TCP","74","36894 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915822 TSecr=0 WS=128" "27265","12.596685","172.30.1.104","172.30.1.205","TCP","54","135 > 44256 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27266","12.596767","172.30.1.104","172.30.1.205","TCP","66","49671 > 36894 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27267","12.596787","172.30.1.205","172.30.1.104","TCP","54","36894 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27268","12.596797","172.30.1.104","172.30.1.205","TCP","54","135 > 44256 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27269","12.596805","172.30.1.205","172.30.1.104","TCP","54","44256 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27270","12.597162","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27271","12.597482","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27272","12.597491","172.30.1.205","172.30.1.104","TCP","54","36894 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27273","12.599370","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27274","12.599753","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27275","12.599759","172.30.1.205","172.30.1.104","TCP","54","36894 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27276","12.601152","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27277","12.603494","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27278","12.603504","172.30.1.205","172.30.1.104","TCP","54","36894 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27279","12.604440","172.30.1.205","172.30.1.104","TCP","74","44260 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915830 TSecr=0 WS=128" "27280","12.604770","172.30.1.104","172.30.1.205","TCP","66","135 > 44260 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27281","12.604790","172.30.1.205","172.30.1.104","TCP","54","44260 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27282","12.605153","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27283","12.605473","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27284","12.605483","172.30.1.205","172.30.1.104","TCP","54","44260 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27285","12.607675","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27286","12.608097","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27287","12.608103","172.30.1.205","172.30.1.104","TCP","54","44260 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27288","12.610006","172.30.1.205","172.30.1.104","TCP","54","44260 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27289","12.610117","172.30.1.205","172.30.1.104","TCP","74","36898 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915836 TSecr=0 WS=128" "27290","12.610290","172.30.1.104","172.30.1.205","TCP","54","135 > 44260 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27291","12.610348","172.30.1.104","172.30.1.205","TCP","54","135 > 44260 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27292","12.610354","172.30.1.205","172.30.1.104","TCP","54","44260 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27293","12.610435","172.30.1.104","172.30.1.205","TCP","66","49671 > 36898 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27294","12.610443","172.30.1.205","172.30.1.104","TCP","54","36898 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27295","12.610791","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27296","12.611117","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27297","12.611126","172.30.1.205","172.30.1.104","TCP","54","36898 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27298","12.613042","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27299","12.613437","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27300","12.613443","172.30.1.205","172.30.1.104","TCP","54","36898 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27301","12.614795","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27302","12.617136","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27303","12.617147","172.30.1.205","172.30.1.104","TCP","54","36898 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27304","12.618105","172.30.1.205","172.30.1.104","TCP","74","44264 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915844 TSecr=0 WS=128" "27305","12.618389","172.30.1.104","172.30.1.205","TCP","66","135 > 44264 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27306","12.618401","172.30.1.205","172.30.1.104","TCP","54","44264 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27307","12.618765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27308","12.619095","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27309","12.619113","172.30.1.205","172.30.1.104","TCP","54","44264 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27310","12.621461","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27311","12.621905","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27312","12.621912","172.30.1.205","172.30.1.104","TCP","54","44264 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27313","12.623754","172.30.1.205","172.30.1.104","TCP","54","44264 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27314","12.623863","172.30.1.205","172.30.1.104","TCP","74","36902 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915850 TSecr=0 WS=128" "27315","12.624030","172.30.1.104","172.30.1.205","TCP","54","135 > 44264 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27316","12.624061","172.30.1.104","172.30.1.205","TCP","54","135 > 44264 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27317","12.624067","172.30.1.205","172.30.1.104","TCP","54","44264 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27318","12.624139","172.30.1.104","172.30.1.205","TCP","66","49671 > 36902 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27319","12.624147","172.30.1.205","172.30.1.104","TCP","54","36902 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27320","12.624505","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27321","12.624821","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27322","12.624829","172.30.1.205","172.30.1.104","TCP","54","36902 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27323","12.626709","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27324","12.627140","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27325","12.627147","172.30.1.205","172.30.1.104","TCP","54","36902 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27326","12.628495","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27327","12.630871","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27328","12.630880","172.30.1.205","172.30.1.104","TCP","54","36902 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27329","12.631817","172.30.1.205","172.30.1.104","TCP","74","44268 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915858 TSecr=0 WS=128" "27330","12.632122","172.30.1.104","172.30.1.205","TCP","66","135 > 44268 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27331","12.632133","172.30.1.205","172.30.1.104","TCP","54","44268 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27332","12.632481","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27333","12.632792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27334","12.632802","172.30.1.205","172.30.1.104","TCP","54","44268 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27335","12.634998","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27336","12.635432","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27337","12.635439","172.30.1.205","172.30.1.104","TCP","54","44268 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27338","12.637276","172.30.1.205","172.30.1.104","TCP","54","44268 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27339","12.637398","172.30.1.205","172.30.1.104","TCP","74","36906 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915863 TSecr=0 WS=128" "27340","12.637562","172.30.1.104","172.30.1.205","TCP","54","135 > 44268 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27341","12.637604","172.30.1.104","172.30.1.205","TCP","54","135 > 44268 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27342","12.637610","172.30.1.205","172.30.1.104","TCP","54","44268 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27343","12.637697","172.30.1.104","172.30.1.205","TCP","66","49671 > 36906 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27344","12.637705","172.30.1.205","172.30.1.104","TCP","54","36906 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27345","12.638057","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27346","12.638389","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27347","12.638406","172.30.1.205","172.30.1.104","TCP","54","36906 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27348","12.640501","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27349","12.642588","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27350","12.642596","172.30.1.205","172.30.1.104","TCP","54","36906 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27351","12.643974","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27352","12.646391","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27353","12.646401","172.30.1.205","172.30.1.104","TCP","54","36906 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27354","12.647340","172.30.1.205","172.30.1.104","TCP","74","44272 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915873 TSecr=0 WS=128" "27355","12.647636","172.30.1.104","172.30.1.205","TCP","66","135 > 44272 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27356","12.647647","172.30.1.205","172.30.1.104","TCP","54","44272 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27357","12.647993","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27358","12.648303","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27359","12.648312","172.30.1.205","172.30.1.104","TCP","54","44272 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27360","12.650534","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27361","12.650959","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27362","12.650965","172.30.1.205","172.30.1.104","TCP","54","44272 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27363","12.652773","172.30.1.205","172.30.1.104","TCP","54","44272 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27364","12.652896","172.30.1.205","172.30.1.104","TCP","74","36910 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915879 TSecr=0 WS=128" "27365","12.653075","172.30.1.104","172.30.1.205","TCP","54","135 > 44272 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27366","12.653106","172.30.1.104","172.30.1.205","TCP","54","135 > 44272 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27367","12.653112","172.30.1.205","172.30.1.104","TCP","54","44272 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27368","12.653200","172.30.1.104","172.30.1.205","TCP","66","49671 > 36910 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27369","12.653208","172.30.1.205","172.30.1.104","TCP","54","36910 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27370","12.653556","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27371","12.653850","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27372","12.653859","172.30.1.205","172.30.1.104","TCP","54","36910 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27373","12.655737","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27374","12.656147","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27375","12.656152","172.30.1.205","172.30.1.104","TCP","54","36910 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27376","12.657533","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27377","12.659952","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27378","12.659963","172.30.1.205","172.30.1.104","TCP","54","36910 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27379","12.660930","172.30.1.205","172.30.1.104","TCP","74","44276 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915887 TSecr=0 WS=128" "27380","12.661296","172.30.1.104","172.30.1.205","TCP","66","135 > 44276 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27381","12.661307","172.30.1.205","172.30.1.104","TCP","54","44276 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27382","12.661655","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27383","12.661961","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27384","12.661970","172.30.1.205","172.30.1.104","TCP","54","44276 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27385","12.664152","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27386","12.664610","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27387","12.664617","172.30.1.205","172.30.1.104","TCP","54","44276 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27388","12.666445","172.30.1.205","172.30.1.104","TCP","54","44276 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27389","12.666563","172.30.1.205","172.30.1.104","TCP","74","36914 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915892 TSecr=0 WS=128" "27390","12.666723","172.30.1.104","172.30.1.205","TCP","54","135 > 44276 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27391","12.666756","172.30.1.104","172.30.1.205","TCP","54","135 > 44276 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27392","12.666761","172.30.1.205","172.30.1.104","TCP","54","44276 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27393","12.666836","172.30.1.104","172.30.1.205","TCP","66","49671 > 36914 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27394","12.666844","172.30.1.205","172.30.1.104","TCP","54","36914 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27395","12.667190","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27396","12.667529","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27397","12.667536","172.30.1.205","172.30.1.104","TCP","54","36914 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27398","12.669422","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27399","12.669796","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27400","12.669803","172.30.1.205","172.30.1.104","TCP","54","36914 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27401","12.671150","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27402","12.673506","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27403","12.673515","172.30.1.205","172.30.1.104","TCP","54","36914 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27404","12.674468","172.30.1.205","172.30.1.104","TCP","74","44280 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915900 TSecr=0 WS=128" "27405","12.674815","172.30.1.104","172.30.1.205","TCP","66","135 > 44280 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27406","12.674826","172.30.1.205","172.30.1.104","TCP","54","44280 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27407","12.675175","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27408","12.675490","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27409","12.675500","172.30.1.205","172.30.1.104","TCP","54","44280 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27410","12.677698","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27411","12.678126","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27412","12.678133","172.30.1.205","172.30.1.104","TCP","54","44280 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27413","12.679941","172.30.1.205","172.30.1.104","TCP","54","44280 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27414","12.680051","172.30.1.205","172.30.1.104","TCP","74","36918 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915906 TSecr=0 WS=128" "27415","12.680232","172.30.1.104","172.30.1.205","TCP","54","135 > 44280 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27416","12.680243","172.30.1.104","172.30.1.205","TCP","54","135 > 44280 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27417","12.680249","172.30.1.205","172.30.1.104","TCP","54","44280 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27418","12.680355","172.30.1.104","172.30.1.205","TCP","66","49671 > 36918 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27419","12.680363","172.30.1.205","172.30.1.104","TCP","54","36918 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27420","12.680708","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27421","12.681021","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27422","12.681031","172.30.1.205","172.30.1.104","TCP","54","36918 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27423","12.682895","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27424","12.683900","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27425","12.683907","172.30.1.205","172.30.1.104","TCP","54","36918 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27426","12.685281","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27427","12.687780","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27428","12.687798","172.30.1.205","172.30.1.104","TCP","54","36918 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27429","12.688845","172.30.1.205","172.30.1.104","TCP","74","44284 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915915 TSecr=0 WS=128" "27430","12.689162","172.30.1.104","172.30.1.205","TCP","66","135 > 44284 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27431","12.689173","172.30.1.205","172.30.1.104","TCP","54","44284 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27432","12.689523","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27433","12.689842","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27434","12.689851","172.30.1.205","172.30.1.104","TCP","54","44284 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27435","12.692026","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27436","12.692515","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27437","12.692522","172.30.1.205","172.30.1.104","TCP","54","44284 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27438","12.694345","172.30.1.205","172.30.1.104","TCP","54","44284 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27439","12.694456","172.30.1.205","172.30.1.104","TCP","74","36922 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915920 TSecr=0 WS=128" "27440","12.694639","172.30.1.104","172.30.1.205","TCP","54","135 > 44284 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27441","12.694702","172.30.1.104","172.30.1.205","TCP","54","135 > 44284 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27442","12.694707","172.30.1.205","172.30.1.104","TCP","54","44284 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27443","12.694791","172.30.1.104","172.30.1.205","TCP","66","49671 > 36922 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27444","12.694799","172.30.1.205","172.30.1.104","TCP","54","36922 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27445","12.695144","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27446","12.696209","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27447","12.696217","172.30.1.205","172.30.1.104","TCP","54","36922 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27448","12.698100","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27449","12.698488","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27450","12.698495","172.30.1.205","172.30.1.104","TCP","54","36922 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27451","12.699840","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27452","12.702213","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27453","12.702222","172.30.1.205","172.30.1.104","TCP","54","36922 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27454","12.703153","172.30.1.205","172.30.1.104","TCP","74","44288 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915929 TSecr=0 WS=128" "27455","12.703449","172.30.1.104","172.30.1.205","TCP","66","135 > 44288 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27456","12.703459","172.30.1.205","172.30.1.104","TCP","54","44288 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27457","12.703837","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27458","12.704135","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27459","12.704144","172.30.1.205","172.30.1.104","TCP","54","44288 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27460","12.706358","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27461","12.706756","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27462","12.706762","172.30.1.205","172.30.1.104","TCP","54","44288 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27463","12.708567","172.30.1.205","172.30.1.104","TCP","54","44288 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27464","12.708678","172.30.1.205","172.30.1.104","TCP","74","36926 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915935 TSecr=0 WS=128" "27465","12.708887","172.30.1.104","172.30.1.205","TCP","54","135 > 44288 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27466","12.708916","172.30.1.104","172.30.1.205","TCP","54","135 > 44288 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27467","12.708922","172.30.1.205","172.30.1.104","TCP","54","44288 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27468","12.709015","172.30.1.104","172.30.1.205","TCP","66","49671 > 36926 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27469","12.709023","172.30.1.205","172.30.1.104","TCP","54","36926 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27470","12.709398","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27471","12.709705","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27472","12.709714","172.30.1.205","172.30.1.104","TCP","54","36926 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27473","12.711584","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27474","12.711965","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27475","12.711971","172.30.1.205","172.30.1.104","TCP","54","36926 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27476","12.713350","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27477","12.715800","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27478","12.715809","172.30.1.205","172.30.1.104","TCP","54","36926 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27479","12.716731","172.30.1.205","172.30.1.104","TCP","74","44292 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915943 TSecr=0 WS=128" "27480","12.717087","172.30.1.104","172.30.1.205","TCP","66","135 > 44292 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27481","12.717098","172.30.1.205","172.30.1.104","TCP","54","44292 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27482","12.717458","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27483","12.717917","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27484","12.717935","172.30.1.205","172.30.1.104","TCP","54","44292 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27485","12.720326","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27486","12.720727","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27487","12.720734","172.30.1.205","172.30.1.104","TCP","54","44292 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27488","12.722544","172.30.1.205","172.30.1.104","TCP","54","44292 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27489","12.722655","172.30.1.205","172.30.1.104","TCP","74","36930 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915949 TSecr=0 WS=128" "27490","12.722820","172.30.1.104","172.30.1.205","TCP","54","135 > 44292 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27491","12.722888","172.30.1.104","172.30.1.205","TCP","54","135 > 44292 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27492","12.722894","172.30.1.205","172.30.1.104","TCP","54","44292 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27493","12.722993","172.30.1.104","172.30.1.205","TCP","66","49671 > 36930 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27494","12.723002","172.30.1.205","172.30.1.104","TCP","54","36930 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27495","12.723347","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27496","12.723650","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27497","12.723666","172.30.1.205","172.30.1.104","TCP","54","36930 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27498","12.725765","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27499","12.726131","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27500","12.726137","172.30.1.205","172.30.1.104","TCP","54","36930 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27501","12.727479","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27502","12.729880","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27503","12.729890","172.30.1.205","172.30.1.104","TCP","54","36930 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27504","12.730832","172.30.1.205","172.30.1.104","TCP","74","44296 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915957 TSecr=0 WS=128" "27505","12.731157","172.30.1.104","172.30.1.205","TCP","66","135 > 44296 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27506","12.731168","172.30.1.205","172.30.1.104","TCP","54","44296 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27507","12.731533","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27508","12.731834","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27509","12.731843","172.30.1.205","172.30.1.104","TCP","54","44296 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27510","12.734051","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27511","12.734445","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27512","12.734451","172.30.1.205","172.30.1.104","TCP","54","44296 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27513","12.735299","172.30.1.205","172.30.1.104","TCP","54","36890 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27514","12.735349","172.30.1.205","172.30.1.104","TCP","54","36894 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27515","12.735386","172.30.1.205","172.30.1.104","TCP","54","36898 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27516","12.735418","172.30.1.205","172.30.1.104","TCP","54","36902 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27517","12.735452","172.30.1.205","172.30.1.104","TCP","54","36906 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27518","12.735480","172.30.1.205","172.30.1.104","TCP","54","36910 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27519","12.735517","172.30.1.205","172.30.1.104","TCP","54","36914 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27520","12.735552","172.30.1.205","172.30.1.104","TCP","54","36918 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27521","12.735579","172.30.1.205","172.30.1.104","TCP","54","36922 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27522","12.735612","172.30.1.205","172.30.1.104","TCP","54","36926 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27523","12.735639","172.30.1.205","172.30.1.104","TCP","54","36930 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27524","12.735715","172.30.1.205","172.30.1.104","TCP","54","36886 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27525","12.735948","172.30.1.104","172.30.1.205","TCP","54","49671 > 36890 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27526","12.735958","172.30.1.104","172.30.1.205","TCP","54","49671 > 36894 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27527","12.735961","172.30.1.104","172.30.1.205","TCP","54","49671 > 36890 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27528","12.735967","172.30.1.205","172.30.1.104","TCP","54","36890 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27529","12.736087","172.30.1.104","172.30.1.205","TCP","54","49671 > 36898 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27530","12.736094","172.30.1.104","172.30.1.205","TCP","54","49671 > 36902 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27531","12.736097","172.30.1.104","172.30.1.205","TCP","54","49671 > 36902 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27532","12.736102","172.30.1.205","172.30.1.104","TCP","54","36902 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27533","12.736274","172.30.1.104","172.30.1.205","TCP","54","49671 > 36894 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27534","12.736279","172.30.1.205","172.30.1.104","TCP","54","36894 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27535","12.736285","172.30.1.104","172.30.1.205","TCP","54","49671 > 36910 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27536","12.736290","172.30.1.104","172.30.1.205","TCP","54","49671 > 36906 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27537","12.736294","172.30.1.104","172.30.1.205","TCP","54","49671 > 36914 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27538","12.736296","172.30.1.104","172.30.1.205","TCP","54","49671 > 36914 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27539","12.736298","172.30.1.205","172.30.1.104","TCP","54","36914 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27540","12.736300","172.30.1.104","172.30.1.205","TCP","54","49671 > 36906 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27541","12.736302","172.30.1.205","172.30.1.104","TCP","54","36906 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27542","12.736303","172.30.1.104","172.30.1.205","TCP","54","49671 > 36918 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27543","12.736453","172.30.1.104","172.30.1.205","TCP","54","49671 > 36918 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27544","12.736456","172.30.1.205","172.30.1.104","TCP","54","36918 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27545","12.736462","172.30.1.104","172.30.1.205","TCP","54","49671 > 36922 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27546","12.736467","172.30.1.104","172.30.1.205","TCP","54","49671 > 36922 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27547","12.736472","172.30.1.205","172.30.1.104","TCP","54","36922 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27548","12.736474","172.30.1.104","172.30.1.205","TCP","54","49671 > 36926 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27549","12.736476","172.30.1.104","172.30.1.205","TCP","54","49671 > 36898 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27550","12.736479","172.30.1.205","172.30.1.104","TCP","54","36898 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27551","12.736820","172.30.1.104","172.30.1.205","TCP","54","49671 > 36930 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27552","12.736827","172.30.1.104","172.30.1.205","TCP","54","49671 > 36930 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27553","12.736833","172.30.1.205","172.30.1.104","TCP","54","36930 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27554","12.736838","172.30.1.104","172.30.1.205","TCP","54","49671 > 36910 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27555","12.736840","172.30.1.205","172.30.1.104","TCP","54","36910 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27556","12.736912","172.30.1.104","172.30.1.205","TCP","54","49671 > 36926 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27557","12.736917","172.30.1.205","172.30.1.104","TCP","54","36926 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27558","12.736925","172.30.1.104","172.30.1.205","TCP","54","49671 > 36886 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27559","12.736934","172.30.1.104","172.30.1.205","TCP","54","49671 > 36886 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27560","12.736936","172.30.1.205","172.30.1.104","TCP","54","36886 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27561","12.737291","172.30.1.205","172.30.1.104","TCP","54","44296 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27562","12.737416","172.30.1.205","172.30.1.104","TCP","74","36934 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915963 TSecr=0 WS=128" "27563","12.737600","172.30.1.104","172.30.1.205","TCP","54","135 > 44296 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27564","12.737607","172.30.1.104","172.30.1.205","TCP","54","135 > 44296 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27565","12.737612","172.30.1.205","172.30.1.104","TCP","54","44296 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27566","12.737685","172.30.1.104","172.30.1.205","TCP","66","49671 > 36934 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27567","12.737694","172.30.1.205","172.30.1.104","TCP","54","36934 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27568","12.738049","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27569","12.738424","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27570","12.738433","172.30.1.205","172.30.1.104","TCP","54","36934 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27571","12.740315","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27572","12.740720","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27573","12.740727","172.30.1.205","172.30.1.104","TCP","54","36934 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27574","12.742118","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27575","12.744510","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27576","12.744520","172.30.1.205","172.30.1.104","TCP","54","36934 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27577","12.745497","172.30.1.205","172.30.1.104","TCP","74","44300 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915971 TSecr=0 WS=128" "27578","12.745792","172.30.1.104","172.30.1.205","TCP","66","135 > 44300 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27579","12.745802","172.30.1.205","172.30.1.104","TCP","54","44300 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27580","12.746155","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27581","12.746464","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27582","12.746475","172.30.1.205","172.30.1.104","TCP","54","44300 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27583","12.748665","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27584","12.749053","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27585","12.749060","172.30.1.205","172.30.1.104","TCP","54","44300 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27586","12.750884","172.30.1.205","172.30.1.104","TCP","54","44300 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27587","12.751034","172.30.1.205","172.30.1.104","TCP","74","36938 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915977 TSecr=0 WS=128" "27588","12.751162","172.30.1.104","172.30.1.205","TCP","54","135 > 44300 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27589","12.751195","172.30.1.104","172.30.1.205","TCP","54","135 > 44300 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27590","12.751201","172.30.1.205","172.30.1.104","TCP","54","44300 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27591","12.751276","172.30.1.104","172.30.1.205","TCP","66","49671 > 36938 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27592","12.751285","172.30.1.205","172.30.1.104","TCP","54","36938 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27593","12.751632","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27594","12.751923","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27595","12.751932","172.30.1.205","172.30.1.104","TCP","54","36938 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27596","12.753861","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27597","12.754284","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27598","12.754290","172.30.1.205","172.30.1.104","TCP","54","36938 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27599","12.755646","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27600","12.757965","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27601","12.757978","172.30.1.205","172.30.1.104","TCP","54","36938 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27602","12.758998","172.30.1.205","172.30.1.104","TCP","74","44304 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915985 TSecr=0 WS=128" "27603","12.759319","172.30.1.104","172.30.1.205","TCP","66","135 > 44304 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27604","12.759330","172.30.1.205","172.30.1.104","TCP","54","44304 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27605","12.759689","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27606","12.759983","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27607","12.760001","172.30.1.205","172.30.1.104","TCP","54","44304 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27608","12.762471","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27609","12.762886","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27610","12.762896","172.30.1.205","172.30.1.104","TCP","54","44304 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27611","12.764816","172.30.1.205","172.30.1.104","TCP","54","44304 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27612","12.764948","172.30.1.205","172.30.1.104","TCP","74","36942 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915991 TSecr=0 WS=128" "27613","12.765176","172.30.1.104","172.30.1.205","TCP","54","135 > 44304 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27614","12.765186","172.30.1.104","172.30.1.205","TCP","54","135 > 44304 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27615","12.765192","172.30.1.205","172.30.1.104","TCP","54","44304 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27616","12.765273","172.30.1.104","172.30.1.205","TCP","66","49671 > 36942 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27617","12.765282","172.30.1.205","172.30.1.104","TCP","54","36942 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27618","12.765636","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27619","12.765955","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27620","12.765962","172.30.1.205","172.30.1.104","TCP","54","36942 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27621","12.767857","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27622","12.768242","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27623","12.768254","172.30.1.205","172.30.1.104","TCP","54","36942 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27624","12.769799","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27625","12.772141","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27626","12.772151","172.30.1.205","172.30.1.104","TCP","54","36942 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27627","12.773116","172.30.1.205","172.30.1.104","TCP","74","44308 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499915999 TSecr=0 WS=128" "27628","12.773404","172.30.1.104","172.30.1.205","TCP","66","135 > 44308 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27629","12.773415","172.30.1.205","172.30.1.104","TCP","54","44308 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27630","12.773766","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27631","12.774083","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27632","12.774092","172.30.1.205","172.30.1.104","TCP","54","44308 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27633","12.776286","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27634","12.776669","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27635","12.776675","172.30.1.205","172.30.1.104","TCP","54","44308 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27636","12.778520","172.30.1.205","172.30.1.104","TCP","54","44308 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27637","12.778632","172.30.1.205","172.30.1.104","TCP","74","36946 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916005 TSecr=0 WS=128" "27638","12.778819","172.30.1.104","172.30.1.205","TCP","54","135 > 44308 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27639","12.778836","172.30.1.104","172.30.1.205","TCP","54","135 > 44308 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27640","12.778845","172.30.1.205","172.30.1.104","TCP","54","44308 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27641","12.778945","172.30.1.104","172.30.1.205","TCP","66","49671 > 36946 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27642","12.778962","172.30.1.205","172.30.1.104","TCP","54","36946 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27643","12.779498","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27644","12.779786","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27645","12.779795","172.30.1.205","172.30.1.104","TCP","54","36946 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27646","12.781747","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27647","12.782115","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27648","12.782121","172.30.1.205","172.30.1.104","TCP","54","36946 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27649","12.783497","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27650","12.785942","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27651","12.785952","172.30.1.205","172.30.1.104","TCP","54","36946 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27652","12.786902","172.30.1.205","172.30.1.104","TCP","74","44312 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916013 TSecr=0 WS=128" "27653","12.787221","172.30.1.104","172.30.1.205","TCP","66","135 > 44312 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27654","12.787232","172.30.1.205","172.30.1.104","TCP","54","44312 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27655","12.787601","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27656","12.787890","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27657","12.787899","172.30.1.205","172.30.1.104","TCP","54","44312 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27658","12.790208","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27659","12.790630","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27660","12.790637","172.30.1.205","172.30.1.104","TCP","54","44312 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27661","12.792465","172.30.1.205","172.30.1.104","TCP","54","44312 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27662","12.792577","172.30.1.205","172.30.1.104","TCP","74","36950 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916019 TSecr=0 WS=128" "27663","12.792730","172.30.1.104","172.30.1.205","TCP","54","135 > 44312 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27664","12.792771","172.30.1.104","172.30.1.205","TCP","54","135 > 44312 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27665","12.792788","172.30.1.205","172.30.1.104","TCP","54","44312 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27666","12.792885","172.30.1.104","172.30.1.205","TCP","66","49671 > 36950 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27667","12.792894","172.30.1.205","172.30.1.104","TCP","54","36950 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27668","12.793242","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27669","12.793538","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27670","12.793547","172.30.1.205","172.30.1.104","TCP","54","36950 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27671","12.795434","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27672","12.795851","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27673","12.795857","172.30.1.205","172.30.1.104","TCP","54","36950 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27674","12.797241","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27675","12.799708","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27676","12.799718","172.30.1.205","172.30.1.104","TCP","54","36950 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27677","12.800651","172.30.1.205","172.30.1.104","TCP","74","44316 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916027 TSecr=0 WS=128" "27678","12.800966","172.30.1.104","172.30.1.205","TCP","66","135 > 44316 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27679","12.800977","172.30.1.205","172.30.1.104","TCP","54","44316 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27680","12.801340","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27681","12.801628","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27682","12.801637","172.30.1.205","172.30.1.104","TCP","54","44316 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27683","12.803844","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27684","12.804255","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27685","12.804262","172.30.1.205","172.30.1.104","TCP","54","44316 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27686","12.806121","172.30.1.205","172.30.1.104","TCP","54","44316 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27687","12.806237","172.30.1.205","172.30.1.104","TCP","74","36954 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916032 TSecr=0 WS=128" "27688","12.806396","172.30.1.104","172.30.1.205","TCP","54","135 > 44316 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27689","12.806416","172.30.1.104","172.30.1.205","TCP","54","135 > 44316 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27690","12.806427","172.30.1.205","172.30.1.104","TCP","54","44316 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27691","12.806526","172.30.1.104","172.30.1.205","TCP","66","49671 > 36954 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27692","12.806542","172.30.1.205","172.30.1.104","TCP","54","36954 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27693","12.807083","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27694","12.807427","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27695","12.807435","172.30.1.205","172.30.1.104","TCP","54","36954 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27696","12.809339","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27697","12.809749","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27698","12.809755","172.30.1.205","172.30.1.104","TCP","54","36954 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27699","12.811113","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27700","12.813579","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27701","12.813598","172.30.1.205","172.30.1.104","TCP","54","36954 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27702","12.814664","172.30.1.205","172.30.1.104","TCP","74","44320 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916041 TSecr=0 WS=128" "27703","12.814990","172.30.1.104","172.30.1.205","TCP","66","135 > 44320 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27704","12.815001","172.30.1.205","172.30.1.104","TCP","54","44320 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27705","12.815352","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27706","12.815635","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27707","12.815644","172.30.1.205","172.30.1.104","TCP","54","44320 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27708","12.817866","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27709","12.818257","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27710","12.818264","172.30.1.205","172.30.1.104","TCP","54","44320 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27711","12.820080","172.30.1.205","172.30.1.104","TCP","54","44320 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27712","12.820192","172.30.1.205","172.30.1.104","TCP","74","36958 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916046 TSecr=0 WS=128" "27713","12.820364","172.30.1.104","172.30.1.205","TCP","54","135 > 44320 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27714","12.820429","172.30.1.104","172.30.1.205","TCP","54","135 > 44320 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27715","12.820435","172.30.1.205","172.30.1.104","TCP","54","44320 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27716","12.820496","172.30.1.104","172.30.1.205","TCP","66","49671 > 36958 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27717","12.820504","172.30.1.205","172.30.1.104","TCP","54","36958 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27718","12.820896","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27719","12.821217","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27720","12.821225","172.30.1.205","172.30.1.104","TCP","54","36958 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27721","12.823099","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27722","12.823488","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27723","12.823495","172.30.1.205","172.30.1.104","TCP","54","36958 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27724","12.824876","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27725","12.827266","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27726","12.827276","172.30.1.205","172.30.1.104","TCP","54","36958 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27727","12.828211","172.30.1.205","172.30.1.104","TCP","74","44324 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916054 TSecr=0 WS=128" "27728","12.828503","172.30.1.104","172.30.1.205","TCP","66","135 > 44324 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27729","12.828513","172.30.1.205","172.30.1.104","TCP","54","44324 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27730","12.828893","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27731","12.829190","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27732","12.829199","172.30.1.205","172.30.1.104","TCP","54","44324 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27733","12.831417","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27734","12.831814","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27735","12.831821","172.30.1.205","172.30.1.104","TCP","54","44324 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27736","12.833693","172.30.1.205","172.30.1.104","TCP","54","44324 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27737","12.833803","172.30.1.205","172.30.1.104","TCP","74","36962 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916060 TSecr=0 WS=128" "27738","12.833980","172.30.1.104","172.30.1.205","TCP","54","135 > 44324 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27739","12.834013","172.30.1.104","172.30.1.205","TCP","54","135 > 44324 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27740","12.834018","172.30.1.205","172.30.1.104","TCP","54","44324 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27741","12.834092","172.30.1.104","172.30.1.205","TCP","66","49671 > 36962 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27742","12.834100","172.30.1.205","172.30.1.104","TCP","54","36962 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27743","12.834453","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27744","12.834762","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27745","12.834771","172.30.1.205","172.30.1.104","TCP","54","36962 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27746","12.836680","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27747","12.837061","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27748","12.837074","172.30.1.205","172.30.1.104","TCP","54","36962 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27749","12.838688","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27750","12.841140","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27751","12.841150","172.30.1.205","172.30.1.104","TCP","54","36962 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27752","12.842112","172.30.1.205","172.30.1.104","TCP","74","44328 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916068 TSecr=0 WS=128" "27753","12.842417","172.30.1.104","172.30.1.205","TCP","66","135 > 44328 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27754","12.842428","172.30.1.205","172.30.1.104","TCP","54","44328 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27755","12.842778","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27756","12.843070","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27757","12.843079","172.30.1.205","172.30.1.104","TCP","54","44328 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27758","12.845322","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27759","12.845721","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27760","12.845728","172.30.1.205","172.30.1.104","TCP","54","44328 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27761","12.847543","172.30.1.205","172.30.1.104","TCP","54","44328 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27762","12.847654","172.30.1.205","172.30.1.104","TCP","74","36966 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916074 TSecr=0 WS=128" "27763","12.847850","172.30.1.104","172.30.1.205","TCP","54","135 > 44328 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27764","12.847858","172.30.1.104","172.30.1.205","TCP","54","135 > 44328 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27765","12.847863","172.30.1.205","172.30.1.104","TCP","54","44328 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27766","12.847929","172.30.1.104","172.30.1.205","TCP","66","49671 > 36966 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27767","12.847937","172.30.1.205","172.30.1.104","TCP","54","36966 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27768","12.848282","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27769","12.848574","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27770","12.848583","172.30.1.205","172.30.1.104","TCP","54","36966 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27771","12.850527","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27772","12.850906","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27773","12.850911","172.30.1.205","172.30.1.104","TCP","54","36966 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27774","12.852320","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27775","12.854675","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27776","12.854685","172.30.1.205","172.30.1.104","TCP","54","36966 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27777","12.855629","172.30.1.205","172.30.1.104","TCP","74","44332 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916082 TSecr=0 WS=128" "27778","12.855937","172.30.1.104","172.30.1.205","TCP","66","135 > 44332 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27779","12.855948","172.30.1.205","172.30.1.104","TCP","54","44332 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27780","12.856300","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27781","12.856610","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27782","12.856619","172.30.1.205","172.30.1.104","TCP","54","44332 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27783","12.858823","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27784","12.859276","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27785","12.859283","172.30.1.205","172.30.1.104","TCP","54","44332 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27786","12.861150","172.30.1.205","172.30.1.104","TCP","54","44332 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27787","12.861284","172.30.1.205","172.30.1.104","TCP","74","36970 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916087 TSecr=0 WS=128" "27788","12.861429","172.30.1.104","172.30.1.205","TCP","54","135 > 44332 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27789","12.861506","172.30.1.104","172.30.1.205","TCP","54","135 > 44332 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27790","12.861512","172.30.1.205","172.30.1.104","TCP","54","44332 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27791","12.861583","172.30.1.104","172.30.1.205","TCP","66","49671 > 36970 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27792","12.861596","172.30.1.205","172.30.1.104","TCP","54","36970 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27793","12.861965","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27794","12.862291","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27795","12.862300","172.30.1.205","172.30.1.104","TCP","54","36970 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27796","12.864202","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27797","12.864632","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27798","12.864638","172.30.1.205","172.30.1.104","TCP","54","36970 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27799","12.866018","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27800","12.868457","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27801","12.868476","172.30.1.205","172.30.1.104","TCP","54","36970 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27802","12.869625","172.30.1.205","172.30.1.104","TCP","74","44336 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916096 TSecr=0 WS=128" "27803","12.869940","172.30.1.104","172.30.1.205","TCP","66","135 > 44336 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27804","12.869952","172.30.1.205","172.30.1.104","TCP","54","44336 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27805","12.870307","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27806","12.870610","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27807","12.870619","172.30.1.205","172.30.1.104","TCP","54","44336 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27808","12.872848","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27809","12.873242","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27810","12.873249","172.30.1.205","172.30.1.104","TCP","54","44336 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27811","12.875060","172.30.1.205","172.30.1.104","TCP","54","44336 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27812","12.875173","172.30.1.205","172.30.1.104","TCP","74","36974 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916101 TSecr=0 WS=128" "27813","12.875346","172.30.1.104","172.30.1.205","TCP","54","135 > 44336 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27814","12.875381","172.30.1.104","172.30.1.205","TCP","54","135 > 44336 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27815","12.875387","172.30.1.205","172.30.1.104","TCP","54","44336 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27816","12.875465","172.30.1.104","172.30.1.205","TCP","66","49671 > 36974 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27817","12.875473","172.30.1.205","172.30.1.104","TCP","54","36974 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27818","12.875824","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27819","12.876150","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27820","12.876159","172.30.1.205","172.30.1.104","TCP","54","36974 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27821","12.878081","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27822","12.878515","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27823","12.878521","172.30.1.205","172.30.1.104","TCP","54","36974 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27824","12.879876","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27825","12.882250","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27826","12.882259","172.30.1.205","172.30.1.104","TCP","54","36974 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27827","12.883207","172.30.1.205","172.30.1.104","TCP","74","44340 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916109 TSecr=0 WS=128" "27828","12.883550","172.30.1.104","172.30.1.205","TCP","66","135 > 44340 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27829","12.883561","172.30.1.205","172.30.1.104","TCP","54","44340 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27830","12.883958","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27831","12.884273","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27832","12.884282","172.30.1.205","172.30.1.104","TCP","54","44340 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27833","12.886501","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27834","12.886997","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27835","12.887003","172.30.1.205","172.30.1.104","TCP","54","44340 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27836","12.888831","172.30.1.205","172.30.1.104","TCP","54","44340 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27837","12.888943","172.30.1.205","172.30.1.104","TCP","74","36978 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916115 TSecr=0 WS=128" "27838","12.889136","172.30.1.104","172.30.1.205","TCP","54","135 > 44340 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27839","12.889169","172.30.1.104","172.30.1.205","TCP","54","135 > 44340 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27840","12.889175","172.30.1.205","172.30.1.104","TCP","54","44340 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27841","12.889209","172.30.1.104","172.30.1.205","TCP","66","49671 > 36978 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27842","12.889217","172.30.1.205","172.30.1.104","TCP","54","36978 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27843","12.889557","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27844","12.889873","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27845","12.889882","172.30.1.205","172.30.1.104","TCP","54","36978 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27846","12.891775","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27847","12.892173","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27848","12.892179","172.30.1.205","172.30.1.104","TCP","54","36978 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27849","12.893557","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27850","12.895966","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27851","12.895975","172.30.1.205","172.30.1.104","TCP","54","36978 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27852","12.896925","172.30.1.205","172.30.1.104","TCP","74","44344 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916123 TSecr=0 WS=128" "27853","12.897228","172.30.1.104","172.30.1.205","TCP","66","135 > 44344 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27854","12.897238","172.30.1.205","172.30.1.104","TCP","54","44344 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27855","12.897595","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27856","12.897910","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27857","12.897919","172.30.1.205","172.30.1.104","TCP","54","44344 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27858","12.900091","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27859","12.900484","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27860","12.900490","172.30.1.205","172.30.1.104","TCP","54","44344 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27861","12.901357","172.30.1.205","172.30.1.104","TCP","54","36938 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27862","12.901406","172.30.1.205","172.30.1.104","TCP","54","36942 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27863","12.901443","172.30.1.205","172.30.1.104","TCP","54","36946 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27864","12.901478","172.30.1.205","172.30.1.104","TCP","54","36950 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27865","12.901506","172.30.1.205","172.30.1.104","TCP","54","36954 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27866","12.901539","172.30.1.205","172.30.1.104","TCP","54","36958 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27867","12.901576","172.30.1.205","172.30.1.104","TCP","54","36962 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27868","12.901604","172.30.1.205","172.30.1.104","TCP","54","36966 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27869","12.901632","172.30.1.205","172.30.1.104","TCP","54","36970 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27870","12.901664","172.30.1.205","172.30.1.104","TCP","54","36974 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27871","12.901690","172.30.1.205","172.30.1.104","TCP","54","36978 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27872","12.901732","172.30.1.104","172.30.1.205","TCP","54","49671 > 36938 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27873","12.901750","172.30.1.104","172.30.1.205","TCP","54","49671 > 36942 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27874","12.901770","172.30.1.104","172.30.1.205","TCP","54","49671 > 36938 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27875","12.901776","172.30.1.205","172.30.1.104","TCP","54","36938 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27876","12.901806","172.30.1.205","172.30.1.104","TCP","54","36934 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "27877","12.901824","172.30.1.104","172.30.1.205","TCP","54","49671 > 36946 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27878","12.901846","172.30.1.104","172.30.1.205","TCP","54","49671 > 36950 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27879","12.902133","172.30.1.104","172.30.1.205","TCP","54","49671 > 36954 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27880","12.902152","172.30.1.104","172.30.1.205","TCP","54","49671 > 36950 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27881","12.902158","172.30.1.205","172.30.1.104","TCP","54","36950 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27882","12.902182","172.30.1.104","172.30.1.205","TCP","54","49671 > 36954 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27883","12.902185","172.30.1.205","172.30.1.104","TCP","54","36954 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27884","12.902232","172.30.1.104","172.30.1.205","TCP","54","49671 > 36942 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27885","12.902236","172.30.1.205","172.30.1.104","TCP","54","36942 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27886","12.902254","172.30.1.104","172.30.1.205","TCP","54","49671 > 36946 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27887","12.902257","172.30.1.205","172.30.1.104","TCP","54","36946 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27888","12.902328","172.30.1.104","172.30.1.205","TCP","54","49671 > 36958 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27889","12.902361","172.30.1.104","172.30.1.205","TCP","54","49671 > 36962 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27890","12.902382","172.30.1.104","172.30.1.205","TCP","54","49671 > 36958 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27891","12.902386","172.30.1.205","172.30.1.104","TCP","54","36958 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27892","12.902401","172.30.1.104","172.30.1.205","TCP","54","49671 > 36966 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27893","12.902421","172.30.1.104","172.30.1.205","TCP","54","49671 > 36970 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27894","12.902441","172.30.1.104","172.30.1.205","TCP","54","49671 > 36962 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27895","12.902445","172.30.1.205","172.30.1.104","TCP","54","36962 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27896","12.902462","172.30.1.104","172.30.1.205","TCP","54","49671 > 36974 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27897","12.902482","172.30.1.104","172.30.1.205","TCP","54","49671 > 36974 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27898","12.902486","172.30.1.205","172.30.1.104","TCP","54","36974 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27899","12.902502","172.30.1.104","172.30.1.205","TCP","54","49671 > 36978 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27900","12.902524","172.30.1.104","172.30.1.205","TCP","54","49671 > 36978 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27901","12.902527","172.30.1.205","172.30.1.104","TCP","54","36978 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27902","12.902864","172.30.1.104","172.30.1.205","TCP","54","49671 > 36934 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27903","12.902883","172.30.1.104","172.30.1.205","TCP","54","49671 > 36966 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27904","12.902888","172.30.1.205","172.30.1.104","TCP","54","36966 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27905","12.902907","172.30.1.104","172.30.1.205","TCP","54","49671 > 36934 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27906","12.902909","172.30.1.205","172.30.1.104","TCP","54","36934 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27907","12.902931","172.30.1.104","172.30.1.205","TCP","54","49671 > 36970 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "27908","12.902933","172.30.1.205","172.30.1.104","TCP","54","36970 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "27909","12.903356","172.30.1.205","172.30.1.104","TCP","54","44344 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27910","12.903467","172.30.1.205","172.30.1.104","TCP","74","36982 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916129 TSecr=0 WS=128" "27911","12.903617","172.30.1.104","172.30.1.205","TCP","54","135 > 44344 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27912","12.903637","172.30.1.104","172.30.1.205","TCP","54","135 > 44344 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27913","12.903642","172.30.1.205","172.30.1.104","TCP","54","44344 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27914","12.903744","172.30.1.104","172.30.1.205","TCP","66","49671 > 36982 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27915","12.903752","172.30.1.205","172.30.1.104","TCP","54","36982 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27916","12.904107","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27917","12.904408","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27918","12.904417","172.30.1.205","172.30.1.104","TCP","54","36982 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27919","12.906342","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27920","12.908094","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27921","12.908100","172.30.1.205","172.30.1.104","TCP","54","36982 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27922","12.909488","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27923","12.911986","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27924","12.911996","172.30.1.205","172.30.1.104","TCP","54","36982 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27925","12.912976","172.30.1.205","172.30.1.104","TCP","74","44348 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916139 TSecr=0 WS=128" "27926","12.913287","172.30.1.104","172.30.1.205","TCP","66","135 > 44348 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27927","12.913298","172.30.1.205","172.30.1.104","TCP","54","44348 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27928","12.913650","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27929","12.913987","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27930","12.913996","172.30.1.205","172.30.1.104","TCP","54","44348 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27931","12.916171","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27932","12.916619","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27933","12.916632","172.30.1.205","172.30.1.104","TCP","54","44348 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27934","12.918712","172.30.1.205","172.30.1.104","TCP","54","44348 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27935","12.918822","172.30.1.205","172.30.1.104","TCP","74","36986 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916145 TSecr=0 WS=128" "27936","12.919092","172.30.1.104","172.30.1.205","TCP","54","135 > 44348 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27937","12.919104","172.30.1.104","172.30.1.205","TCP","54","135 > 44348 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27938","12.919111","172.30.1.205","172.30.1.104","TCP","54","44348 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27939","12.919121","172.30.1.104","172.30.1.205","TCP","66","49671 > 36986 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27940","12.919136","172.30.1.205","172.30.1.104","TCP","54","36986 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27941","12.919545","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27942","12.919847","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27943","12.919856","172.30.1.205","172.30.1.104","TCP","54","36986 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27944","12.921795","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27945","12.922191","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27946","12.922198","172.30.1.205","172.30.1.104","TCP","54","36986 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27947","12.923544","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27948","12.926890","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27949","12.926900","172.30.1.205","172.30.1.104","TCP","54","36986 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27950","12.927859","172.30.1.205","172.30.1.104","TCP","74","44352 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916154 TSecr=0 WS=128" "27951","12.928183","172.30.1.104","172.30.1.205","TCP","66","135 > 44352 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27952","12.928193","172.30.1.205","172.30.1.104","TCP","54","44352 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27953","12.928542","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27954","12.928862","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27955","12.928871","172.30.1.205","172.30.1.104","TCP","54","44352 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27956","12.931078","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27957","12.931481","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27958","12.931488","172.30.1.205","172.30.1.104","TCP","54","44352 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27959","12.933324","172.30.1.205","172.30.1.104","TCP","54","44352 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27960","12.933450","172.30.1.205","172.30.1.104","TCP","74","36990 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916159 TSecr=0 WS=128" "27961","12.933596","172.30.1.104","172.30.1.205","TCP","54","135 > 44352 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27962","12.933668","172.30.1.104","172.30.1.205","TCP","54","135 > 44352 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27963","12.933674","172.30.1.205","172.30.1.104","TCP","54","44352 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27964","12.933748","172.30.1.104","172.30.1.205","TCP","66","49671 > 36990 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27965","12.933757","172.30.1.205","172.30.1.104","TCP","54","36990 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27966","12.934103","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27967","12.934397","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27968","12.934408","172.30.1.205","172.30.1.104","TCP","54","36990 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27969","12.936294","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27970","12.937949","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27971","12.937957","172.30.1.205","172.30.1.104","TCP","54","36990 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27972","12.939344","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27973","12.941731","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27974","12.941741","172.30.1.205","172.30.1.104","TCP","54","36990 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "27975","12.942701","172.30.1.205","172.30.1.104","TCP","74","44356 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916169 TSecr=0 WS=128" "27976","12.943016","172.30.1.104","172.30.1.205","TCP","66","135 > 44356 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27977","12.943026","172.30.1.205","172.30.1.104","TCP","54","44356 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27978","12.943377","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "27979","12.943712","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27980","12.943721","172.30.1.205","172.30.1.104","TCP","54","44356 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27981","12.945948","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "27982","12.946341","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "27983","12.946348","172.30.1.205","172.30.1.104","TCP","54","44356 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "27984","12.948170","172.30.1.205","172.30.1.104","TCP","54","44356 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "27985","12.948285","172.30.1.205","172.30.1.104","TCP","74","36994 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916174 TSecr=0 WS=128" "27986","12.948470","172.30.1.104","172.30.1.205","TCP","54","135 > 44356 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27987","12.948505","172.30.1.104","172.30.1.205","TCP","54","135 > 44356 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "27988","12.948510","172.30.1.205","172.30.1.104","TCP","54","44356 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "27989","12.948584","172.30.1.104","172.30.1.205","TCP","66","49671 > 36994 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "27990","12.948592","172.30.1.205","172.30.1.104","TCP","54","36994 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "27991","12.948973","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "27992","12.949347","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "27993","12.949356","172.30.1.205","172.30.1.104","TCP","54","36994 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "27994","12.951253","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "27995","12.951632","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "27996","12.951638","172.30.1.205","172.30.1.104","TCP","54","36994 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "27997","12.953024","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "27998","12.955412","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "27999","12.955422","172.30.1.205","172.30.1.104","TCP","54","36994 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28000","12.956358","172.30.1.205","172.30.1.104","TCP","74","44360 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916182 TSecr=0 WS=128" "28001","12.956693","172.30.1.104","172.30.1.205","TCP","66","135 > 44360 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28002","12.956704","172.30.1.205","172.30.1.104","TCP","54","44360 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28003","12.957086","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28004","12.957432","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28005","12.957441","172.30.1.205","172.30.1.104","TCP","54","44360 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28006","12.959650","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28007","12.960064","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28008","12.960071","172.30.1.205","172.30.1.104","TCP","54","44360 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28009","12.961910","172.30.1.205","172.30.1.104","TCP","54","44360 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28010","12.962022","172.30.1.205","172.30.1.104","TCP","74","36998 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916188 TSecr=0 WS=128" "28011","12.962250","172.30.1.104","172.30.1.205","TCP","54","135 > 44360 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28012","12.962284","172.30.1.104","172.30.1.205","TCP","54","135 > 44360 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28013","12.962289","172.30.1.205","172.30.1.104","TCP","54","44360 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28014","12.962332","172.30.1.104","172.30.1.205","TCP","66","49671 > 36998 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28015","12.962340","172.30.1.205","172.30.1.104","TCP","54","36998 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28016","12.962692","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28017","12.963017","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28018","12.963027","172.30.1.205","172.30.1.104","TCP","54","36998 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28019","12.964945","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28020","12.967322","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28021","12.967329","172.30.1.205","172.30.1.104","TCP","54","36998 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28022","12.968704","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28023","12.971079","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28024","12.971089","172.30.1.205","172.30.1.104","TCP","54","36998 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28025","12.972040","172.30.1.205","172.30.1.104","TCP","74","44364 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916198 TSecr=0 WS=128" "28026","12.972348","172.30.1.104","172.30.1.205","TCP","66","135 > 44364 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28027","12.972359","172.30.1.205","172.30.1.104","TCP","54","44364 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28028","12.972706","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28029","12.973010","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28030","12.973020","172.30.1.205","172.30.1.104","TCP","54","44364 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28031","12.975232","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28032","12.975623","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28033","12.975630","172.30.1.205","172.30.1.104","TCP","54","44364 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28034","12.977471","172.30.1.205","172.30.1.104","TCP","54","44364 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28035","12.977586","172.30.1.205","172.30.1.104","TCP","74","37002 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916204 TSecr=0 WS=128" "28036","12.977745","172.30.1.104","172.30.1.205","TCP","54","135 > 44364 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28037","12.977826","172.30.1.104","172.30.1.205","TCP","54","135 > 44364 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28038","12.977832","172.30.1.205","172.30.1.104","TCP","54","44364 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28039","12.977945","172.30.1.104","172.30.1.205","TCP","66","49671 > 37002 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28040","12.977956","172.30.1.205","172.30.1.104","TCP","54","37002 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28041","12.978314","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28042","12.979032","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28043","12.979044","172.30.1.205","172.30.1.104","TCP","54","37002 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28044","12.980967","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28045","12.981352","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28046","12.981359","172.30.1.205","172.30.1.104","TCP","54","37002 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28047","12.982738","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28048","12.985684","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28049","12.985694","172.30.1.205","172.30.1.104","TCP","54","37002 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28050","12.986654","172.30.1.205","172.30.1.104","TCP","74","44368 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916213 TSecr=0 WS=128" "28051","12.986979","172.30.1.104","172.30.1.205","TCP","66","135 > 44368 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28052","12.986990","172.30.1.205","172.30.1.104","TCP","54","44368 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28053","12.987337","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28054","12.987661","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28055","12.987669","172.30.1.205","172.30.1.104","TCP","54","44368 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28056","12.989890","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28057","12.990291","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28058","12.990306","172.30.1.205","172.30.1.104","TCP","54","44368 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28059","12.992127","172.30.1.205","172.30.1.104","TCP","54","44368 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28060","12.992242","172.30.1.205","172.30.1.104","TCP","74","37006 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916218 TSecr=0 WS=128" "28061","12.992401","172.30.1.104","172.30.1.205","TCP","54","135 > 44368 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28062","12.992434","172.30.1.104","172.30.1.205","TCP","54","135 > 44368 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28063","12.992439","172.30.1.205","172.30.1.104","TCP","54","44368 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28064","12.992519","172.30.1.104","172.30.1.205","TCP","66","49671 > 37006 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28065","12.992527","172.30.1.205","172.30.1.104","TCP","54","37006 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28066","12.992913","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28067","12.993229","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28068","12.993238","172.30.1.205","172.30.1.104","TCP","54","37006 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28069","12.995111","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28070","12.995489","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28071","12.995495","172.30.1.205","172.30.1.104","TCP","54","37006 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28072","12.996872","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28073","13.001147","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28074","13.001158","172.30.1.205","172.30.1.104","TCP","54","37006 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28075","13.002127","172.30.1.205","172.30.1.104","TCP","74","44372 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916228 TSecr=0 WS=128" "28076","13.002447","172.30.1.104","172.30.1.205","TCP","66","135 > 44372 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28077","13.002458","172.30.1.205","172.30.1.104","TCP","54","44372 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28078","13.002815","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28079","13.003140","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28080","13.003151","172.30.1.205","172.30.1.104","TCP","54","44372 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28081","13.005376","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28082","13.005770","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28083","13.005777","172.30.1.205","172.30.1.104","TCP","54","44372 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28084","13.007603","172.30.1.205","172.30.1.104","TCP","54","44372 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28085","13.007715","172.30.1.205","172.30.1.104","TCP","74","37010 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916234 TSecr=0 WS=128" "28086","13.007895","172.30.1.104","172.30.1.205","TCP","54","135 > 44372 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28087","13.007930","172.30.1.104","172.30.1.205","TCP","54","135 > 44372 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28088","13.007936","172.30.1.205","172.30.1.104","TCP","54","44372 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28089","13.008004","172.30.1.104","172.30.1.205","TCP","66","49671 > 37010 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28090","13.008012","172.30.1.205","172.30.1.104","TCP","54","37010 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28091","13.008355","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28092","13.008647","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28093","13.008656","172.30.1.205","172.30.1.104","TCP","54","37010 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28094","13.010548","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28095","13.010953","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28096","13.010960","172.30.1.205","172.30.1.104","TCP","54","37010 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28097","13.012348","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28098","13.014916","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28099","13.014927","172.30.1.205","172.30.1.104","TCP","54","37010 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28100","13.015909","172.30.1.205","172.30.1.104","TCP","74","44376 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916242 TSecr=0 WS=128" "28101","13.016282","172.30.1.104","172.30.1.205","TCP","66","135 > 44376 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28102","13.016293","172.30.1.205","172.30.1.104","TCP","54","44376 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28103","13.016643","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28104","13.016965","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28105","13.016974","172.30.1.205","172.30.1.104","TCP","54","44376 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28106","13.019174","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28107","13.019621","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28108","13.019627","172.30.1.205","172.30.1.104","TCP","54","44376 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28109","13.021459","172.30.1.205","172.30.1.104","TCP","54","44376 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28110","13.021574","172.30.1.205","172.30.1.104","TCP","74","37014 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916247 TSecr=0 WS=128" "28111","13.021752","172.30.1.104","172.30.1.205","TCP","54","135 > 44376 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28112","13.021780","172.30.1.104","172.30.1.205","TCP","54","135 > 44376 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28113","13.021785","172.30.1.205","172.30.1.104","TCP","54","44376 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28114","13.021918","172.30.1.104","172.30.1.205","TCP","66","49671 > 37014 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28115","13.021935","172.30.1.205","172.30.1.104","TCP","54","37014 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28116","13.022353","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28117","13.022690","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28118","13.022704","172.30.1.205","172.30.1.104","TCP","54","37014 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28119","13.024600","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28120","13.025032","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28121","13.025040","172.30.1.205","172.30.1.104","TCP","54","37014 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28122","13.026407","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28123","13.029050","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28124","13.029060","172.30.1.205","172.30.1.104","TCP","54","37014 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28125","13.030027","172.30.1.205","172.30.1.104","TCP","74","44380 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916256 TSecr=0 WS=128" "28126","13.030371","172.30.1.104","172.30.1.205","TCP","66","135 > 44380 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28127","13.030382","172.30.1.205","172.30.1.104","TCP","54","44380 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28128","13.030732","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28129","13.031091","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28130","13.031100","172.30.1.205","172.30.1.104","TCP","54","44380 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28131","13.033385","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28132","13.033827","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28133","13.033837","172.30.1.205","172.30.1.104","TCP","54","44380 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28134","13.035756","172.30.1.205","172.30.1.104","TCP","54","44380 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28135","13.035880","172.30.1.205","172.30.1.104","TCP","74","37018 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916262 TSecr=0 WS=128" "28136","13.036044","172.30.1.104","172.30.1.205","TCP","54","135 > 44380 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28137","13.036087","172.30.1.104","172.30.1.205","TCP","54","135 > 44380 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28138","13.036093","172.30.1.205","172.30.1.104","TCP","54","44380 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28139","13.036164","172.30.1.104","172.30.1.205","TCP","66","49671 > 37018 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28140","13.036173","172.30.1.205","172.30.1.104","TCP","54","37018 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28141","13.036523","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28142","13.036848","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28143","13.036857","172.30.1.205","172.30.1.104","TCP","54","37018 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28144","13.038736","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28145","13.039160","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28146","13.039167","172.30.1.205","172.30.1.104","TCP","54","37018 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28147","13.040510","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28148","13.042984","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28149","13.043002","172.30.1.205","172.30.1.104","TCP","54","37018 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28150","13.044175","172.30.1.205","172.30.1.104","TCP","74","44384 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916270 TSecr=0 WS=128" "28151","13.044476","172.30.1.104","172.30.1.205","TCP","66","135 > 44384 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28152","13.044487","172.30.1.205","172.30.1.104","TCP","54","44384 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28153","13.044867","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28154","13.045193","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28155","13.045203","172.30.1.205","172.30.1.104","TCP","54","44384 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28156","13.047444","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28157","13.047858","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28158","13.047877","172.30.1.205","172.30.1.104","TCP","54","44384 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28159","13.049809","172.30.1.205","172.30.1.104","TCP","54","44384 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28160","13.049932","172.30.1.205","172.30.1.104","TCP","74","37022 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916276 TSecr=0 WS=128" "28161","13.050103","172.30.1.104","172.30.1.205","TCP","54","135 > 44384 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28162","13.050175","172.30.1.104","172.30.1.205","TCP","54","135 > 44384 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28163","13.050181","172.30.1.205","172.30.1.104","TCP","54","44384 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28164","13.050276","172.30.1.104","172.30.1.205","TCP","66","49671 > 37022 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28165","13.050284","172.30.1.205","172.30.1.104","TCP","54","37022 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28166","13.050634","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28167","13.050969","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28168","13.050983","172.30.1.205","172.30.1.104","TCP","54","37022 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28169","13.053008","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28170","13.053395","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28171","13.053402","172.30.1.205","172.30.1.104","TCP","54","37022 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28172","13.054762","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28173","13.057218","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28174","13.057229","172.30.1.205","172.30.1.104","TCP","54","37022 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28175","13.058200","172.30.1.205","172.30.1.104","TCP","74","44388 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916284 TSecr=0 WS=128" "28176","13.058505","172.30.1.104","172.30.1.205","TCP","66","135 > 44388 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28177","13.058516","172.30.1.205","172.30.1.104","TCP","54","44388 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28178","13.058862","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28179","13.059220","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28180","13.059229","172.30.1.205","172.30.1.104","TCP","54","44388 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28181","13.061510","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28182","13.061927","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28183","13.061945","172.30.1.205","172.30.1.104","TCP","54","44388 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28184","13.063792","172.30.1.205","172.30.1.104","TCP","54","44388 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28185","13.063911","172.30.1.205","172.30.1.104","TCP","74","37026 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916290 TSecr=0 WS=128" "28186","13.064095","172.30.1.104","172.30.1.205","TCP","54","135 > 44388 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28187","13.064143","172.30.1.104","172.30.1.205","TCP","54","135 > 44388 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28188","13.064149","172.30.1.205","172.30.1.104","TCP","54","44388 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28189","13.064223","172.30.1.104","172.30.1.205","TCP","66","49671 > 37026 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28190","13.064231","172.30.1.205","172.30.1.104","TCP","54","37026 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28191","13.064630","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28192","13.064957","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28193","13.064966","172.30.1.205","172.30.1.104","TCP","54","37026 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28194","13.066868","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28195","13.067250","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28196","13.067260","172.30.1.205","172.30.1.104","TCP","54","37026 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28197","13.068899","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28198","13.071293","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28199","13.071311","172.30.1.205","172.30.1.104","TCP","54","37026 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28200","13.072481","172.30.1.205","172.30.1.104","TCP","74","44392 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916298 TSecr=0 WS=128" "28201","13.072841","172.30.1.104","172.30.1.205","TCP","66","135 > 44392 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28202","13.072852","172.30.1.205","172.30.1.104","TCP","54","44392 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28203","13.073227","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28204","13.073556","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28205","13.073565","172.30.1.205","172.30.1.104","TCP","54","44392 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28206","13.075818","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28207","13.076231","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28208","13.076237","172.30.1.205","172.30.1.104","TCP","54","44392 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28209","13.077114","172.30.1.205","172.30.1.104","TCP","54","36982 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28210","13.077164","172.30.1.205","172.30.1.104","TCP","54","36986 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28211","13.077201","172.30.1.205","172.30.1.104","TCP","54","36990 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28212","13.077230","172.30.1.205","172.30.1.104","TCP","54","36994 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28213","13.077257","172.30.1.205","172.30.1.104","TCP","54","36998 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28214","13.077285","172.30.1.205","172.30.1.104","TCP","54","37002 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28215","13.077311","172.30.1.205","172.30.1.104","TCP","54","37006 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28216","13.077339","172.30.1.205","172.30.1.104","TCP","54","37010 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28217","13.077365","172.30.1.205","172.30.1.104","TCP","54","37014 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28218","13.077397","172.30.1.205","172.30.1.104","TCP","54","37018 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28219","13.077423","172.30.1.205","172.30.1.104","TCP","54","37022 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28220","13.077449","172.30.1.205","172.30.1.104","TCP","54","37026 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28221","13.077773","172.30.1.104","172.30.1.205","TCP","54","49671 > 36982 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28222","13.077796","172.30.1.104","172.30.1.205","TCP","54","49671 > 36986 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28223","13.077823","172.30.1.104","172.30.1.205","TCP","54","49671 > 36982 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28224","13.077829","172.30.1.205","172.30.1.104","TCP","54","36982 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28225","13.077859","172.30.1.104","172.30.1.205","TCP","54","49671 > 36990 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28226","13.077883","172.30.1.104","172.30.1.205","TCP","54","49671 > 36994 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28227","13.077909","172.30.1.104","172.30.1.205","TCP","54","49671 > 36998 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28228","13.077936","172.30.1.104","172.30.1.205","TCP","54","49671 > 36994 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28229","13.077940","172.30.1.205","172.30.1.104","TCP","54","36994 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28230","13.077969","172.30.1.104","172.30.1.205","TCP","54","49671 > 37002 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28231","13.077996","172.30.1.104","172.30.1.205","TCP","54","49671 > 36986 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28232","13.078000","172.30.1.205","172.30.1.104","TCP","54","36986 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28233","13.078023","172.30.1.104","172.30.1.205","TCP","54","49671 > 37006 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28234","13.078050","172.30.1.104","172.30.1.205","TCP","54","49671 > 37006 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28235","13.078054","172.30.1.205","172.30.1.104","TCP","54","37006 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28236","13.078077","172.30.1.104","172.30.1.205","TCP","54","49671 > 37010 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28237","13.078107","172.30.1.104","172.30.1.205","TCP","54","49671 > 37002 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28238","13.078111","172.30.1.205","172.30.1.104","TCP","54","37002 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28239","13.078134","172.30.1.104","172.30.1.205","TCP","54","49671 > 37014 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28240","13.078161","172.30.1.104","172.30.1.205","TCP","54","49671 > 36998 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28241","13.078166","172.30.1.205","172.30.1.104","TCP","54","36998 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28242","13.078188","172.30.1.104","172.30.1.205","TCP","54","49671 > 37018 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28243","13.078215","172.30.1.104","172.30.1.205","TCP","54","49671 > 37022 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28244","13.078243","172.30.1.104","172.30.1.205","TCP","54","49671 > 37018 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28245","13.078246","172.30.1.205","172.30.1.104","TCP","54","37018 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28246","13.078269","172.30.1.104","172.30.1.205","TCP","54","49671 > 37014 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28247","13.078273","172.30.1.205","172.30.1.104","TCP","54","37014 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28248","13.078297","172.30.1.104","172.30.1.205","TCP","54","49671 > 37026 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28249","13.078505","172.30.1.104","172.30.1.205","TCP","54","49671 > 37010 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28250","13.078508","172.30.1.205","172.30.1.104","TCP","54","37010 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28251","13.078541","172.30.1.104","172.30.1.205","TCP","54","49671 > 37026 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28252","13.078544","172.30.1.205","172.30.1.104","TCP","54","37026 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28253","13.078572","172.30.1.104","172.30.1.205","TCP","54","49671 > 37022 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28254","13.078576","172.30.1.205","172.30.1.104","TCP","54","37022 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28255","13.078599","172.30.1.104","172.30.1.205","TCP","54","49671 > 36990 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28256","13.078602","172.30.1.205","172.30.1.104","TCP","54","36990 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28257","13.079088","172.30.1.205","172.30.1.104","TCP","54","44392 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28258","13.079196","172.30.1.205","172.30.1.104","TCP","74","37030 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916305 TSecr=0 WS=128" "28259","13.079371","172.30.1.104","172.30.1.205","TCP","54","135 > 44392 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28260","13.079420","172.30.1.104","172.30.1.205","TCP","54","135 > 44392 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28261","13.079425","172.30.1.205","172.30.1.104","TCP","54","44392 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28262","13.079467","172.30.1.104","172.30.1.205","TCP","66","49671 > 37030 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28263","13.079475","172.30.1.205","172.30.1.104","TCP","54","37030 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28264","13.079837","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28265","13.080154","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28266","13.080162","172.30.1.205","172.30.1.104","TCP","54","37030 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28267","13.082076","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28268","13.082477","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28269","13.082483","172.30.1.205","172.30.1.104","TCP","54","37030 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28270","13.083826","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28271","13.086234","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28272","13.086244","172.30.1.205","172.30.1.104","TCP","54","37030 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28273","13.087183","172.30.1.205","172.30.1.104","TCP","74","44396 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916313 TSecr=0 WS=128" "28274","13.087493","172.30.1.104","172.30.1.205","TCP","66","135 > 44396 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28275","13.087504","172.30.1.205","172.30.1.104","TCP","54","44396 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28276","13.087849","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28277","13.088180","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28278","13.088188","172.30.1.205","172.30.1.104","TCP","54","44396 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28279","13.090439","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28280","13.090890","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28281","13.090896","172.30.1.205","172.30.1.104","TCP","54","44396 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28282","13.092699","172.30.1.205","172.30.1.104","TCP","54","44396 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28283","13.092833","172.30.1.205","172.30.1.104","TCP","74","37034 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916319 TSecr=0 WS=128" "28284","13.093011","172.30.1.104","172.30.1.205","TCP","54","135 > 44396 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28285","13.093043","172.30.1.104","172.30.1.205","TCP","54","135 > 44396 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28286","13.093048","172.30.1.205","172.30.1.104","TCP","54","44396 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28287","13.093156","172.30.1.104","172.30.1.205","TCP","66","49671 > 37034 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28288","13.093164","172.30.1.205","172.30.1.104","TCP","54","37034 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28289","13.093508","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28290","13.093803","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28291","13.093811","172.30.1.205","172.30.1.104","TCP","54","37034 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28292","13.095654","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28293","13.096385","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28294","13.096391","172.30.1.205","172.30.1.104","TCP","54","37034 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28295","13.097816","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28296","13.100129","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28297","13.100139","172.30.1.205","172.30.1.104","TCP","54","37034 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28298","13.101107","172.30.1.205","172.30.1.104","TCP","74","44400 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916327 TSecr=0 WS=128" "28299","13.101435","172.30.1.104","172.30.1.205","TCP","66","135 > 44400 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28300","13.101446","172.30.1.205","172.30.1.104","TCP","54","44400 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28301","13.101796","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28302","13.102111","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28303","13.102120","172.30.1.205","172.30.1.104","TCP","54","44400 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28304","13.104301","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28305","13.104722","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28306","13.104728","172.30.1.205","172.30.1.104","TCP","54","44400 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28307","13.106525","172.30.1.205","172.30.1.104","TCP","54","44400 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28308","13.106633","172.30.1.205","172.30.1.104","TCP","74","37038 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916333 TSecr=0 WS=128" "28309","13.106800","172.30.1.104","172.30.1.205","TCP","54","135 > 44400 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28310","13.106846","172.30.1.104","172.30.1.205","TCP","54","135 > 44400 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28311","13.106851","172.30.1.205","172.30.1.104","TCP","54","44400 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28312","13.106926","172.30.1.104","172.30.1.205","TCP","66","49671 > 37038 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28313","13.106934","172.30.1.205","172.30.1.104","TCP","54","37038 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28314","13.107276","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28315","13.107620","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28316","13.107628","172.30.1.205","172.30.1.104","TCP","54","37038 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28317","13.109520","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28318","13.109910","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28319","13.109916","172.30.1.205","172.30.1.104","TCP","54","37038 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28320","13.111250","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28321","13.113681","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28322","13.113691","172.30.1.205","172.30.1.104","TCP","54","37038 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28323","13.114625","172.30.1.205","172.30.1.104","TCP","74","44404 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916341 TSecr=0 WS=128" "28324","13.114939","172.30.1.104","172.30.1.205","TCP","66","135 > 44404 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28325","13.114950","172.30.1.205","172.30.1.104","TCP","54","44404 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28326","13.115297","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28327","13.115600","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28328","13.115609","172.30.1.205","172.30.1.104","TCP","54","44404 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28329","13.117810","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28330","13.118240","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28331","13.118246","172.30.1.205","172.30.1.104","TCP","54","44404 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28332","13.120052","172.30.1.205","172.30.1.104","TCP","54","44404 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28333","13.120161","172.30.1.205","172.30.1.104","TCP","74","37042 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916346 TSecr=0 WS=128" "28334","13.120362","172.30.1.104","172.30.1.205","TCP","54","135 > 44404 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28335","13.120372","172.30.1.104","172.30.1.205","TCP","54","135 > 44404 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28336","13.120377","172.30.1.205","172.30.1.104","TCP","54","44404 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28337","13.120474","172.30.1.104","172.30.1.205","TCP","66","49671 > 37042 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28338","13.120483","172.30.1.205","172.30.1.104","TCP","54","37042 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28339","13.120855","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28340","13.121256","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28341","13.121265","172.30.1.205","172.30.1.104","TCP","54","37042 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28342","13.123142","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28343","13.123526","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28344","13.123532","172.30.1.205","172.30.1.104","TCP","54","37042 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28345","13.124902","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28346","13.127470","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28347","13.127479","172.30.1.205","172.30.1.104","TCP","54","37042 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28348","13.128401","172.30.1.205","172.30.1.104","TCP","74","44408 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916354 TSecr=0 WS=128" "28349","13.128708","172.30.1.104","172.30.1.205","TCP","66","135 > 44408 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28350","13.128718","172.30.1.205","172.30.1.104","TCP","54","44408 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28351","13.129083","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28352","13.129412","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28353","13.129421","172.30.1.205","172.30.1.104","TCP","54","44408 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28354","13.131579","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28355","13.132018","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28356","13.132030","172.30.1.205","172.30.1.104","TCP","54","44408 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28357","13.134107","172.30.1.205","172.30.1.104","TCP","54","44408 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28358","13.134223","172.30.1.205","172.30.1.104","TCP","74","37046 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916360 TSecr=0 WS=128" "28359","13.134440","172.30.1.104","172.30.1.205","TCP","54","135 > 44408 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28360","13.134450","172.30.1.104","172.30.1.205","TCP","54","135 > 44408 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28361","13.134455","172.30.1.205","172.30.1.104","TCP","54","44408 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28362","13.134527","172.30.1.104","172.30.1.205","TCP","66","49671 > 37046 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28363","13.134535","172.30.1.205","172.30.1.104","TCP","54","37046 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28364","13.134877","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28365","13.135380","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28366","13.135387","172.30.1.205","172.30.1.104","TCP","54","37046 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28367","13.137268","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28368","13.137653","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28369","13.137659","172.30.1.205","172.30.1.104","TCP","54","37046 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28370","13.138990","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28371","13.141509","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28372","13.141518","172.30.1.205","172.30.1.104","TCP","54","37046 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28373","13.142447","172.30.1.205","172.30.1.104","TCP","74","44412 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916368 TSecr=0 WS=128" "28374","13.142776","172.30.1.104","172.30.1.205","TCP","66","135 > 44412 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28375","13.142796","172.30.1.205","172.30.1.104","TCP","54","44412 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28376","13.143374","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28377","13.143687","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28378","13.143695","172.30.1.205","172.30.1.104","TCP","54","44412 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28379","13.145895","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28380","13.146320","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28381","13.146326","172.30.1.205","172.30.1.104","TCP","54","44412 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28382","13.148135","172.30.1.205","172.30.1.104","TCP","54","44412 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28383","13.148243","172.30.1.205","172.30.1.104","TCP","74","37050 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916374 TSecr=0 WS=128" "28384","13.148448","172.30.1.104","172.30.1.205","TCP","54","135 > 44412 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28385","13.148523","172.30.1.104","172.30.1.205","TCP","66","49671 > 37050 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28386","13.148532","172.30.1.205","172.30.1.104","TCP","54","37050 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28387","13.148555","172.30.1.104","172.30.1.205","TCP","54","135 > 44412 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28388","13.148560","172.30.1.205","172.30.1.104","TCP","54","44412 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28389","13.148923","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28390","13.149224","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28391","13.149232","172.30.1.205","172.30.1.104","TCP","54","37050 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28392","13.151101","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28393","13.151513","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28394","13.151520","172.30.1.205","172.30.1.104","TCP","54","37050 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28395","13.152888","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28396","13.155427","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28397","13.155436","172.30.1.205","172.30.1.104","TCP","54","37050 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28398","13.156363","172.30.1.205","172.30.1.104","TCP","74","44416 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916382 TSecr=0 WS=128" "28399","13.156647","172.30.1.104","172.30.1.205","TCP","66","135 > 44416 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28400","13.156657","172.30.1.205","172.30.1.104","TCP","54","44416 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28401","13.157037","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28402","13.157345","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28403","13.157354","172.30.1.205","172.30.1.104","TCP","54","44416 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28404","13.159535","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28405","13.159953","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28406","13.159959","172.30.1.205","172.30.1.104","TCP","54","44416 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28407","13.161833","172.30.1.205","172.30.1.104","TCP","54","44416 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28408","13.161952","172.30.1.205","172.30.1.104","TCP","74","37054 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916388 TSecr=0 WS=128" "28409","13.162124","172.30.1.104","172.30.1.205","TCP","54","135 > 44416 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28410","13.162154","172.30.1.104","172.30.1.205","TCP","54","135 > 44416 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28411","13.162159","172.30.1.205","172.30.1.104","TCP","54","44416 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28412","13.162237","172.30.1.104","172.30.1.205","TCP","66","49671 > 37054 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28413","13.162246","172.30.1.205","172.30.1.104","TCP","54","37054 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28414","13.162595","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28415","13.162960","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28416","13.162968","172.30.1.205","172.30.1.104","TCP","54","37054 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28417","13.164867","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28418","13.165250","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28419","13.165256","172.30.1.205","172.30.1.104","TCP","54","37054 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28420","13.166600","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28421","13.170172","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28422","13.170181","172.30.1.205","172.30.1.104","TCP","54","37054 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28423","13.171120","172.30.1.205","172.30.1.104","TCP","74","44420 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916397 TSecr=0 WS=128" "28424","13.171445","172.30.1.104","172.30.1.205","TCP","66","135 > 44420 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28425","13.171456","172.30.1.205","172.30.1.104","TCP","54","44420 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28426","13.171802","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28427","13.172150","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28428","13.172159","172.30.1.205","172.30.1.104","TCP","54","44420 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28429","13.174364","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28430","13.174774","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28431","13.174780","172.30.1.205","172.30.1.104","TCP","54","44420 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28432","13.176571","172.30.1.205","172.30.1.104","TCP","54","44420 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28433","13.176679","172.30.1.205","172.30.1.104","TCP","74","37058 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916403 TSecr=0 WS=128" "28434","13.176851","172.30.1.104","172.30.1.205","TCP","54","135 > 44420 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28435","13.176886","172.30.1.104","172.30.1.205","TCP","54","135 > 44420 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28436","13.176892","172.30.1.205","172.30.1.104","TCP","54","44420 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28437","13.176965","172.30.1.104","172.30.1.205","TCP","66","49671 > 37058 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28438","13.176974","172.30.1.205","172.30.1.104","TCP","54","37058 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28439","13.177322","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28440","13.177626","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28441","13.177635","172.30.1.205","172.30.1.104","TCP","54","37058 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28442","13.179500","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28443","13.179887","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28444","13.179893","172.30.1.205","172.30.1.104","TCP","54","37058 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28445","13.181273","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28446","13.183658","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28447","13.183676","172.30.1.205","172.30.1.104","TCP","54","37058 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28448","13.184678","172.30.1.205","172.30.1.104","TCP","74","44424 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916411 TSecr=0 WS=128" "28449","13.184985","172.30.1.104","172.30.1.205","TCP","66","135 > 44424 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28450","13.184996","172.30.1.205","172.30.1.104","TCP","54","44424 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28451","13.185350","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28452","13.185685","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28453","13.185694","172.30.1.205","172.30.1.104","TCP","54","44424 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28454","13.187862","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28455","13.188255","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28456","13.188261","172.30.1.205","172.30.1.104","TCP","54","44424 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28457","13.190094","172.30.1.205","172.30.1.104","TCP","54","44424 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28458","13.190214","172.30.1.205","172.30.1.104","TCP","74","37062 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916416 TSecr=0 WS=128" "28459","13.190368","172.30.1.104","172.30.1.205","TCP","54","135 > 44424 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28460","13.190407","172.30.1.104","172.30.1.205","TCP","54","135 > 44424 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28461","13.190412","172.30.1.205","172.30.1.104","TCP","54","44424 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28462","13.190513","172.30.1.104","172.30.1.205","TCP","66","49671 > 37062 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28463","13.190521","172.30.1.205","172.30.1.104","TCP","54","37062 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28464","13.190883","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28465","13.191238","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28466","13.191248","172.30.1.205","172.30.1.104","TCP","54","37062 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28467","13.193247","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28468","13.193616","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28469","13.193623","172.30.1.205","172.30.1.104","TCP","54","37062 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28470","13.194975","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28471","13.197393","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28472","13.197402","172.30.1.205","172.30.1.104","TCP","54","37062 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28473","13.198379","172.30.1.205","172.30.1.104","TCP","74","44428 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916424 TSecr=0 WS=128" "28474","13.198710","172.30.1.104","172.30.1.205","TCP","66","135 > 44428 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28475","13.198721","172.30.1.205","172.30.1.104","TCP","54","44428 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28476","13.199072","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28477","13.199508","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28478","13.199517","172.30.1.205","172.30.1.104","TCP","54","44428 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28479","13.201738","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28480","13.202143","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28481","13.202150","172.30.1.205","172.30.1.104","TCP","54","44428 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28482","13.203971","172.30.1.205","172.30.1.104","TCP","54","44428 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28483","13.204084","172.30.1.205","172.30.1.104","TCP","74","37066 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916430 TSecr=0 WS=128" "28484","13.204311","172.30.1.104","172.30.1.205","TCP","54","135 > 44428 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28485","13.204320","172.30.1.104","172.30.1.205","TCP","54","135 > 44428 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28486","13.204325","172.30.1.205","172.30.1.104","TCP","54","44428 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28487","13.204436","172.30.1.104","172.30.1.205","TCP","66","49671 > 37066 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28488","13.204444","172.30.1.205","172.30.1.104","TCP","54","37066 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28489","13.204820","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28490","13.206350","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28491","13.206359","172.30.1.205","172.30.1.104","TCP","54","37066 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28492","13.208230","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28493","13.208681","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28494","13.208687","172.30.1.205","172.30.1.104","TCP","54","37066 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28495","13.210072","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28496","13.212477","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28497","13.212496","172.30.1.205","172.30.1.104","TCP","54","37066 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28498","13.213694","172.30.1.205","172.30.1.104","TCP","74","44432 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916440 TSecr=0 WS=128" "28499","13.214000","172.30.1.104","172.30.1.205","TCP","66","135 > 44432 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28500","13.214011","172.30.1.205","172.30.1.104","TCP","54","44432 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28501","13.214369","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28502","13.214701","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28503","13.214710","172.30.1.205","172.30.1.104","TCP","54","44432 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28504","13.216963","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28505","13.217397","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28506","13.217404","172.30.1.205","172.30.1.104","TCP","54","44432 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28507","13.219216","172.30.1.205","172.30.1.104","TCP","54","44432 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28508","13.219330","172.30.1.205","172.30.1.104","TCP","74","37070 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916445 TSecr=0 WS=128" "28509","13.219511","172.30.1.104","172.30.1.205","TCP","54","135 > 44432 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28510","13.219594","172.30.1.104","172.30.1.205","TCP","54","135 > 44432 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28511","13.219600","172.30.1.205","172.30.1.104","TCP","54","44432 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28512","13.219696","172.30.1.104","172.30.1.205","TCP","66","49671 > 37070 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28513","13.219712","172.30.1.205","172.30.1.104","TCP","54","37070 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28514","13.220060","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28515","13.220380","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28516","13.220388","172.30.1.205","172.30.1.104","TCP","54","37070 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28517","13.222315","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28518","13.222696","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28519","13.222703","172.30.1.205","172.30.1.104","TCP","54","37070 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28520","13.224057","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28521","13.226504","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28522","13.226518","172.30.1.205","172.30.1.104","TCP","54","37070 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28523","13.227538","172.30.1.205","172.30.1.104","TCP","74","44436 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916453 TSecr=0 WS=128" "28524","13.227866","172.30.1.104","172.30.1.205","TCP","66","135 > 44436 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28525","13.227878","172.30.1.205","172.30.1.104","TCP","54","44436 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28526","13.228235","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28527","13.228584","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28528","13.228593","172.30.1.205","172.30.1.104","TCP","54","44436 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28529","13.230819","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28530","13.231292","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28531","13.231298","172.30.1.205","172.30.1.104","TCP","54","44436 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28532","13.233128","172.30.1.205","172.30.1.104","TCP","54","44436 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28533","13.233237","172.30.1.205","172.30.1.104","TCP","74","37074 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916459 TSecr=0 WS=128" "28534","13.233426","172.30.1.104","172.30.1.205","TCP","54","135 > 44436 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28535","13.233463","172.30.1.104","172.30.1.205","TCP","54","135 > 44436 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28536","13.233469","172.30.1.205","172.30.1.104","TCP","54","44436 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28537","13.233544","172.30.1.104","172.30.1.205","TCP","66","49671 > 37074 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28538","13.233553","172.30.1.205","172.30.1.104","TCP","54","37074 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28539","13.233910","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28540","13.234219","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28541","13.234229","172.30.1.205","172.30.1.104","TCP","54","37074 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28542","13.236097","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28543","13.236548","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28544","13.236555","172.30.1.205","172.30.1.104","TCP","54","37074 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28545","13.237929","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28546","13.240312","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28547","13.240323","172.30.1.205","172.30.1.104","TCP","54","37074 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28548","13.241331","172.30.1.205","172.30.1.104","TCP","74","44440 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916467 TSecr=0 WS=128" "28549","13.241669","172.30.1.104","172.30.1.205","TCP","66","135 > 44440 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28550","13.241690","172.30.1.205","172.30.1.104","TCP","54","44440 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28551","13.242209","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28552","13.242497","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28553","13.242506","172.30.1.205","172.30.1.104","TCP","54","44440 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28554","13.244694","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28555","13.245143","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28556","13.245156","172.30.1.205","172.30.1.104","TCP","54","44440 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28557","13.246211","172.30.1.205","172.30.1.104","TCP","54","37034 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28558","13.246260","172.30.1.205","172.30.1.104","TCP","54","37038 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28559","13.246296","172.30.1.205","172.30.1.104","TCP","54","37042 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28560","13.246330","172.30.1.205","172.30.1.104","TCP","54","37046 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28561","13.246362","172.30.1.205","172.30.1.104","TCP","54","37050 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28562","13.246395","172.30.1.205","172.30.1.104","TCP","54","37054 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28563","13.246422","172.30.1.205","172.30.1.104","TCP","54","37058 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28564","13.246455","172.30.1.205","172.30.1.104","TCP","54","37062 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28565","13.246481","172.30.1.205","172.30.1.104","TCP","54","37066 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28566","13.246512","172.30.1.205","172.30.1.104","TCP","54","37070 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28567","13.246539","172.30.1.205","172.30.1.104","TCP","54","37074 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28568","13.246606","172.30.1.205","172.30.1.104","TCP","54","37030 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28569","13.246873","172.30.1.104","172.30.1.205","TCP","54","49671 > 37034 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28570","13.246890","172.30.1.104","172.30.1.205","TCP","54","49671 > 37038 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28571","13.246922","172.30.1.104","172.30.1.205","TCP","54","49671 > 37034 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28572","13.246929","172.30.1.205","172.30.1.104","TCP","54","37034 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28573","13.246942","172.30.1.104","172.30.1.205","TCP","54","49671 > 37042 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28574","13.247010","172.30.1.104","172.30.1.205","TCP","54","49671 > 37050 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28575","13.247028","172.30.1.104","172.30.1.205","TCP","54","49671 > 37046 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28576","13.247062","172.30.1.104","172.30.1.205","TCP","54","49671 > 37046 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28577","13.247066","172.30.1.205","172.30.1.104","TCP","54","37046 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28578","13.247083","172.30.1.104","172.30.1.205","TCP","54","49671 > 37050 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28579","13.247086","172.30.1.205","172.30.1.104","TCP","54","37050 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28580","13.247107","172.30.1.104","172.30.1.205","TCP","54","49671 > 37038 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28581","13.247109","172.30.1.205","172.30.1.104","TCP","54","37038 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28582","13.247127","172.30.1.104","172.30.1.205","TCP","54","49671 > 37054 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28583","13.247147","172.30.1.104","172.30.1.205","TCP","54","49671 > 37042 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28584","13.247151","172.30.1.205","172.30.1.104","TCP","54","37042 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28585","13.247169","172.30.1.104","172.30.1.205","TCP","54","49671 > 37058 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28586","13.247277","172.30.1.104","172.30.1.205","TCP","54","49671 > 37062 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28587","13.247296","172.30.1.104","172.30.1.205","TCP","54","49671 > 37054 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28588","13.247300","172.30.1.205","172.30.1.104","TCP","54","37054 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28589","13.247318","172.30.1.104","172.30.1.205","TCP","54","49671 > 37066 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28590","13.247344","172.30.1.104","172.30.1.205","TCP","54","49671 > 37070 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28591","13.247365","172.30.1.104","172.30.1.205","TCP","54","49671 > 37066 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28592","13.247368","172.30.1.205","172.30.1.104","TCP","54","37066 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28593","13.247390","172.30.1.104","172.30.1.205","TCP","54","49671 > 37058 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28594","13.247394","172.30.1.205","172.30.1.104","TCP","54","37058 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28595","13.247413","172.30.1.104","172.30.1.205","TCP","54","49671 > 37074 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28596","13.247748","172.30.1.104","172.30.1.205","TCP","54","49671 > 37030 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28597","13.247763","172.30.1.104","172.30.1.205","TCP","54","49671 > 37074 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28598","13.247768","172.30.1.205","172.30.1.104","TCP","54","37074 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28599","13.247791","172.30.1.104","172.30.1.205","TCP","54","49671 > 37070 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28600","13.247794","172.30.1.205","172.30.1.104","TCP","54","37070 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28601","13.247844","172.30.1.104","172.30.1.205","TCP","54","49671 > 37030 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28602","13.247848","172.30.1.205","172.30.1.104","TCP","54","37030 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28603","13.247862","172.30.1.104","172.30.1.205","TCP","54","49671 > 37062 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28604","13.247865","172.30.1.205","172.30.1.104","TCP","54","37062 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28605","13.248189","172.30.1.205","172.30.1.104","TCP","54","44440 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28606","13.248296","172.30.1.205","172.30.1.104","TCP","74","37078 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916474 TSecr=0 WS=128" "28607","13.248467","172.30.1.104","172.30.1.205","TCP","54","135 > 44440 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28608","13.248481","172.30.1.104","172.30.1.205","TCP","54","135 > 44440 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28609","13.248485","172.30.1.205","172.30.1.104","TCP","54","44440 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28610","13.248593","172.30.1.104","172.30.1.205","TCP","66","49671 > 37078 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28611","13.248601","172.30.1.205","172.30.1.104","TCP","54","37078 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28612","13.248988","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28613","13.249306","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28614","13.249315","172.30.1.205","172.30.1.104","TCP","54","37078 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28615","13.251184","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28616","13.251620","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28617","13.251626","172.30.1.205","172.30.1.104","TCP","54","37078 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28618","13.253005","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28619","13.255536","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28620","13.255545","172.30.1.205","172.30.1.104","TCP","54","37078 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28621","13.256471","172.30.1.205","172.30.1.104","TCP","74","44444 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916482 TSecr=0 WS=128" "28622","13.256866","172.30.1.104","172.30.1.205","TCP","66","135 > 44444 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28623","13.256877","172.30.1.205","172.30.1.104","TCP","54","44444 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28624","13.257231","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28625","13.257529","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28626","13.257538","172.30.1.205","172.30.1.104","TCP","54","44444 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28627","13.259708","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28628","13.260110","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28629","13.260116","172.30.1.205","172.30.1.104","TCP","54","44444 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28630","13.261939","172.30.1.205","172.30.1.104","TCP","54","44444 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28631","13.262047","172.30.1.205","172.30.1.104","TCP","74","37082 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916488 TSecr=0 WS=128" "28632","13.262204","172.30.1.104","172.30.1.205","TCP","54","135 > 44444 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28633","13.262244","172.30.1.104","172.30.1.205","TCP","54","135 > 44444 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28634","13.262249","172.30.1.205","172.30.1.104","TCP","54","44444 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28635","13.262347","172.30.1.104","172.30.1.205","TCP","66","49671 > 37082 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28636","13.262355","172.30.1.205","172.30.1.104","TCP","54","37082 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28637","13.262696","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28638","13.263001","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28639","13.263010","172.30.1.205","172.30.1.104","TCP","54","37082 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28640","13.264908","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28641","13.265291","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28642","13.265297","172.30.1.205","172.30.1.104","TCP","54","37082 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28643","13.266642","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28644","13.269091","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28645","13.269109","172.30.1.205","172.30.1.104","TCP","54","37082 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28646","13.270089","172.30.1.205","172.30.1.104","TCP","74","44448 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916496 TSecr=0 WS=128" "28647","13.270410","172.30.1.104","172.30.1.205","TCP","66","135 > 44448 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28648","13.270420","172.30.1.205","172.30.1.104","TCP","54","44448 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28649","13.270767","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28650","13.271107","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28651","13.271115","172.30.1.205","172.30.1.104","TCP","54","44448 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28652","13.273326","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28653","13.273727","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28654","13.273733","172.30.1.205","172.30.1.104","TCP","54","44448 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28655","13.275538","172.30.1.205","172.30.1.104","TCP","54","44448 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28656","13.275645","172.30.1.205","172.30.1.104","TCP","74","37086 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916502 TSecr=0 WS=128" "28657","13.275857","172.30.1.104","172.30.1.205","TCP","54","135 > 44448 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28658","13.275871","172.30.1.104","172.30.1.205","TCP","54","135 > 44448 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28659","13.275876","172.30.1.205","172.30.1.104","TCP","54","44448 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28660","13.275981","172.30.1.104","172.30.1.205","TCP","66","49671 > 37086 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28661","13.275988","172.30.1.205","172.30.1.104","TCP","54","37086 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28662","13.276335","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28663","13.276645","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28664","13.276653","172.30.1.205","172.30.1.104","TCP","54","37086 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28665","13.278539","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28666","13.278936","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28667","13.278942","172.30.1.205","172.30.1.104","TCP","54","37086 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28668","13.280280","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28669","13.282676","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28670","13.282685","172.30.1.205","172.30.1.104","TCP","54","37086 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28671","13.283624","172.30.1.205","172.30.1.104","TCP","74","44452 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916510 TSecr=0 WS=128" "28672","13.283909","172.30.1.104","172.30.1.205","TCP","66","135 > 44452 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28673","13.283920","172.30.1.205","172.30.1.104","TCP","54","44452 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28674","13.284266","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28675","13.284560","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28676","13.284569","172.30.1.205","172.30.1.104","TCP","54","44452 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28677","13.286780","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28678","13.287257","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28679","13.287264","172.30.1.205","172.30.1.104","TCP","54","44452 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28680","13.289106","172.30.1.205","172.30.1.104","TCP","54","44452 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28681","13.289215","172.30.1.205","172.30.1.104","TCP","74","37090 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916515 TSecr=0 WS=128" "28682","13.289438","172.30.1.104","172.30.1.205","TCP","54","135 > 44452 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28683","13.289453","172.30.1.104","172.30.1.205","TCP","54","135 > 44452 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28684","13.289458","172.30.1.205","172.30.1.104","TCP","54","44452 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28685","13.289543","172.30.1.104","172.30.1.205","TCP","66","49671 > 37090 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28686","13.289551","172.30.1.205","172.30.1.104","TCP","54","37090 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28687","13.289896","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28688","13.290687","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28689","13.290694","172.30.1.205","172.30.1.104","TCP","54","37090 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28690","13.292551","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28691","13.292945","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28692","13.292952","172.30.1.205","172.30.1.104","TCP","54","37090 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28693","13.294310","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28694","13.296760","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28695","13.296769","172.30.1.205","172.30.1.104","TCP","54","37090 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28696","13.297729","172.30.1.205","172.30.1.104","TCP","74","44456 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916524 TSecr=0 WS=128" "28697","13.298044","172.30.1.104","172.30.1.205","TCP","66","135 > 44456 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28698","13.298054","172.30.1.205","172.30.1.104","TCP","54","44456 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28699","13.298401","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28700","13.298703","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28701","13.298712","172.30.1.205","172.30.1.104","TCP","54","44456 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28702","13.300919","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28703","13.301325","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28704","13.301332","172.30.1.205","172.30.1.104","TCP","54","44456 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28705","13.303138","172.30.1.205","172.30.1.104","TCP","54","44456 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28706","13.303250","172.30.1.205","172.30.1.104","TCP","74","37094 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916529 TSecr=0 WS=128" "28707","13.303444","172.30.1.104","172.30.1.205","TCP","54","135 > 44456 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28708","13.303546","172.30.1.104","172.30.1.205","TCP","54","135 > 44456 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28709","13.303551","172.30.1.205","172.30.1.104","TCP","54","44456 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28710","13.303592","172.30.1.104","172.30.1.205","TCP","66","49671 > 37094 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28711","13.303600","172.30.1.205","172.30.1.104","TCP","54","37094 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28712","13.303942","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28713","13.304252","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28714","13.304259","172.30.1.205","172.30.1.104","TCP","54","37094 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28715","13.306150","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28716","13.306531","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28717","13.306537","172.30.1.205","172.30.1.104","TCP","54","37094 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28718","13.307885","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28719","13.310885","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28720","13.310895","172.30.1.205","172.30.1.104","TCP","54","37094 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28721","13.311877","172.30.1.205","172.30.1.104","TCP","74","44460 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916538 TSecr=0 WS=128" "28722","13.312218","172.30.1.104","172.30.1.205","TCP","66","135 > 44460 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28723","13.312229","172.30.1.205","172.30.1.104","TCP","54","44460 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28724","13.312579","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28725","13.312906","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28726","13.312915","172.30.1.205","172.30.1.104","TCP","54","44460 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28727","13.315118","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28728","13.315552","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28729","13.315558","172.30.1.205","172.30.1.104","TCP","54","44460 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28730","13.317392","172.30.1.205","172.30.1.104","TCP","54","44460 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28731","13.317502","172.30.1.205","172.30.1.104","TCP","74","37098 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916543 TSecr=0 WS=128" "28732","13.317703","172.30.1.104","172.30.1.205","TCP","54","135 > 44460 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28733","13.317713","172.30.1.104","172.30.1.205","TCP","54","135 > 44460 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28734","13.317719","172.30.1.205","172.30.1.104","TCP","54","44460 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28735","13.317761","172.30.1.104","172.30.1.205","TCP","66","49671 > 37098 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28736","13.317769","172.30.1.205","172.30.1.104","TCP","54","37098 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28737","13.318121","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28738","13.318473","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28739","13.318480","172.30.1.205","172.30.1.104","TCP","54","37098 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28740","13.320352","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28741","13.320732","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28742","13.320739","172.30.1.205","172.30.1.104","TCP","54","37098 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28743","13.322119","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28744","13.324558","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28745","13.324567","172.30.1.205","172.30.1.104","TCP","54","37098 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28746","13.325531","172.30.1.205","172.30.1.104","TCP","74","44464 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916551 TSecr=0 WS=128" "28747","13.325854","172.30.1.104","172.30.1.205","TCP","66","135 > 44464 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28748","13.325864","172.30.1.205","172.30.1.104","TCP","54","44464 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28749","13.326213","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28750","13.326518","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28751","13.326526","172.30.1.205","172.30.1.104","TCP","54","44464 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28752","13.328688","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28753","13.329092","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28754","13.329099","172.30.1.205","172.30.1.104","TCP","54","44464 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28755","13.330900","172.30.1.205","172.30.1.104","TCP","54","44464 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28756","13.331009","172.30.1.205","172.30.1.104","TCP","74","37102 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916557 TSecr=0 WS=128" "28757","13.331178","172.30.1.104","172.30.1.205","TCP","54","135 > 44464 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28758","13.331214","172.30.1.104","172.30.1.205","TCP","54","135 > 44464 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28759","13.331220","172.30.1.205","172.30.1.104","TCP","54","44464 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28760","13.331313","172.30.1.104","172.30.1.205","TCP","66","49671 > 37102 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28761","13.331321","172.30.1.205","172.30.1.104","TCP","54","37102 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28762","13.331663","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28763","13.331967","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28764","13.331973","172.30.1.205","172.30.1.104","TCP","54","37102 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28765","13.333850","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28766","13.335149","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28767","13.335155","172.30.1.205","172.30.1.104","TCP","54","37102 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28768","13.336494","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28769","13.338968","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28770","13.338977","172.30.1.205","172.30.1.104","TCP","54","37102 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28771","13.339939","172.30.1.205","172.30.1.104","TCP","74","44468 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916566 TSecr=0 WS=128" "28772","13.340254","172.30.1.104","172.30.1.205","TCP","66","135 > 44468 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28773","13.340265","172.30.1.205","172.30.1.104","TCP","54","44468 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28774","13.340611","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28775","13.340935","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28776","13.340944","172.30.1.205","172.30.1.104","TCP","54","44468 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28777","13.343130","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28778","13.343537","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28779","13.343543","172.30.1.205","172.30.1.104","TCP","54","44468 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28780","13.345405","172.30.1.205","172.30.1.104","TCP","54","44468 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28781","13.345514","172.30.1.205","172.30.1.104","TCP","74","37106 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916571 TSecr=0 WS=128" "28782","13.345739","172.30.1.104","172.30.1.205","TCP","54","135 > 44468 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28783","13.345753","172.30.1.104","172.30.1.205","TCP","54","135 > 44468 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28784","13.345759","172.30.1.205","172.30.1.104","TCP","54","44468 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28785","13.345831","172.30.1.104","172.30.1.205","TCP","66","49671 > 37106 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28786","13.345839","172.30.1.205","172.30.1.104","TCP","54","37106 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28787","13.346186","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28788","13.346493","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28789","13.346501","172.30.1.205","172.30.1.104","TCP","54","37106 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28790","13.348368","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28791","13.348828","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28792","13.348834","172.30.1.205","172.30.1.104","TCP","54","37106 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28793","13.350191","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28794","13.352641","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28795","13.352650","172.30.1.205","172.30.1.104","TCP","54","37106 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28796","13.353594","172.30.1.205","172.30.1.104","TCP","74","44472 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916580 TSecr=0 WS=128" "28797","13.353900","172.30.1.104","172.30.1.205","TCP","66","135 > 44472 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28798","13.353910","172.30.1.205","172.30.1.104","TCP","54","44472 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28799","13.354256","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28800","13.354558","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28801","13.354566","172.30.1.205","172.30.1.104","TCP","54","44472 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28802","13.356718","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28803","13.357165","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28804","13.357172","172.30.1.205","172.30.1.104","TCP","54","44472 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28805","13.358965","172.30.1.205","172.30.1.104","TCP","54","44472 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28806","13.359074","172.30.1.205","172.30.1.104","TCP","74","37110 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916585 TSecr=0 WS=128" "28807","13.359260","172.30.1.104","172.30.1.205","TCP","54","135 > 44472 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28808","13.359288","172.30.1.104","172.30.1.205","TCP","54","135 > 44472 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28809","13.359293","172.30.1.205","172.30.1.104","TCP","54","44472 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28810","13.359380","172.30.1.104","172.30.1.205","TCP","66","49671 > 37110 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28811","13.359388","172.30.1.205","172.30.1.104","TCP","54","37110 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28812","13.359730","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28813","13.360029","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28814","13.360037","172.30.1.205","172.30.1.104","TCP","54","37110 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28815","13.361914","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28816","13.362287","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28817","13.362291","172.30.1.205","172.30.1.104","TCP","54","37110 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28818","13.363643","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28819","13.366106","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28820","13.366115","172.30.1.205","172.30.1.104","TCP","54","37110 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28821","13.367045","172.30.1.205","172.30.1.104","TCP","74","44476 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916593 TSecr=0 WS=128" "28822","13.367375","172.30.1.104","172.30.1.205","TCP","66","135 > 44476 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28823","13.367386","172.30.1.205","172.30.1.104","TCP","54","44476 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28824","13.367731","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28825","13.368037","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28826","13.368045","172.30.1.205","172.30.1.104","TCP","54","44476 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28827","13.370238","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28828","13.370654","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28829","13.370661","172.30.1.205","172.30.1.104","TCP","54","44476 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28830","13.372461","172.30.1.205","172.30.1.104","TCP","54","44476 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28831","13.372570","172.30.1.205","172.30.1.104","TCP","74","37114 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916598 TSecr=0 WS=128" "28832","13.372756","172.30.1.104","172.30.1.205","TCP","54","135 > 44476 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28833","13.372791","172.30.1.104","172.30.1.205","TCP","54","135 > 44476 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28834","13.372798","172.30.1.205","172.30.1.104","TCP","54","44476 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28835","13.372838","172.30.1.104","172.30.1.205","TCP","66","49671 > 37114 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28836","13.372847","172.30.1.205","172.30.1.104","TCP","54","37114 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28837","13.373199","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28838","13.373520","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28839","13.373528","172.30.1.205","172.30.1.104","TCP","54","37114 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28840","13.375380","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28841","13.375794","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28842","13.375801","172.30.1.205","172.30.1.104","TCP","54","37114 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28843","13.377190","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28844","13.379778","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28845","13.379787","172.30.1.205","172.30.1.104","TCP","54","37114 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28846","13.380717","172.30.1.205","172.30.1.104","TCP","74","44480 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916607 TSecr=0 WS=128" "28847","13.381037","172.30.1.104","172.30.1.205","TCP","66","135 > 44480 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28848","13.381048","172.30.1.205","172.30.1.104","TCP","54","44480 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28849","13.381406","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28850","13.381728","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28851","13.381736","172.30.1.205","172.30.1.104","TCP","54","44480 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28852","13.383924","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28853","13.384344","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28854","13.384350","172.30.1.205","172.30.1.104","TCP","54","44480 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28855","13.386163","172.30.1.205","172.30.1.104","TCP","54","44480 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28856","13.386274","172.30.1.205","172.30.1.104","TCP","74","37118 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916612 TSecr=0 WS=128" "28857","13.386433","172.30.1.104","172.30.1.205","TCP","54","135 > 44480 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28858","13.386461","172.30.1.104","172.30.1.205","TCP","54","135 > 44480 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28859","13.386466","172.30.1.205","172.30.1.104","TCP","54","44480 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28860","13.386602","172.30.1.104","172.30.1.205","TCP","66","49671 > 37118 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28861","13.386610","172.30.1.205","172.30.1.104","TCP","54","37118 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28862","13.386954","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28863","13.387249","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28864","13.387257","172.30.1.205","172.30.1.104","TCP","54","37118 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28865","13.389165","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28866","13.389534","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28867","13.389540","172.30.1.205","172.30.1.104","TCP","54","37118 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28868","13.390874","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28869","13.393448","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28870","13.393459","172.30.1.205","172.30.1.104","TCP","54","37118 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28871","13.394421","172.30.1.205","172.30.1.104","TCP","74","44484 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916620 TSecr=0 WS=128" "28872","13.394722","172.30.1.104","172.30.1.205","TCP","66","135 > 44484 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28873","13.394732","172.30.1.205","172.30.1.104","TCP","54","44484 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28874","13.395076","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28875","13.395389","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28876","13.395398","172.30.1.205","172.30.1.104","TCP","54","44484 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28877","13.397592","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28878","13.398014","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28879","13.398021","172.30.1.205","172.30.1.104","TCP","54","44484 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28880","13.399843","172.30.1.205","172.30.1.104","TCP","54","44484 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28881","13.399951","172.30.1.205","172.30.1.104","TCP","74","37122 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916626 TSecr=0 WS=128" "28882","13.400161","172.30.1.104","172.30.1.205","TCP","54","135 > 44484 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28883","13.400169","172.30.1.104","172.30.1.205","TCP","54","135 > 44484 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28884","13.400174","172.30.1.205","172.30.1.104","TCP","54","44484 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28885","13.400244","172.30.1.104","172.30.1.205","TCP","66","49671 > 37122 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28886","13.400252","172.30.1.205","172.30.1.104","TCP","54","37122 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28887","13.400592","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28888","13.400886","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28889","13.400895","172.30.1.205","172.30.1.104","TCP","54","37122 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28890","13.402752","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28891","13.403155","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28892","13.403162","172.30.1.205","172.30.1.104","TCP","54","37122 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28893","13.404541","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28894","13.407017","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28895","13.407026","172.30.1.205","172.30.1.104","TCP","54","37122 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28896","13.407968","172.30.1.205","172.30.1.104","TCP","74","44488 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916634 TSecr=0 WS=128" "28897","13.408294","172.30.1.104","172.30.1.205","TCP","66","135 > 44488 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28898","13.408304","172.30.1.205","172.30.1.104","TCP","54","44488 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28899","13.408668","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28900","13.408959","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28901","13.408968","172.30.1.205","172.30.1.104","TCP","54","44488 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28902","13.411139","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28903","13.411568","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28904","13.411574","172.30.1.205","172.30.1.104","TCP","54","44488 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28905","13.412416","172.30.1.205","172.30.1.104","TCP","54","37082 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28906","13.412463","172.30.1.205","172.30.1.104","TCP","54","37086 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28907","13.412499","172.30.1.205","172.30.1.104","TCP","54","37090 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28908","13.412531","172.30.1.205","172.30.1.104","TCP","54","37094 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28909","13.412563","172.30.1.205","172.30.1.104","TCP","54","37098 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28910","13.412590","172.30.1.205","172.30.1.104","TCP","54","37102 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28911","13.412617","172.30.1.205","172.30.1.104","TCP","54","37106 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28912","13.412644","172.30.1.205","172.30.1.104","TCP","54","37110 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28913","13.412681","172.30.1.205","172.30.1.104","TCP","54","37114 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28914","13.412712","172.30.1.205","172.30.1.104","TCP","54","37118 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28915","13.412743","172.30.1.205","172.30.1.104","TCP","54","37122 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28916","13.412840","172.30.1.205","172.30.1.104","TCP","54","37078 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "28917","13.413063","172.30.1.104","172.30.1.205","TCP","54","49671 > 37082 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28918","13.413072","172.30.1.104","172.30.1.205","TCP","54","49671 > 37086 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28919","13.413088","172.30.1.104","172.30.1.205","TCP","54","49671 > 37082 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28920","13.413094","172.30.1.205","172.30.1.104","TCP","54","37082 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28921","13.413100","172.30.1.104","172.30.1.205","TCP","54","49671 > 37090 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28922","13.413105","172.30.1.104","172.30.1.205","TCP","54","49671 > 37094 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28923","13.413207","172.30.1.104","172.30.1.205","TCP","54","49671 > 37094 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28924","13.413212","172.30.1.205","172.30.1.104","TCP","54","37094 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28925","13.413218","172.30.1.104","172.30.1.205","TCP","54","49671 > 37098 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28926","13.413223","172.30.1.104","172.30.1.205","TCP","54","49671 > 37086 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28927","13.413225","172.30.1.205","172.30.1.104","TCP","54","37086 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28928","13.413400","172.30.1.104","172.30.1.205","TCP","54","49671 > 37102 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28929","13.413458","172.30.1.104","172.30.1.205","TCP","54","49671 > 37106 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28930","13.413463","172.30.1.104","172.30.1.205","TCP","54","49671 > 37102 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28931","13.413468","172.30.1.205","172.30.1.104","TCP","54","37102 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28932","13.413474","172.30.1.104","172.30.1.205","TCP","54","49671 > 37110 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28933","13.413478","172.30.1.104","172.30.1.205","TCP","54","49671 > 37098 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28934","13.413484","172.30.1.205","172.30.1.104","TCP","54","37098 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28935","13.413486","172.30.1.104","172.30.1.205","TCP","54","49671 > 37110 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28936","13.413487","172.30.1.205","172.30.1.104","TCP","54","37110 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28937","13.413488","172.30.1.104","172.30.1.205","TCP","54","49671 > 37114 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28938","13.413491","172.30.1.104","172.30.1.205","TCP","54","49671 > 37106 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28939","13.413493","172.30.1.205","172.30.1.104","TCP","54","37106 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28940","13.413494","172.30.1.104","172.30.1.205","TCP","54","49671 > 37118 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28941","13.413496","172.30.1.104","172.30.1.205","TCP","54","49671 > 37118 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28942","13.413498","172.30.1.205","172.30.1.104","TCP","54","37118 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28943","13.413849","172.30.1.104","172.30.1.205","TCP","54","49671 > 37122 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28944","13.413856","172.30.1.104","172.30.1.205","TCP","54","49671 > 37114 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28945","13.413860","172.30.1.205","172.30.1.104","TCP","54","37114 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28946","13.413869","172.30.1.104","172.30.1.205","TCP","54","49671 > 37122 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28947","13.413871","172.30.1.205","172.30.1.104","TCP","54","37122 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28948","13.413903","172.30.1.104","172.30.1.205","TCP","54","49671 > 37090 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28949","13.413907","172.30.1.205","172.30.1.104","TCP","54","37090 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28950","13.413959","172.30.1.104","172.30.1.205","TCP","54","49671 > 37078 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28951","13.414010","172.30.1.104","172.30.1.205","TCP","54","49671 > 37078 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "28952","13.414015","172.30.1.205","172.30.1.104","TCP","54","37078 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "28953","13.414372","172.30.1.205","172.30.1.104","TCP","54","44488 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28954","13.414481","172.30.1.205","172.30.1.104","TCP","74","37126 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916640 TSecr=0 WS=128" "28955","13.414660","172.30.1.104","172.30.1.205","TCP","54","135 > 44488 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28956","13.414690","172.30.1.104","172.30.1.205","TCP","54","135 > 44488 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28957","13.414694","172.30.1.205","172.30.1.104","TCP","54","44488 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28958","13.414799","172.30.1.104","172.30.1.205","TCP","66","49671 > 37126 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28959","13.414807","172.30.1.205","172.30.1.104","TCP","54","37126 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28960","13.415157","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28961","13.415996","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28962","13.416004","172.30.1.205","172.30.1.104","TCP","54","37126 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28963","13.417914","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28964","13.418316","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28965","13.418322","172.30.1.205","172.30.1.104","TCP","54","37126 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28966","13.419664","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28967","13.422093","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28968","13.422108","172.30.1.205","172.30.1.104","TCP","54","37126 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28969","13.423154","172.30.1.205","172.30.1.104","TCP","74","44492 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916649 TSecr=0 WS=128" "28970","13.423510","172.30.1.104","172.30.1.205","TCP","66","135 > 44492 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28971","13.423524","172.30.1.205","172.30.1.104","TCP","54","44492 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28972","13.423902","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28973","13.424216","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28974","13.424225","172.30.1.205","172.30.1.104","TCP","54","44492 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28975","13.426468","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "28976","13.426889","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "28977","13.426896","172.30.1.205","172.30.1.104","TCP","54","44492 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "28978","13.428720","172.30.1.205","172.30.1.104","TCP","54","44492 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "28979","13.428858","172.30.1.205","172.30.1.104","TCP","74","37130 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916655 TSecr=0 WS=128" "28980","13.429005","172.30.1.104","172.30.1.205","TCP","54","135 > 44492 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28981","13.429038","172.30.1.104","172.30.1.205","TCP","54","135 > 44492 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "28982","13.429044","172.30.1.205","172.30.1.104","TCP","54","44492 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "28983","13.429179","172.30.1.104","172.30.1.205","TCP","66","49671 > 37130 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28984","13.429188","172.30.1.205","172.30.1.104","TCP","54","37130 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28985","13.429533","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "28986","13.429820","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28987","13.429829","172.30.1.205","172.30.1.104","TCP","54","37130 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "28988","13.431755","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "28989","13.432141","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "28990","13.432148","172.30.1.205","172.30.1.104","TCP","54","37130 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "28991","13.433558","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "28992","13.436001","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "28993","13.436013","172.30.1.205","172.30.1.104","TCP","54","37130 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "28994","13.436985","172.30.1.205","172.30.1.104","TCP","74","44496 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916663 TSecr=0 WS=128" "28995","13.437367","172.30.1.104","172.30.1.205","TCP","66","135 > 44496 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "28996","13.437378","172.30.1.205","172.30.1.104","TCP","54","44496 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "28997","13.437727","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "28998","13.438026","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "28999","13.438036","172.30.1.205","172.30.1.104","TCP","54","44496 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29000","13.440224","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29001","13.440645","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29002","13.440652","172.30.1.205","172.30.1.104","TCP","54","44496 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29003","13.442477","172.30.1.205","172.30.1.104","TCP","54","44496 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29004","13.442592","172.30.1.205","172.30.1.104","TCP","74","37134 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916669 TSecr=0 WS=128" "29005","13.442769","172.30.1.104","172.30.1.205","TCP","54","135 > 44496 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29006","13.442842","172.30.1.104","172.30.1.205","TCP","54","135 > 44496 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29007","13.442848","172.30.1.205","172.30.1.104","TCP","54","44496 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29008","13.442947","172.30.1.104","172.30.1.205","TCP","66","49671 > 37134 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29009","13.442959","172.30.1.205","172.30.1.104","TCP","54","37134 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29010","13.443307","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29011","13.443700","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29012","13.443709","172.30.1.205","172.30.1.104","TCP","54","37134 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29013","13.445665","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29014","13.446039","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29015","13.446046","172.30.1.205","172.30.1.104","TCP","54","37134 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29016","13.447395","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29017","13.449926","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29018","13.449935","172.30.1.205","172.30.1.104","TCP","54","37134 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29019","13.450888","172.30.1.205","172.30.1.104","TCP","74","44500 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916677 TSecr=0 WS=128" "29020","13.451214","172.30.1.104","172.30.1.205","TCP","66","135 > 44500 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29021","13.451224","172.30.1.205","172.30.1.104","TCP","54","44500 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29022","13.451580","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29023","13.451878","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29024","13.451896","172.30.1.205","172.30.1.104","TCP","54","44500 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29025","13.454120","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29026","13.454590","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29027","13.454597","172.30.1.205","172.30.1.104","TCP","54","44500 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29028","13.456412","172.30.1.205","172.30.1.104","TCP","54","44500 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29029","13.456523","172.30.1.205","172.30.1.104","TCP","74","37138 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916682 TSecr=0 WS=128" "29030","13.456698","172.30.1.104","172.30.1.205","TCP","54","135 > 44500 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29031","13.456731","172.30.1.104","172.30.1.205","TCP","54","135 > 44500 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29032","13.456736","172.30.1.205","172.30.1.104","TCP","54","44500 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29033","13.456844","172.30.1.104","172.30.1.205","TCP","66","49671 > 37138 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29034","13.456854","172.30.1.205","172.30.1.104","TCP","54","37138 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29035","13.457229","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29036","13.457532","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29037","13.457540","172.30.1.205","172.30.1.104","TCP","54","37138 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29038","13.459412","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29039","13.459814","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29040","13.459820","172.30.1.205","172.30.1.104","TCP","54","37138 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29041","13.461207","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29042","13.463636","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29043","13.463645","172.30.1.205","172.30.1.104","TCP","54","37138 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29044","13.464568","172.30.1.205","172.30.1.104","TCP","74","44504 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916690 TSecr=0 WS=128" "29045","13.464882","172.30.1.104","172.30.1.205","TCP","66","135 > 44504 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29046","13.464894","172.30.1.205","172.30.1.104","TCP","54","44504 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29047","13.465251","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29048","13.465555","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29049","13.465563","172.30.1.205","172.30.1.104","TCP","54","44504 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29050","13.467738","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29051","13.468154","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29052","13.468166","172.30.1.205","172.30.1.104","TCP","54","44504 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29053","13.470149","172.30.1.205","172.30.1.104","TCP","54","44504 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29054","13.470274","172.30.1.205","172.30.1.104","TCP","74","37142 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916696 TSecr=0 WS=128" "29055","13.470453","172.30.1.104","172.30.1.205","TCP","54","135 > 44504 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29056","13.470486","172.30.1.104","172.30.1.205","TCP","54","135 > 44504 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29057","13.470491","172.30.1.205","172.30.1.104","TCP","54","44504 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29058","13.470564","172.30.1.104","172.30.1.205","TCP","66","49671 > 37142 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29059","13.470573","172.30.1.205","172.30.1.104","TCP","54","37142 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29060","13.470918","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29061","13.471786","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29062","13.471795","172.30.1.205","172.30.1.104","TCP","54","37142 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29063","13.473686","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29064","13.474061","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29065","13.474068","172.30.1.205","172.30.1.104","TCP","54","37142 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29066","13.475411","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29067","13.478308","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29068","13.478318","172.30.1.205","172.30.1.104","TCP","54","37142 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29069","13.479260","172.30.1.205","172.30.1.104","TCP","74","44508 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916705 TSecr=0 WS=128" "29070","13.479578","172.30.1.104","172.30.1.205","TCP","66","135 > 44508 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29071","13.479592","172.30.1.205","172.30.1.104","TCP","54","44508 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29072","13.479956","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29073","13.480265","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29074","13.480274","172.30.1.205","172.30.1.104","TCP","54","44508 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29075","13.482517","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29076","13.482928","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29077","13.482940","172.30.1.205","172.30.1.104","TCP","54","44508 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29078","13.484919","172.30.1.205","172.30.1.104","TCP","54","44508 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29079","13.485029","172.30.1.205","172.30.1.104","TCP","74","37146 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916711 TSecr=0 WS=128" "29080","13.485188","172.30.1.104","172.30.1.205","TCP","54","135 > 44508 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29081","13.485223","172.30.1.104","172.30.1.205","TCP","54","135 > 44508 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29082","13.485228","172.30.1.205","172.30.1.104","TCP","54","44508 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29083","13.485325","172.30.1.104","172.30.1.205","TCP","66","49671 > 37146 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29084","13.485334","172.30.1.205","172.30.1.104","TCP","54","37146 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29085","13.485681","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29086","13.486655","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29087","13.486664","172.30.1.205","172.30.1.104","TCP","54","37146 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29088","13.488544","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29089","13.489001","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29090","13.489014","172.30.1.205","172.30.1.104","TCP","54","37146 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29091","13.490529","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29092","13.492848","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29093","13.492857","172.30.1.205","172.30.1.104","TCP","54","37146 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29094","13.493795","172.30.1.205","172.30.1.104","TCP","74","44512 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916720 TSecr=0 WS=128" "29095","13.494096","172.30.1.104","172.30.1.205","TCP","66","135 > 44512 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29096","13.494107","172.30.1.205","172.30.1.104","TCP","54","44512 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29097","13.494455","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29098","13.494767","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29099","13.494776","172.30.1.205","172.30.1.104","TCP","54","44512 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29100","13.497020","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29101","13.497428","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29102","13.497434","172.30.1.205","172.30.1.104","TCP","54","44512 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29103","13.499240","172.30.1.205","172.30.1.104","TCP","54","44512 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29104","13.499351","172.30.1.205","172.30.1.104","TCP","74","37150 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916725 TSecr=0 WS=128" "29105","13.499523","172.30.1.104","172.30.1.205","TCP","54","135 > 44512 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29106","13.499563","172.30.1.104","172.30.1.205","TCP","54","135 > 44512 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29107","13.499568","172.30.1.205","172.30.1.104","TCP","54","44512 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29108","13.499606","172.30.1.104","172.30.1.205","TCP","66","49671 > 37150 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29109","13.499614","172.30.1.205","172.30.1.104","TCP","54","37150 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29110","13.499956","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29111","13.500263","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29112","13.500272","172.30.1.205","172.30.1.104","TCP","54","37150 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29113","13.502182","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29114","13.502556","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29115","13.502562","172.30.1.205","172.30.1.104","TCP","54","37150 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29116","13.503912","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29117","13.506316","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29118","13.506325","172.30.1.205","172.30.1.104","TCP","54","37150 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29119","13.507271","172.30.1.205","172.30.1.104","TCP","74","44516 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916733 TSecr=0 WS=128" "29120","13.507577","172.30.1.104","172.30.1.205","TCP","66","135 > 44516 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29121","13.507587","172.30.1.205","172.30.1.104","TCP","54","44516 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29122","13.507938","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29123","13.508244","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29124","13.508254","172.30.1.205","172.30.1.104","TCP","54","44516 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29125","13.510478","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29126","13.510902","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29127","13.510908","172.30.1.205","172.30.1.104","TCP","54","44516 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29128","13.512728","172.30.1.205","172.30.1.104","TCP","54","44516 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29129","13.512865","172.30.1.205","172.30.1.104","TCP","74","37154 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916739 TSecr=0 WS=128" "29130","13.513030","172.30.1.104","172.30.1.205","TCP","54","135 > 44516 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29131","13.513066","172.30.1.104","172.30.1.205","TCP","54","135 > 44516 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29132","13.513073","172.30.1.205","172.30.1.104","TCP","54","44516 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29133","13.513149","172.30.1.104","172.30.1.205","TCP","66","49671 > 37154 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29134","13.513156","172.30.1.205","172.30.1.104","TCP","54","37154 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29135","13.513502","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29136","13.513800","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29137","13.513809","172.30.1.205","172.30.1.104","TCP","54","37154 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29138","13.515678","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29139","13.516066","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29140","13.516073","172.30.1.205","172.30.1.104","TCP","54","37154 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29141","13.517479","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29142","13.519971","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29143","13.519981","172.30.1.205","172.30.1.104","TCP","54","37154 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29144","13.521057","172.30.1.205","172.30.1.104","TCP","74","44520 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916747 TSecr=0 WS=128" "29145","13.521389","172.30.1.104","172.30.1.205","TCP","66","135 > 44520 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29146","13.521400","172.30.1.205","172.30.1.104","TCP","54","44520 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29147","13.521762","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29148","13.522059","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29149","13.522068","172.30.1.205","172.30.1.104","TCP","54","44520 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29150","13.524326","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29151","13.524729","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29152","13.524739","172.30.1.205","172.30.1.104","TCP","54","44520 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29153","13.526651","172.30.1.205","172.30.1.104","TCP","54","44520 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29154","13.526776","172.30.1.205","172.30.1.104","TCP","74","37158 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916753 TSecr=0 WS=128" "29155","13.526947","172.30.1.104","172.30.1.205","TCP","54","135 > 44520 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29156","13.527028","172.30.1.104","172.30.1.205","TCP","54","135 > 44520 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29157","13.527034","172.30.1.205","172.30.1.104","TCP","54","44520 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29158","13.527104","172.30.1.104","172.30.1.205","TCP","66","49671 > 37158 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29159","13.527113","172.30.1.205","172.30.1.104","TCP","54","37158 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29160","13.527470","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29161","13.527786","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29162","13.527793","172.30.1.205","172.30.1.104","TCP","54","37158 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29163","13.529700","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29164","13.530059","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29165","13.530066","172.30.1.205","172.30.1.104","TCP","54","37158 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29166","13.531501","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29167","13.534011","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29168","13.534022","172.30.1.205","172.30.1.104","TCP","54","37158 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29169","13.535012","172.30.1.205","172.30.1.104","TCP","74","44524 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916761 TSecr=0 WS=128" "29170","13.535356","172.30.1.104","172.30.1.205","TCP","66","135 > 44524 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29171","13.535369","172.30.1.205","172.30.1.104","TCP","54","44524 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29172","13.535731","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29173","13.536068","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29174","13.536086","172.30.1.205","172.30.1.104","TCP","54","44524 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29175","13.538560","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29176","13.538990","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29177","13.538997","172.30.1.205","172.30.1.104","TCP","54","44524 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29178","13.540859","172.30.1.205","172.30.1.104","TCP","54","44524 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29179","13.540971","172.30.1.205","172.30.1.104","TCP","74","37162 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916767 TSecr=0 WS=128" "29180","13.541150","172.30.1.104","172.30.1.205","TCP","54","135 > 44524 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29181","13.541193","172.30.1.104","172.30.1.205","TCP","54","135 > 44524 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29182","13.541198","172.30.1.205","172.30.1.104","TCP","54","44524 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29183","13.541261","172.30.1.104","172.30.1.205","TCP","66","49671 > 37162 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29184","13.541269","172.30.1.205","172.30.1.104","TCP","54","37162 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29185","13.541625","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29186","13.541922","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29187","13.541932","172.30.1.205","172.30.1.104","TCP","54","37162 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29188","13.543854","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29189","13.544253","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29190","13.544259","172.30.1.205","172.30.1.104","TCP","54","37162 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29191","13.545658","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29192","13.548193","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29193","13.548202","172.30.1.205","172.30.1.104","TCP","54","37162 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29194","13.549161","172.30.1.205","172.30.1.104","TCP","74","44528 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916775 TSecr=0 WS=128" "29195","13.549521","172.30.1.104","172.30.1.205","TCP","66","135 > 44528 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29196","13.549531","172.30.1.205","172.30.1.104","TCP","54","44528 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29197","13.549881","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29198","13.550176","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29199","13.550185","172.30.1.205","172.30.1.104","TCP","54","44528 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29200","13.552374","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29201","13.552761","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29202","13.552768","172.30.1.205","172.30.1.104","TCP","54","44528 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29203","13.554577","172.30.1.205","172.30.1.104","TCP","54","44528 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29204","13.554690","172.30.1.205","172.30.1.104","TCP","74","37166 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916781 TSecr=0 WS=128" "29205","13.554884","172.30.1.104","172.30.1.205","TCP","54","135 > 44528 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29206","13.554897","172.30.1.104","172.30.1.205","TCP","54","135 > 44528 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29207","13.554903","172.30.1.205","172.30.1.104","TCP","54","44528 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29208","13.555081","172.30.1.104","172.30.1.205","TCP","66","49671 > 37166 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29209","13.555093","172.30.1.205","172.30.1.104","TCP","54","37166 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29210","13.555460","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29211","13.555791","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29212","13.555804","172.30.1.205","172.30.1.104","TCP","54","37166 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29213","13.557803","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29214","13.558179","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29215","13.558186","172.30.1.205","172.30.1.104","TCP","54","37166 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29216","13.559575","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29217","13.562444","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29218","13.562455","172.30.1.205","172.30.1.104","TCP","54","37166 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29219","13.563454","172.30.1.205","172.30.1.104","TCP","74","44532 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916789 TSecr=0 WS=128" "29220","13.563748","172.30.1.104","172.30.1.205","TCP","66","135 > 44532 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29221","13.563759","172.30.1.205","172.30.1.104","TCP","54","44532 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29222","13.564112","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29223","13.564448","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29224","13.564457","172.30.1.205","172.30.1.104","TCP","54","44532 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29225","13.566703","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29226","13.567108","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29227","13.567121","172.30.1.205","172.30.1.104","TCP","54","44532 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29228","13.568973","172.30.1.205","172.30.1.104","TCP","54","44532 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29229","13.569092","172.30.1.205","172.30.1.104","TCP","74","37170 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916795 TSecr=0 WS=128" "29230","13.569258","172.30.1.104","172.30.1.205","TCP","54","135 > 44532 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29231","13.569302","172.30.1.104","172.30.1.205","TCP","54","135 > 44532 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29232","13.569310","172.30.1.205","172.30.1.104","TCP","54","44532 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29233","13.569375","172.30.1.104","172.30.1.205","TCP","66","49671 > 37170 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29234","13.569385","172.30.1.205","172.30.1.104","TCP","54","37170 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29235","13.569730","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29236","13.570019","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29237","13.570030","172.30.1.205","172.30.1.104","TCP","54","37170 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29238","13.571943","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29239","13.572358","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29240","13.572363","172.30.1.205","172.30.1.104","TCP","54","37170 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29241","13.573755","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29242","13.576323","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29243","13.576332","172.30.1.205","172.30.1.104","TCP","54","37170 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29244","13.577340","172.30.1.205","172.30.1.104","TCP","74","44536 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916803 TSecr=0 WS=128" "29245","13.577664","172.30.1.104","172.30.1.205","TCP","66","135 > 44536 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29246","13.577676","172.30.1.205","172.30.1.104","TCP","54","44536 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29247","13.578054","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29248","13.580062","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29249","13.580074","172.30.1.205","172.30.1.104","TCP","54","44536 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29250","13.582378","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29251","13.582851","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29252","13.582858","172.30.1.205","172.30.1.104","TCP","54","44536 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29253","13.583725","172.30.1.205","172.30.1.104","TCP","54","37130 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29254","13.583777","172.30.1.205","172.30.1.104","TCP","54","37134 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29255","13.583816","172.30.1.205","172.30.1.104","TCP","54","37138 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29256","13.583851","172.30.1.205","172.30.1.104","TCP","54","37142 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29257","13.583882","172.30.1.205","172.30.1.104","TCP","54","37146 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29258","13.583911","172.30.1.205","172.30.1.104","TCP","54","37150 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29259","13.583937","172.30.1.205","172.30.1.104","TCP","54","37154 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29260","13.583965","172.30.1.205","172.30.1.104","TCP","54","37158 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29261","13.583992","172.30.1.205","172.30.1.104","TCP","54","37162 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29262","13.584024","172.30.1.205","172.30.1.104","TCP","54","37166 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29263","13.584051","172.30.1.205","172.30.1.104","TCP","54","37170 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29264","13.584121","172.30.1.205","172.30.1.104","TCP","54","37126 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29265","13.584392","172.30.1.104","172.30.1.205","TCP","54","49671 > 37130 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29266","13.584406","172.30.1.104","172.30.1.205","TCP","54","49671 > 37134 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29267","13.584451","172.30.1.104","172.30.1.205","TCP","54","49671 > 37130 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29268","13.584461","172.30.1.205","172.30.1.104","TCP","54","37130 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29269","13.584468","172.30.1.104","172.30.1.205","TCP","54","49671 > 37138 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29270","13.584490","172.30.1.104","172.30.1.205","TCP","54","49671 > 37142 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29271","13.584568","172.30.1.104","172.30.1.205","TCP","54","49671 > 37142 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29272","13.584574","172.30.1.205","172.30.1.104","TCP","54","37142 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29273","13.584586","172.30.1.104","172.30.1.205","TCP","54","49671 > 37146 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29274","13.584608","172.30.1.104","172.30.1.205","TCP","54","49671 > 37134 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29275","13.584612","172.30.1.205","172.30.1.104","TCP","54","37134 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29276","13.584630","172.30.1.104","172.30.1.205","TCP","54","49671 > 37150 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29277","13.584676","172.30.1.104","172.30.1.205","TCP","54","49671 > 37150 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29278","13.584679","172.30.1.205","172.30.1.104","TCP","54","37150 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29279","13.584703","172.30.1.104","172.30.1.205","TCP","54","49671 > 37154 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29280","13.584733","172.30.1.104","172.30.1.205","TCP","54","49671 > 37146 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29281","13.584737","172.30.1.205","172.30.1.104","TCP","54","37146 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29282","13.584798","172.30.1.104","172.30.1.205","TCP","54","49671 > 37158 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29283","13.584807","172.30.1.104","172.30.1.205","TCP","54","49671 > 37162 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29284","13.584810","172.30.1.104","172.30.1.205","TCP","54","49671 > 37158 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29285","13.584815","172.30.1.205","172.30.1.104","TCP","54","37158 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29286","13.584846","172.30.1.104","172.30.1.205","TCP","54","49671 > 37166 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29287","13.584874","172.30.1.104","172.30.1.205","TCP","54","49671 > 37154 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29288","13.584878","172.30.1.205","172.30.1.104","TCP","54","37154 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29289","13.584901","172.30.1.104","172.30.1.205","TCP","54","49671 > 37166 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29290","13.584905","172.30.1.205","172.30.1.104","TCP","54","37166 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29291","13.584927","172.30.1.104","172.30.1.205","TCP","54","49671 > 37162 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29292","13.584930","172.30.1.205","172.30.1.104","TCP","54","37162 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29293","13.584954","172.30.1.104","172.30.1.205","TCP","54","49671 > 37170 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29294","13.585211","172.30.1.104","172.30.1.205","TCP","54","49671 > 37170 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29295","13.585215","172.30.1.205","172.30.1.104","TCP","54","37170 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29296","13.585237","172.30.1.104","172.30.1.205","TCP","54","49671 > 37126 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29297","13.585266","172.30.1.104","172.30.1.205","TCP","54","49671 > 37126 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29298","13.585270","172.30.1.205","172.30.1.104","TCP","54","37126 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29299","13.585305","172.30.1.104","172.30.1.205","TCP","54","49671 > 37138 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29300","13.585308","172.30.1.205","172.30.1.104","TCP","54","37138 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29301","13.585823","172.30.1.205","172.30.1.104","TCP","54","44536 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29302","13.585951","172.30.1.205","172.30.1.104","TCP","74","37174 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916812 TSecr=0 WS=128" "29303","13.586179","172.30.1.104","172.30.1.205","TCP","54","135 > 44536 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29304","13.586187","172.30.1.104","172.30.1.205","TCP","54","135 > 44536 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29305","13.586192","172.30.1.205","172.30.1.104","TCP","54","44536 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29306","13.586268","172.30.1.104","172.30.1.205","TCP","66","49671 > 37174 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29307","13.586276","172.30.1.205","172.30.1.104","TCP","54","37174 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29308","13.586630","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29309","13.586924","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29310","13.586933","172.30.1.205","172.30.1.104","TCP","54","37174 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29311","13.588850","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29312","13.589226","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29313","13.589233","172.30.1.205","172.30.1.104","TCP","54","37174 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29314","13.590609","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29315","13.593046","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29316","13.593056","172.30.1.205","172.30.1.104","TCP","54","37174 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29317","13.594062","172.30.1.205","172.30.1.104","TCP","74","44540 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916820 TSecr=0 WS=128" "29318","13.594447","172.30.1.104","172.30.1.205","TCP","66","135 > 44540 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29319","13.594459","172.30.1.205","172.30.1.104","TCP","54","44540 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29320","13.594834","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29321","13.595195","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29322","13.595204","172.30.1.205","172.30.1.104","TCP","54","44540 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29323","13.597437","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29324","13.597846","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29325","13.597853","172.30.1.205","172.30.1.104","TCP","54","44540 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29326","13.599729","172.30.1.205","172.30.1.104","TCP","54","44540 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29327","13.599847","172.30.1.205","172.30.1.104","TCP","74","37178 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916826 TSecr=0 WS=128" "29328","13.600026","172.30.1.104","172.30.1.205","TCP","54","135 > 44540 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29329","13.600036","172.30.1.104","172.30.1.205","TCP","54","135 > 44540 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29330","13.600043","172.30.1.205","172.30.1.104","TCP","54","44540 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29331","13.600116","172.30.1.104","172.30.1.205","TCP","66","49671 > 37178 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29332","13.600124","172.30.1.205","172.30.1.104","TCP","54","37178 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29333","13.600472","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29334","13.600788","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29335","13.600797","172.30.1.205","172.30.1.104","TCP","54","37178 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29336","13.602688","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29337","13.603077","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29338","13.603084","172.30.1.205","172.30.1.104","TCP","54","37178 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29339","13.604444","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29340","13.607148","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29341","13.607157","172.30.1.205","172.30.1.104","TCP","54","37178 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29342","13.608138","172.30.1.205","172.30.1.104","TCP","74","44544 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916834 TSecr=0 WS=128" "29343","13.608481","172.30.1.104","172.30.1.205","TCP","66","135 > 44544 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29344","13.608493","172.30.1.205","172.30.1.104","TCP","54","44544 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29345","13.608875","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29346","13.609167","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29347","13.609177","172.30.1.205","172.30.1.104","TCP","54","44544 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29348","13.611404","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29349","13.611828","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29350","13.611835","172.30.1.205","172.30.1.104","TCP","54","44544 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29351","13.613683","172.30.1.205","172.30.1.104","TCP","54","44544 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29352","13.613802","172.30.1.205","172.30.1.104","TCP","74","37182 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916840 TSecr=0 WS=128" "29353","13.613977","172.30.1.104","172.30.1.205","TCP","54","135 > 44544 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29354","13.614008","172.30.1.104","172.30.1.205","TCP","54","135 > 44544 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29355","13.614016","172.30.1.205","172.30.1.104","TCP","54","44544 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29356","13.614112","172.30.1.104","172.30.1.205","TCP","66","49671 > 37182 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29357","13.614121","172.30.1.205","172.30.1.104","TCP","54","37182 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29358","13.614468","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29359","13.614852","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29360","13.614861","172.30.1.205","172.30.1.104","TCP","54","37182 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29361","13.616740","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29362","13.617124","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29363","13.617129","172.30.1.205","172.30.1.104","TCP","54","37182 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29364","13.618509","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29365","13.621116","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29366","13.621125","172.30.1.205","172.30.1.104","TCP","54","37182 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29367","13.622124","172.30.1.205","172.30.1.104","TCP","74","44548 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916848 TSecr=0 WS=128" "29368","13.622459","172.30.1.104","172.30.1.205","TCP","66","135 > 44548 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29369","13.622470","172.30.1.205","172.30.1.104","TCP","54","44548 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29370","13.622826","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29371","13.623164","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29372","13.623173","172.30.1.205","172.30.1.104","TCP","54","44548 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29373","13.625421","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29374","13.625852","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29375","13.625859","172.30.1.205","172.30.1.104","TCP","54","44548 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29376","13.627695","172.30.1.205","172.30.1.104","TCP","54","44548 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29377","13.627813","172.30.1.205","172.30.1.104","TCP","74","37186 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916854 TSecr=0 WS=128" "29378","13.627977","172.30.1.104","172.30.1.205","TCP","54","135 > 44548 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29379","13.628015","172.30.1.104","172.30.1.205","TCP","54","135 > 44548 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29380","13.628022","172.30.1.205","172.30.1.104","TCP","54","44548 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29381","13.628104","172.30.1.104","172.30.1.205","TCP","66","49671 > 37186 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29382","13.628112","172.30.1.205","172.30.1.104","TCP","54","37186 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29383","13.628463","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29384","13.628754","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29385","13.628763","172.30.1.205","172.30.1.104","TCP","54","37186 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29386","13.630682","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29387","13.631101","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29388","13.631107","172.30.1.205","172.30.1.104","TCP","54","37186 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29389","13.632471","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29390","13.635100","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29391","13.635113","172.30.1.205","172.30.1.104","TCP","54","37186 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29392","13.636167","172.30.1.205","172.30.1.104","TCP","74","44552 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916862 TSecr=0 WS=128" "29393","13.636504","172.30.1.104","172.30.1.205","TCP","66","135 > 44552 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29394","13.636517","172.30.1.205","172.30.1.104","TCP","54","44552 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29395","13.636915","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29396","13.637235","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29397","13.637245","172.30.1.205","172.30.1.104","TCP","54","44552 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29398","13.639535","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29399","13.639977","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29400","13.639984","172.30.1.205","172.30.1.104","TCP","54","44552 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29401","13.641840","172.30.1.205","172.30.1.104","TCP","54","44552 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29402","13.641966","172.30.1.205","172.30.1.104","TCP","74","37190 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916868 TSecr=0 WS=128" "29403","13.642125","172.30.1.104","172.30.1.205","TCP","54","135 > 44552 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29404","13.642157","172.30.1.104","172.30.1.205","TCP","54","135 > 44552 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29405","13.642165","172.30.1.205","172.30.1.104","TCP","54","44552 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29406","13.642237","172.30.1.104","172.30.1.205","TCP","66","49671 > 37190 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29407","13.642245","172.30.1.205","172.30.1.104","TCP","54","37190 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29408","13.642592","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29409","13.642885","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29410","13.642894","172.30.1.205","172.30.1.104","TCP","54","37190 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29411","13.644792","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29412","13.645209","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29413","13.645216","172.30.1.205","172.30.1.104","TCP","54","37190 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29414","13.646606","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29415","13.649244","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29416","13.649254","172.30.1.205","172.30.1.104","TCP","54","37190 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29417","13.650239","172.30.1.205","172.30.1.104","TCP","74","44556 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916876 TSecr=0 WS=128" "29418","13.650539","172.30.1.104","172.30.1.205","TCP","66","135 > 44556 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29419","13.650549","172.30.1.205","172.30.1.104","TCP","54","44556 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29420","13.650902","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29421","13.651212","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29422","13.651221","172.30.1.205","172.30.1.104","TCP","54","44556 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29423","13.653452","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29424","13.653890","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29425","13.653897","172.30.1.205","172.30.1.104","TCP","54","44556 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29426","13.655728","172.30.1.205","172.30.1.104","TCP","54","44556 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29427","13.655844","172.30.1.205","172.30.1.104","TCP","74","37194 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916882 TSecr=0 WS=128" "29428","13.656075","172.30.1.104","172.30.1.205","TCP","54","135 > 44556 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29429","13.656116","172.30.1.104","172.30.1.205","TCP","66","49671 > 37194 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29430","13.656126","172.30.1.205","172.30.1.104","TCP","54","37194 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29431","13.656166","172.30.1.104","172.30.1.205","TCP","54","135 > 44556 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29432","13.656173","172.30.1.205","172.30.1.104","TCP","54","44556 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29433","13.656492","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29434","13.656823","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29435","13.656833","172.30.1.205","172.30.1.104","TCP","54","37194 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29436","13.658746","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29437","13.659146","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29438","13.659152","172.30.1.205","172.30.1.104","TCP","54","37194 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29439","13.660518","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29440","13.663021","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29441","13.663031","172.30.1.205","172.30.1.104","TCP","54","37194 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29442","13.664008","172.30.1.205","172.30.1.104","TCP","74","44560 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916890 TSecr=0 WS=128" "29443","13.664317","172.30.1.104","172.30.1.205","TCP","66","135 > 44560 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29444","13.664328","172.30.1.205","172.30.1.104","TCP","54","44560 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29445","13.664680","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29446","13.665004","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29447","13.665013","172.30.1.205","172.30.1.104","TCP","54","44560 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29448","13.667228","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29449","13.667656","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29450","13.667663","172.30.1.205","172.30.1.104","TCP","54","44560 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29451","13.669507","172.30.1.205","172.30.1.104","TCP","54","44560 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29452","13.669632","172.30.1.205","172.30.1.104","TCP","74","37198 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916896 TSecr=0 WS=128" "29453","13.669787","172.30.1.104","172.30.1.205","TCP","54","135 > 44560 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29454","13.669827","172.30.1.104","172.30.1.205","TCP","54","135 > 44560 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29455","13.669835","172.30.1.205","172.30.1.104","TCP","54","44560 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29456","13.669920","172.30.1.104","172.30.1.205","TCP","66","49671 > 37198 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29457","13.669937","172.30.1.205","172.30.1.104","TCP","54","37198 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29458","13.670335","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29459","13.670652","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29460","13.670661","172.30.1.205","172.30.1.104","TCP","54","37198 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29461","13.672598","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29462","13.672978","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29463","13.672984","172.30.1.205","172.30.1.104","TCP","54","37198 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29464","13.674363","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29465","13.676861","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29466","13.676872","172.30.1.205","172.30.1.104","TCP","54","37198 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29467","13.677906","172.30.1.205","172.30.1.104","TCP","74","44564 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916904 TSecr=0 WS=128" "29468","13.678211","172.30.1.104","172.30.1.205","TCP","66","135 > 44564 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29469","13.678222","172.30.1.205","172.30.1.104","TCP","54","44564 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29470","13.678577","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29471","13.678874","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29472","13.678883","172.30.1.205","172.30.1.104","TCP","54","44564 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29473","13.681143","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29474","13.681586","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29475","13.681593","172.30.1.205","172.30.1.104","TCP","54","44564 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29476","13.683413","172.30.1.205","172.30.1.104","TCP","54","44564 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29477","13.683544","172.30.1.205","172.30.1.104","TCP","74","37202 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916909 TSecr=0 WS=128" "29478","13.683750","172.30.1.104","172.30.1.205","TCP","54","135 > 44564 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29479","13.683790","172.30.1.104","172.30.1.205","TCP","54","135 > 44564 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29480","13.683797","172.30.1.205","172.30.1.104","TCP","54","44564 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29481","13.683870","172.30.1.104","172.30.1.205","TCP","66","49671 > 37202 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29482","13.683879","172.30.1.205","172.30.1.104","TCP","54","37202 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29483","13.684221","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29484","13.684537","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29485","13.684545","172.30.1.205","172.30.1.104","TCP","54","37202 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29486","13.686456","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29487","13.686836","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29488","13.686842","172.30.1.205","172.30.1.104","TCP","54","37202 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29489","13.688200","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29490","13.690684","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29491","13.690693","172.30.1.205","172.30.1.104","TCP","54","37202 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29492","13.691698","172.30.1.205","172.30.1.104","TCP","74","44568 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916918 TSecr=0 WS=128" "29493","13.691997","172.30.1.104","172.30.1.205","TCP","66","135 > 44568 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29494","13.692014","172.30.1.205","172.30.1.104","TCP","54","44568 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29495","13.692361","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29496","13.692707","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29497","13.692716","172.30.1.205","172.30.1.104","TCP","54","44568 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29498","13.694925","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29499","13.695400","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29500","13.695407","172.30.1.205","172.30.1.104","TCP","54","44568 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29501","13.697236","172.30.1.205","172.30.1.104","TCP","54","44568 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29502","13.697350","172.30.1.205","172.30.1.104","TCP","74","37206 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916923 TSecr=0 WS=128" "29503","13.697562","172.30.1.104","172.30.1.205","TCP","54","135 > 44568 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29504","13.697572","172.30.1.104","172.30.1.205","TCP","54","135 > 44568 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29505","13.697579","172.30.1.205","172.30.1.104","TCP","54","44568 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29506","13.697634","172.30.1.104","172.30.1.205","TCP","66","49671 > 37206 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29507","13.697642","172.30.1.205","172.30.1.104","TCP","54","37206 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29508","13.697988","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29509","13.698301","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29510","13.698310","172.30.1.205","172.30.1.104","TCP","54","37206 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29511","13.700188","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29512","13.700562","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29513","13.700568","172.30.1.205","172.30.1.104","TCP","54","37206 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29514","13.701937","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29515","13.704414","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29516","13.704425","172.30.1.205","172.30.1.104","TCP","54","37206 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29517","13.705410","172.30.1.205","172.30.1.104","TCP","74","44572 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916931 TSecr=0 WS=128" "29518","13.705719","172.30.1.104","172.30.1.205","TCP","66","135 > 44572 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29519","13.705730","172.30.1.205","172.30.1.104","TCP","54","44572 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29520","13.706081","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29521","13.706375","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29522","13.706384","172.30.1.205","172.30.1.104","TCP","54","44572 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29523","13.708555","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29524","13.708943","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29525","13.708958","172.30.1.205","172.30.1.104","TCP","54","44572 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29526","13.710780","172.30.1.205","172.30.1.104","TCP","54","44572 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29527","13.710890","172.30.1.205","172.30.1.104","TCP","74","37210 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916937 TSecr=0 WS=128" "29528","13.711048","172.30.1.104","172.30.1.205","TCP","54","135 > 44572 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29529","13.711081","172.30.1.104","172.30.1.205","TCP","54","135 > 44572 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29530","13.711087","172.30.1.205","172.30.1.104","TCP","54","44572 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29531","13.711200","172.30.1.104","172.30.1.205","TCP","66","49671 > 37210 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29532","13.711208","172.30.1.205","172.30.1.104","TCP","54","37210 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29533","13.711555","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29534","13.711861","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29535","13.711870","172.30.1.205","172.30.1.104","TCP","54","37210 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29536","13.713754","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29537","13.714133","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29538","13.714139","172.30.1.205","172.30.1.104","TCP","54","37210 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29539","13.715472","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29540","13.718011","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29541","13.718021","172.30.1.205","172.30.1.104","TCP","54","37210 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29542","13.718959","172.30.1.205","172.30.1.104","TCP","74","44576 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916945 TSecr=0 WS=128" "29543","13.719303","172.30.1.104","172.30.1.205","TCP","66","135 > 44576 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29544","13.719313","172.30.1.205","172.30.1.104","TCP","54","44576 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29545","13.719661","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29546","13.719982","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29547","13.719990","172.30.1.205","172.30.1.104","TCP","54","44576 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29548","13.722207","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29549","13.722640","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29550","13.722647","172.30.1.205","172.30.1.104","TCP","54","44576 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29551","13.724446","172.30.1.205","172.30.1.104","TCP","54","44576 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29552","13.724557","172.30.1.205","172.30.1.104","TCP","74","37214 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916950 TSecr=0 WS=128" "29553","13.724741","172.30.1.104","172.30.1.205","TCP","54","135 > 44576 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29554","13.724813","172.30.1.104","172.30.1.205","TCP","54","135 > 44576 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29555","13.724820","172.30.1.205","172.30.1.104","TCP","54","44576 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29556","13.724928","172.30.1.104","172.30.1.205","TCP","66","49671 > 37214 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29557","13.724937","172.30.1.205","172.30.1.104","TCP","54","37214 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29558","13.725287","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29559","13.725586","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29560","13.725595","172.30.1.205","172.30.1.104","TCP","54","37214 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29561","13.727485","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29562","13.727888","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29563","13.727894","172.30.1.205","172.30.1.104","TCP","54","37214 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29564","13.729259","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29565","13.731845","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29566","13.731857","172.30.1.205","172.30.1.104","TCP","54","37214 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29567","13.732843","172.30.1.205","172.30.1.104","TCP","74","44580 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916959 TSecr=0 WS=128" "29568","13.733159","172.30.1.104","172.30.1.205","TCP","66","135 > 44580 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29569","13.733170","172.30.1.205","172.30.1.104","TCP","54","44580 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29570","13.733519","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29571","13.733852","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29572","13.733861","172.30.1.205","172.30.1.104","TCP","54","44580 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29573","13.736065","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29574","13.736463","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29575","13.736470","172.30.1.205","172.30.1.104","TCP","54","44580 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29576","13.738300","172.30.1.205","172.30.1.104","TCP","54","44580 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29577","13.738410","172.30.1.205","172.30.1.104","TCP","74","37218 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916964 TSecr=0 WS=128" "29578","13.738603","172.30.1.104","172.30.1.205","TCP","54","135 > 44580 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29579","13.738662","172.30.1.104","172.30.1.205","TCP","54","135 > 44580 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29580","13.738668","172.30.1.205","172.30.1.104","TCP","54","44580 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29581","13.738781","172.30.1.104","172.30.1.205","TCP","66","49671 > 37218 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29582","13.738789","172.30.1.205","172.30.1.104","TCP","54","37218 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29583","13.739129","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29584","13.739461","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29585","13.739472","172.30.1.205","172.30.1.104","TCP","54","37218 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29586","13.741354","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29587","13.741762","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29588","13.741768","172.30.1.205","172.30.1.104","TCP","54","37218 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29589","13.743101","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29590","13.745618","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29591","13.745628","172.30.1.205","172.30.1.104","TCP","54","37218 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29592","13.746574","172.30.1.205","172.30.1.104","TCP","74","44584 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916972 TSecr=0 WS=128" "29593","13.746879","172.30.1.104","172.30.1.205","TCP","66","135 > 44584 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29594","13.746889","172.30.1.205","172.30.1.104","TCP","54","44584 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29595","13.747271","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29596","13.747582","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29597","13.747591","172.30.1.205","172.30.1.104","TCP","54","44584 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29598","13.749810","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29599","13.750234","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29600","13.750240","172.30.1.205","172.30.1.104","TCP","54","44584 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29601","13.751089","172.30.1.205","172.30.1.104","TCP","54","37178 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29602","13.751137","172.30.1.205","172.30.1.104","TCP","54","37182 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29603","13.751162","172.30.1.205","172.30.1.104","TCP","54","37186 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29604","13.751191","172.30.1.205","172.30.1.104","TCP","54","37190 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29605","13.751218","172.30.1.205","172.30.1.104","TCP","54","37194 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29606","13.751248","172.30.1.205","172.30.1.104","TCP","54","37198 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29607","13.751278","172.30.1.205","172.30.1.104","TCP","54","37202 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29608","13.751305","172.30.1.205","172.30.1.104","TCP","54","37206 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29609","13.751331","172.30.1.205","172.30.1.104","TCP","54","37210 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29610","13.751357","172.30.1.205","172.30.1.104","TCP","54","37214 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29611","13.751383","172.30.1.205","172.30.1.104","TCP","54","37218 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29612","13.751451","172.30.1.205","172.30.1.104","TCP","54","37174 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29613","13.751780","172.30.1.104","172.30.1.205","TCP","54","49671 > 37178 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29614","13.751797","172.30.1.104","172.30.1.205","TCP","54","49671 > 37182 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29615","13.751828","172.30.1.104","172.30.1.205","TCP","54","49671 > 37186 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29616","13.751849","172.30.1.104","172.30.1.205","TCP","54","49671 > 37186 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29617","13.751855","172.30.1.205","172.30.1.104","TCP","54","37186 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29618","13.751877","172.30.1.104","172.30.1.205","TCP","54","49671 > 37190 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29619","13.751928","172.30.1.104","172.30.1.205","TCP","54","49671 > 37194 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29620","13.751959","172.30.1.104","172.30.1.205","TCP","54","49671 > 37198 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29621","13.751990","172.30.1.104","172.30.1.205","TCP","54","49671 > 37194 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29622","13.751995","172.30.1.205","172.30.1.104","TCP","54","37194 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29623","13.752010","172.30.1.104","172.30.1.205","TCP","54","49671 > 37202 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29624","13.752061","172.30.1.104","172.30.1.205","TCP","54","49671 > 37190 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29625","13.752065","172.30.1.205","172.30.1.104","TCP","54","37190 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29626","13.752085","172.30.1.104","172.30.1.205","TCP","54","49671 > 37206 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29627","13.752107","172.30.1.104","172.30.1.205","TCP","54","49671 > 37202 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29628","13.752110","172.30.1.205","172.30.1.104","TCP","54","37202 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29629","13.752154","172.30.1.104","172.30.1.205","TCP","54","49671 > 37210 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29630","13.752164","172.30.1.104","172.30.1.205","TCP","54","49671 > 37198 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29631","13.752167","172.30.1.205","172.30.1.104","TCP","54","37198 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29632","13.752189","172.30.1.104","172.30.1.205","TCP","54","49671 > 37210 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29633","13.752192","172.30.1.205","172.30.1.104","TCP","54","37210 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29634","13.752208","172.30.1.104","172.30.1.205","TCP","54","49671 > 37214 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29635","13.752297","172.30.1.104","172.30.1.205","TCP","54","49671 > 37218 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29636","13.752315","172.30.1.104","172.30.1.205","TCP","54","49671 > 37206 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29637","13.752318","172.30.1.205","172.30.1.104","TCP","54","37206 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29638","13.752334","172.30.1.104","172.30.1.205","TCP","54","49671 > 37218 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29639","13.752337","172.30.1.205","172.30.1.104","TCP","54","37218 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29640","13.752357","172.30.1.104","172.30.1.205","TCP","54","49671 > 37214 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29641","13.752359","172.30.1.205","172.30.1.104","TCP","54","37214 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29642","13.752377","172.30.1.104","172.30.1.205","TCP","54","49671 > 37178 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29643","13.752380","172.30.1.205","172.30.1.104","TCP","54","37178 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29644","13.752397","172.30.1.104","172.30.1.205","TCP","54","49671 > 37182 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29645","13.752400","172.30.1.205","172.30.1.104","TCP","54","37182 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29646","13.752766","172.30.1.104","172.30.1.205","TCP","54","49671 > 37174 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29647","13.752792","172.30.1.104","172.30.1.205","TCP","54","49671 > 37174 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29648","13.752798","172.30.1.205","172.30.1.104","TCP","54","37174 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29649","13.753063","172.30.1.205","172.30.1.104","TCP","54","44584 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29650","13.753171","172.30.1.205","172.30.1.104","TCP","74","37222 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916979 TSecr=0 WS=128" "29651","13.753353","172.30.1.104","172.30.1.205","TCP","54","135 > 44584 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29652","13.753385","172.30.1.104","172.30.1.205","TCP","54","135 > 44584 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29653","13.753390","172.30.1.205","172.30.1.104","TCP","54","44584 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29654","13.753462","172.30.1.104","172.30.1.205","TCP","66","49671 > 37222 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29655","13.753470","172.30.1.205","172.30.1.104","TCP","54","37222 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29656","13.753820","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29657","13.754114","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29658","13.754122","172.30.1.205","172.30.1.104","TCP","54","37222 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29659","13.756008","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29660","13.756400","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29661","13.756406","172.30.1.205","172.30.1.104","TCP","54","37222 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29662","13.757774","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29663","13.760237","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29664","13.760246","172.30.1.205","172.30.1.104","TCP","54","37222 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29665","13.761204","172.30.1.205","172.30.1.104","TCP","74","44588 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916987 TSecr=0 WS=128" "29666","13.761498","172.30.1.104","172.30.1.205","TCP","66","135 > 44588 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29667","13.761510","172.30.1.205","172.30.1.104","TCP","54","44588 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29668","13.761868","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29669","13.762168","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29670","13.762179","172.30.1.205","172.30.1.104","TCP","54","44588 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29671","13.764355","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29672","13.764783","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29673","13.764789","172.30.1.205","172.30.1.104","TCP","54","44588 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29674","13.766583","172.30.1.205","172.30.1.104","TCP","54","44588 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29675","13.766695","172.30.1.205","172.30.1.104","TCP","74","37226 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499916993 TSecr=0 WS=128" "29676","13.766865","172.30.1.104","172.30.1.205","TCP","54","135 > 44588 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29677","13.766899","172.30.1.104","172.30.1.205","TCP","54","135 > 44588 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29678","13.766905","172.30.1.205","172.30.1.104","TCP","54","44588 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29679","13.766987","172.30.1.104","172.30.1.205","TCP","66","49671 > 37226 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29680","13.766993","172.30.1.205","172.30.1.104","TCP","54","37226 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29681","13.767408","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29682","13.768597","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29683","13.768606","172.30.1.205","172.30.1.104","TCP","54","37226 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29684","13.770499","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29685","13.770899","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29686","13.770905","172.30.1.205","172.30.1.104","TCP","54","37226 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29687","13.772237","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29688","13.774724","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29689","13.774734","172.30.1.205","172.30.1.104","TCP","54","37226 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29690","13.775682","172.30.1.205","172.30.1.104","TCP","74","44592 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917002 TSecr=0 WS=128" "29691","13.776015","172.30.1.104","172.30.1.205","TCP","66","135 > 44592 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29692","13.776026","172.30.1.205","172.30.1.104","TCP","54","44592 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29693","13.776377","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29694","13.776677","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29695","13.776686","172.30.1.205","172.30.1.104","TCP","54","44592 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29696","13.778891","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29697","13.779345","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29698","13.779352","172.30.1.205","172.30.1.104","TCP","54","44592 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29699","13.781171","172.30.1.205","172.30.1.104","TCP","54","44592 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29700","13.781283","172.30.1.205","172.30.1.104","TCP","74","37230 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917007 TSecr=0 WS=128" "29701","13.781468","172.30.1.104","172.30.1.205","TCP","54","135 > 44592 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29702","13.781499","172.30.1.104","172.30.1.205","TCP","54","135 > 44592 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29703","13.781505","172.30.1.205","172.30.1.104","TCP","54","44592 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29704","13.781580","172.30.1.104","172.30.1.205","TCP","66","49671 > 37230 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29705","13.781588","172.30.1.205","172.30.1.104","TCP","54","37230 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29706","13.781934","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29707","13.782236","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29708","13.782244","172.30.1.205","172.30.1.104","TCP","54","37230 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29709","13.784103","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29710","13.784473","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29711","13.784478","172.30.1.205","172.30.1.104","TCP","54","37230 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29712","13.785928","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29713","13.788407","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29714","13.788417","172.30.1.205","172.30.1.104","TCP","54","37230 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29715","13.789367","172.30.1.205","172.30.1.104","TCP","74","44596 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917015 TSecr=0 WS=128" "29716","13.789667","172.30.1.104","172.30.1.205","TCP","66","135 > 44596 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29717","13.789679","172.30.1.205","172.30.1.104","TCP","54","44596 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29718","13.790041","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29719","13.790345","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29720","13.790354","172.30.1.205","172.30.1.104","TCP","54","44596 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29721","13.792572","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29722","13.792991","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29723","13.792998","172.30.1.205","172.30.1.104","TCP","54","44596 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29724","13.794813","172.30.1.205","172.30.1.104","TCP","54","44596 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29725","13.794922","172.30.1.205","172.30.1.104","TCP","74","37234 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917021 TSecr=0 WS=128" "29726","13.795095","172.30.1.104","172.30.1.205","TCP","54","135 > 44596 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29727","13.795135","172.30.1.104","172.30.1.205","TCP","54","135 > 44596 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29728","13.795141","172.30.1.205","172.30.1.104","TCP","54","44596 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29729","13.795238","172.30.1.104","172.30.1.205","TCP","66","49671 > 37234 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29730","13.795246","172.30.1.205","172.30.1.104","TCP","54","37234 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29731","13.795592","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29732","13.798001","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29733","13.798010","172.30.1.205","172.30.1.104","TCP","54","37234 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29734","13.799904","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29735","13.800286","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29736","13.800293","172.30.1.205","172.30.1.104","TCP","54","37234 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29737","13.801671","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29738","13.804169","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29739","13.804178","172.30.1.205","172.30.1.104","TCP","54","37234 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29740","13.805171","172.30.1.205","172.30.1.104","TCP","74","44600 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917031 TSecr=0 WS=128" "29741","13.805484","172.30.1.104","172.30.1.205","TCP","66","135 > 44600 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29742","13.805494","172.30.1.205","172.30.1.104","TCP","54","44600 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29743","13.805843","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29744","13.806148","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29745","13.806157","172.30.1.205","172.30.1.104","TCP","54","44600 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29746","13.808325","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29747","13.808843","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29748","13.808850","172.30.1.205","172.30.1.104","TCP","54","44600 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29749","13.810645","172.30.1.205","172.30.1.104","TCP","54","44600 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29750","13.810755","172.30.1.205","172.30.1.104","TCP","74","37238 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917037 TSecr=0 WS=128" "29751","13.810944","172.30.1.104","172.30.1.205","TCP","54","135 > 44600 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29752","13.811000","172.30.1.104","172.30.1.205","TCP","54","135 > 44600 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29753","13.811006","172.30.1.205","172.30.1.104","TCP","54","44600 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29754","13.811079","172.30.1.104","172.30.1.205","TCP","66","49671 > 37238 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29755","13.811087","172.30.1.205","172.30.1.104","TCP","54","37238 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29756","13.811440","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29757","13.811769","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29758","13.811778","172.30.1.205","172.30.1.104","TCP","54","37238 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29759","13.813704","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29760","13.814145","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29761","13.814156","172.30.1.205","172.30.1.104","TCP","54","37238 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29762","13.815692","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29763","13.818226","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29764","13.818244","172.30.1.205","172.30.1.104","TCP","54","37238 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29765","13.819351","172.30.1.205","172.30.1.104","TCP","74","44604 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917045 TSecr=0 WS=128" "29766","13.819681","172.30.1.104","172.30.1.205","TCP","66","135 > 44604 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29767","13.819692","172.30.1.205","172.30.1.104","TCP","54","44604 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29768","13.820035","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29769","13.820345","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29770","13.820353","172.30.1.205","172.30.1.104","TCP","54","44604 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29771","13.822554","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29772","13.822990","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29773","13.822997","172.30.1.205","172.30.1.104","TCP","54","44604 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29774","13.824825","172.30.1.205","172.30.1.104","TCP","54","44604 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29775","13.824935","172.30.1.205","172.30.1.104","TCP","74","37242 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917051 TSecr=0 WS=128" "29776","13.825136","172.30.1.104","172.30.1.205","TCP","54","135 > 44604 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29777","13.825163","172.30.1.104","172.30.1.205","TCP","54","135 > 44604 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29778","13.825168","172.30.1.205","172.30.1.104","TCP","54","44604 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29779","13.825203","172.30.1.104","172.30.1.205","TCP","66","49671 > 37242 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29780","13.825211","172.30.1.205","172.30.1.104","TCP","54","37242 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29781","13.825551","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29782","13.825860","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29783","13.825869","172.30.1.205","172.30.1.104","TCP","54","37242 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29784","13.827783","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29785","13.828150","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29786","13.828156","172.30.1.205","172.30.1.104","TCP","54","37242 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29787","13.829531","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29788","13.832010","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29789","13.832021","172.30.1.205","172.30.1.104","TCP","54","37242 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29790","13.832999","172.30.1.205","172.30.1.104","TCP","74","44608 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917059 TSecr=0 WS=128" "29791","13.833325","172.30.1.104","172.30.1.205","TCP","66","135 > 44608 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29792","13.833336","172.30.1.205","172.30.1.104","TCP","54","44608 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29793","13.833680","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29794","13.833978","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29795","13.833987","172.30.1.205","172.30.1.104","TCP","54","44608 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29796","13.836171","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29797","13.836591","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29798","13.836597","172.30.1.205","172.30.1.104","TCP","54","44608 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29799","13.838417","172.30.1.205","172.30.1.104","TCP","54","44608 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29800","13.838527","172.30.1.205","172.30.1.104","TCP","74","37246 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917064 TSecr=0 WS=128" "29801","13.838724","172.30.1.104","172.30.1.205","TCP","54","135 > 44608 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29802","13.838735","172.30.1.104","172.30.1.205","TCP","54","135 > 44608 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29803","13.838741","172.30.1.205","172.30.1.104","TCP","54","44608 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29804","13.838888","172.30.1.104","172.30.1.205","TCP","66","49671 > 37246 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29805","13.838896","172.30.1.205","172.30.1.104","TCP","54","37246 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29806","13.839244","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29807","13.839558","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29808","13.839567","172.30.1.205","172.30.1.104","TCP","54","37246 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29809","13.841477","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29810","13.841866","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29811","13.841872","172.30.1.205","172.30.1.104","TCP","54","37246 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29812","13.843216","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29813","13.845756","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29814","13.845765","172.30.1.205","172.30.1.104","TCP","54","37246 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29815","13.846730","172.30.1.205","172.30.1.104","TCP","74","44612 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917073 TSecr=0 WS=128" "29816","13.847053","172.30.1.104","172.30.1.205","TCP","66","135 > 44612 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29817","13.847064","172.30.1.205","172.30.1.104","TCP","54","44612 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29818","13.847415","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29819","13.847722","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29820","13.847731","172.30.1.205","172.30.1.104","TCP","54","44612 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29821","13.849953","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29822","13.850393","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29823","13.850400","172.30.1.205","172.30.1.104","TCP","54","44612 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29824","13.852220","172.30.1.205","172.30.1.104","TCP","54","44612 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29825","13.852332","172.30.1.205","172.30.1.104","TCP","74","37250 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917078 TSecr=0 WS=128" "29826","13.852496","172.30.1.104","172.30.1.205","TCP","54","135 > 44612 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29827","13.852586","172.30.1.104","172.30.1.205","TCP","54","135 > 44612 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29828","13.852592","172.30.1.205","172.30.1.104","TCP","54","44612 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29829","13.852670","172.30.1.104","172.30.1.205","TCP","66","49671 > 37250 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29830","13.852678","172.30.1.205","172.30.1.104","TCP","54","37250 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29831","13.853051","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29832","13.853350","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29833","13.853359","172.30.1.205","172.30.1.104","TCP","54","37250 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29834","13.855276","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29835","13.855747","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29836","13.855753","172.30.1.205","172.30.1.104","TCP","54","37250 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29837","13.857143","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29838","13.859742","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29839","13.859752","172.30.1.205","172.30.1.104","TCP","54","37250 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29840","13.860708","172.30.1.205","172.30.1.104","TCP","74","44616 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917087 TSecr=0 WS=128" "29841","13.861082","172.30.1.104","172.30.1.205","TCP","66","135 > 44616 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29842","13.861094","172.30.1.205","172.30.1.104","TCP","54","44616 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29843","13.861459","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29844","13.861754","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29845","13.861763","172.30.1.205","172.30.1.104","TCP","54","44616 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29846","13.863946","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29847","13.864355","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29848","13.864363","172.30.1.205","172.30.1.104","TCP","54","44616 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29849","13.866210","172.30.1.205","172.30.1.104","TCP","54","44616 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29850","13.866326","172.30.1.205","172.30.1.104","TCP","74","37254 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917092 TSecr=0 WS=128" "29851","13.866489","172.30.1.104","172.30.1.205","TCP","54","135 > 44616 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29852","13.866535","172.30.1.104","172.30.1.205","TCP","54","135 > 44616 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29853","13.866541","172.30.1.205","172.30.1.104","TCP","54","44616 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29854","13.866631","172.30.1.104","172.30.1.205","TCP","66","49671 > 37254 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29855","13.866639","172.30.1.205","172.30.1.104","TCP","54","37254 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29856","13.866981","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29857","13.867300","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29858","13.867308","172.30.1.205","172.30.1.104","TCP","54","37254 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29859","13.869202","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29860","13.869578","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29861","13.869584","172.30.1.205","172.30.1.104","TCP","54","37254 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29862","13.870924","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29863","13.873616","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29864","13.873625","172.30.1.205","172.30.1.104","TCP","54","37254 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29865","13.874624","172.30.1.205","172.30.1.104","TCP","74","44620 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917101 TSecr=0 WS=128" "29866","13.874991","172.30.1.104","172.30.1.205","TCP","66","135 > 44620 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29867","13.875002","172.30.1.205","172.30.1.104","TCP","54","44620 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29868","13.875357","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29869","13.875715","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29870","13.875724","172.30.1.205","172.30.1.104","TCP","54","44620 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29871","13.877964","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29872","13.878383","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29873","13.878390","172.30.1.205","172.30.1.104","TCP","54","44620 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29874","13.880204","172.30.1.205","172.30.1.104","TCP","54","44620 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29875","13.880324","172.30.1.205","172.30.1.104","TCP","74","37258 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917106 TSecr=0 WS=128" "29876","13.880538","172.30.1.104","172.30.1.205","TCP","54","135 > 44620 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29877","13.880550","172.30.1.104","172.30.1.205","TCP","54","135 > 44620 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29878","13.880557","172.30.1.205","172.30.1.104","TCP","54","44620 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29879","13.880624","172.30.1.104","172.30.1.205","TCP","66","49671 > 37258 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29880","13.880632","172.30.1.205","172.30.1.104","TCP","54","37258 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29881","13.881033","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29882","13.881348","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29883","13.881362","172.30.1.205","172.30.1.104","TCP","54","37258 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29884","13.883343","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29885","13.884652","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29886","13.884660","172.30.1.205","172.30.1.104","TCP","54","37258 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29887","13.886088","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29888","13.888818","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29889","13.888828","172.30.1.205","172.30.1.104","TCP","54","37258 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29890","13.889847","172.30.1.205","172.30.1.104","TCP","74","44624 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917116 TSecr=0 WS=128" "29891","13.890222","172.30.1.104","172.30.1.205","TCP","66","135 > 44624 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29892","13.890234","172.30.1.205","172.30.1.104","TCP","54","44624 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29893","13.890596","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29894","13.890913","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29895","13.890922","172.30.1.205","172.30.1.104","TCP","54","44624 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29896","13.893173","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29897","13.893602","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29898","13.893609","172.30.1.205","172.30.1.104","TCP","54","44624 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29899","13.895431","172.30.1.205","172.30.1.104","TCP","54","44624 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29900","13.895549","172.30.1.205","172.30.1.104","TCP","74","37262 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917121 TSecr=0 WS=128" "29901","13.895734","172.30.1.104","172.30.1.205","TCP","54","135 > 44624 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29902","13.895770","172.30.1.104","172.30.1.205","TCP","54","135 > 44624 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29903","13.895777","172.30.1.205","172.30.1.104","TCP","54","44624 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29904","13.895856","172.30.1.104","172.30.1.205","TCP","66","49671 > 37262 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29905","13.895864","172.30.1.205","172.30.1.104","TCP","54","37262 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29906","13.896213","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29907","13.896516","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29908","13.896526","172.30.1.205","172.30.1.104","TCP","54","37262 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29909","13.898474","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29910","13.898882","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29911","13.898889","172.30.1.205","172.30.1.104","TCP","54","37262 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29912","13.900246","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29913","13.902976","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29914","13.902985","172.30.1.205","172.30.1.104","TCP","54","37262 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29915","13.903970","172.30.1.205","172.30.1.104","TCP","74","44628 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917130 TSecr=0 WS=128" "29916","13.904318","172.30.1.104","172.30.1.205","TCP","66","135 > 44628 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29917","13.904329","172.30.1.205","172.30.1.104","TCP","54","44628 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29918","13.904686","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29919","13.905005","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29920","13.905014","172.30.1.205","172.30.1.104","TCP","54","44628 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29921","13.907208","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29922","13.907700","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29923","13.907706","172.30.1.205","172.30.1.104","TCP","54","44628 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29924","13.909545","172.30.1.205","172.30.1.104","TCP","54","44628 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29925","13.909668","172.30.1.205","172.30.1.104","TCP","74","37266 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917136 TSecr=0 WS=128" "29926","13.909838","172.30.1.104","172.30.1.205","TCP","54","135 > 44628 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29927","13.909883","172.30.1.104","172.30.1.205","TCP","54","135 > 44628 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "29928","13.909890","172.30.1.205","172.30.1.104","TCP","54","44628 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "29929","13.909974","172.30.1.104","172.30.1.205","TCP","66","49671 > 37266 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29930","13.909985","172.30.1.205","172.30.1.104","TCP","54","37266 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29931","13.910343","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "29932","13.910653","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29933","13.910670","172.30.1.205","172.30.1.104","TCP","54","37266 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29934","13.912541","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "29935","13.912977","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "29936","13.912984","172.30.1.205","172.30.1.104","TCP","54","37266 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "29937","13.914355","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "29938","13.916959","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "29939","13.916976","172.30.1.205","172.30.1.104","TCP","54","37266 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "29940","13.918023","172.30.1.205","172.30.1.104","TCP","74","44632 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917144 TSecr=0 WS=128" "29941","13.918379","172.30.1.104","172.30.1.205","TCP","66","135 > 44632 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "29942","13.918391","172.30.1.205","172.30.1.104","TCP","54","44632 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "29943","13.918759","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "29944","13.919069","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "29945","13.919077","172.30.1.205","172.30.1.104","TCP","54","44632 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "29946","13.921327","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "29947","13.921765","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "29948","13.921772","172.30.1.205","172.30.1.104","TCP","54","44632 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "29949","13.922631","172.30.1.205","172.30.1.104","TCP","54","37226 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29950","13.922681","172.30.1.205","172.30.1.104","TCP","54","37230 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29951","13.922719","172.30.1.205","172.30.1.104","TCP","54","37234 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29952","13.922751","172.30.1.205","172.30.1.104","TCP","54","37238 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29953","13.922779","172.30.1.205","172.30.1.104","TCP","54","37242 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29954","13.922806","172.30.1.205","172.30.1.104","TCP","54","37246 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29955","13.922833","172.30.1.205","172.30.1.104","TCP","54","37250 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29956","13.922859","172.30.1.205","172.30.1.104","TCP","54","37254 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29957","13.922885","172.30.1.205","172.30.1.104","TCP","54","37258 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29958","13.922911","172.30.1.205","172.30.1.104","TCP","54","37262 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29959","13.922942","172.30.1.205","172.30.1.104","TCP","54","37266 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29960","13.923010","172.30.1.205","172.30.1.104","TCP","54","37222 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "29961","13.923265","172.30.1.104","172.30.1.205","TCP","54","49671 > 37226 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29962","13.923332","172.30.1.104","172.30.1.205","TCP","54","49671 > 37230 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29963","13.923338","172.30.1.104","172.30.1.205","TCP","54","49671 > 37226 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29964","13.923347","172.30.1.205","172.30.1.104","TCP","54","37226 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29965","13.923356","172.30.1.104","172.30.1.205","TCP","54","49671 > 37234 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29966","13.923557","172.30.1.104","172.30.1.205","TCP","54","49671 > 37238 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29967","13.923563","172.30.1.104","172.30.1.205","TCP","54","49671 > 37238 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29968","13.923568","172.30.1.205","172.30.1.104","TCP","54","37238 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29969","13.923574","172.30.1.104","172.30.1.205","TCP","54","49671 > 37242 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29970","13.923577","172.30.1.104","172.30.1.205","TCP","54","49671 > 37242 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29971","13.923579","172.30.1.205","172.30.1.104","TCP","54","37242 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29972","13.923581","172.30.1.104","172.30.1.205","TCP","54","49671 > 37246 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29973","13.923589","172.30.1.104","172.30.1.205","TCP","54","49671 > 37246 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29974","13.923591","172.30.1.205","172.30.1.104","TCP","54","37246 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29975","13.923592","172.30.1.104","172.30.1.205","TCP","54","49671 > 37230 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29976","13.923593","172.30.1.205","172.30.1.104","TCP","54","37230 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29977","13.923595","172.30.1.104","172.30.1.205","TCP","54","49671 > 37250 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29978","13.923823","172.30.1.104","172.30.1.205","TCP","54","49671 > 37254 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29979","13.923829","172.30.1.104","172.30.1.205","TCP","54","49671 > 37254 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29980","13.923832","172.30.1.205","172.30.1.104","TCP","54","37254 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29981","13.923841","172.30.1.104","172.30.1.205","TCP","54","49671 > 37258 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29982","13.923847","172.30.1.104","172.30.1.205","TCP","54","49671 > 37234 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29983","13.923849","172.30.1.205","172.30.1.104","TCP","54","37234 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29984","13.923851","172.30.1.104","172.30.1.205","TCP","54","49671 > 37262 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29985","13.923854","172.30.1.104","172.30.1.205","TCP","54","49671 > 37262 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29986","13.923855","172.30.1.205","172.30.1.104","TCP","54","37262 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29987","13.923857","172.30.1.104","172.30.1.205","TCP","54","49671 > 37266 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29988","13.923859","172.30.1.104","172.30.1.205","TCP","54","49671 > 37266 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29989","13.923861","172.30.1.205","172.30.1.104","TCP","54","37266 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29990","13.924197","172.30.1.104","172.30.1.205","TCP","54","49671 > 37222 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29991","13.924204","172.30.1.104","172.30.1.205","TCP","54","49671 > 37222 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29992","13.924208","172.30.1.205","172.30.1.104","TCP","54","37222 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29993","13.924214","172.30.1.104","172.30.1.205","TCP","54","49671 > 37250 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29994","13.924216","172.30.1.205","172.30.1.104","TCP","54","37250 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29995","13.924293","172.30.1.104","172.30.1.205","TCP","54","49671 > 37258 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "29996","13.924296","172.30.1.205","172.30.1.104","TCP","54","37258 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "29997","13.924536","172.30.1.205","172.30.1.104","TCP","54","44632 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "29998","13.924660","172.30.1.205","172.30.1.104","TCP","74","37270 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917151 TSecr=0 WS=128" "29999","13.924793","172.30.1.104","172.30.1.205","TCP","54","135 > 44632 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30000","13.924825","172.30.1.104","172.30.1.205","TCP","54","135 > 44632 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30001","13.924831","172.30.1.205","172.30.1.104","TCP","54","44632 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30002","13.924941","172.30.1.104","172.30.1.205","TCP","66","49671 > 37270 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30003","13.924949","172.30.1.205","172.30.1.104","TCP","54","37270 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30004","13.925307","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30005","13.925593","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30006","13.925602","172.30.1.205","172.30.1.104","TCP","54","37270 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30007","13.927475","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30008","13.927893","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30009","13.927899","172.30.1.205","172.30.1.104","TCP","54","37270 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30010","13.929291","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30011","13.931812","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30012","13.931822","172.30.1.205","172.30.1.104","TCP","54","37270 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30013","13.932841","172.30.1.205","172.30.1.104","TCP","74","44636 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917159 TSecr=0 WS=128" "30014","13.933188","172.30.1.104","172.30.1.205","TCP","66","135 > 44636 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30015","13.933205","172.30.1.205","172.30.1.104","TCP","54","44636 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30016","13.933618","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30017","13.934048","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30018","13.934059","172.30.1.205","172.30.1.104","TCP","54","44636 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30019","13.936322","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30020","13.936746","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30021","13.936754","172.30.1.205","172.30.1.104","TCP","54","44636 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30022","13.938595","172.30.1.205","172.30.1.104","TCP","54","44636 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30023","13.938725","172.30.1.205","172.30.1.104","TCP","74","37274 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917165 TSecr=0 WS=128" "30024","13.938867","172.30.1.104","172.30.1.205","TCP","54","135 > 44636 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30025","13.938901","172.30.1.104","172.30.1.205","TCP","54","135 > 44636 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30026","13.938909","172.30.1.205","172.30.1.104","TCP","54","44636 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30027","13.938978","172.30.1.104","172.30.1.205","TCP","66","49671 > 37274 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30028","13.938987","172.30.1.205","172.30.1.104","TCP","54","37274 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30029","13.939356","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30030","13.939667","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30031","13.939676","172.30.1.205","172.30.1.104","TCP","54","37274 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30032","13.941588","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30033","13.941960","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30034","13.941967","172.30.1.205","172.30.1.104","TCP","54","37274 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30035","13.943331","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30036","13.945950","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30037","13.945959","172.30.1.205","172.30.1.104","TCP","54","37274 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30038","13.946929","172.30.1.205","172.30.1.104","TCP","74","44640 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917173 TSecr=0 WS=128" "30039","13.947220","172.30.1.104","172.30.1.205","TCP","66","135 > 44640 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30040","13.947230","172.30.1.205","172.30.1.104","TCP","54","44640 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30041","13.947581","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30042","13.947882","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30043","13.947891","172.30.1.205","172.30.1.104","TCP","54","44640 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30044","13.950151","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30045","13.950550","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30046","13.950557","172.30.1.205","172.30.1.104","TCP","54","44640 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30047","13.952374","172.30.1.205","172.30.1.104","TCP","54","44640 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30048","13.952491","172.30.1.205","172.30.1.104","TCP","74","37278 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917178 TSecr=0 WS=128" "30049","13.952641","172.30.1.104","172.30.1.205","TCP","54","135 > 44640 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30050","13.952679","172.30.1.104","172.30.1.205","TCP","54","135 > 44640 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30051","13.952685","172.30.1.205","172.30.1.104","TCP","54","44640 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30052","13.952772","172.30.1.104","172.30.1.205","TCP","66","49671 > 37278 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30053","13.952790","172.30.1.205","172.30.1.104","TCP","54","37278 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30054","13.953187","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30055","13.954655","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30056","13.954666","172.30.1.205","172.30.1.104","TCP","54","37278 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30057","13.956575","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30058","13.956952","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30059","13.956959","172.30.1.205","172.30.1.104","TCP","54","37278 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30060","13.958346","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30061","13.960955","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30062","13.960965","172.30.1.205","172.30.1.104","TCP","54","37278 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30063","13.962007","172.30.1.205","172.30.1.104","TCP","74","44644 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917188 TSecr=0 WS=128" "30064","13.962361","172.30.1.104","172.30.1.205","TCP","66","135 > 44644 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30065","13.962373","172.30.1.205","172.30.1.104","TCP","54","44644 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30066","13.962738","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30067","13.963039","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30068","13.963048","172.30.1.205","172.30.1.104","TCP","54","44644 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30069","13.965316","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30070","13.965753","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30071","13.965760","172.30.1.205","172.30.1.104","TCP","54","44644 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30072","13.967594","172.30.1.205","172.30.1.104","TCP","54","44644 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30073","13.967711","172.30.1.205","172.30.1.104","TCP","74","37282 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917194 TSecr=0 WS=128" "30074","13.967927","172.30.1.104","172.30.1.205","TCP","54","135 > 44644 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30075","13.967965","172.30.1.104","172.30.1.205","TCP","54","135 > 44644 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30076","13.967972","172.30.1.205","172.30.1.104","TCP","54","44644 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30077","13.968045","172.30.1.104","172.30.1.205","TCP","66","49671 > 37282 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30078","13.968054","172.30.1.205","172.30.1.104","TCP","54","37282 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30079","13.968411","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30080","13.969886","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30081","13.969895","172.30.1.205","172.30.1.104","TCP","54","37282 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30082","13.971788","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30083","13.972168","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30084","13.972174","172.30.1.205","172.30.1.104","TCP","54","37282 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30085","13.973564","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30086","13.976174","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30087","13.976184","172.30.1.205","172.30.1.104","TCP","54","37282 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30088","13.977198","172.30.1.205","172.30.1.104","TCP","74","44648 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917203 TSecr=0 WS=128" "30089","13.977502","172.30.1.104","172.30.1.205","TCP","66","135 > 44648 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30090","13.977514","172.30.1.205","172.30.1.104","TCP","54","44648 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30091","13.977881","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30092","13.978227","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30093","13.978236","172.30.1.205","172.30.1.104","TCP","54","44648 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30094","13.980450","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30095","13.980878","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30096","13.980885","172.30.1.205","172.30.1.104","TCP","54","44648 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30097","13.982712","172.30.1.205","172.30.1.104","TCP","54","44648 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30098","13.982847","172.30.1.205","172.30.1.104","TCP","74","37286 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917209 TSecr=0 WS=128" "30099","13.983002","172.30.1.104","172.30.1.205","TCP","54","135 > 44648 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30100","13.983048","172.30.1.104","172.30.1.205","TCP","54","135 > 44648 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30101","13.983056","172.30.1.205","172.30.1.104","TCP","54","44648 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30102","13.983141","172.30.1.104","172.30.1.205","TCP","66","49671 > 37286 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30103","13.983150","172.30.1.205","172.30.1.104","TCP","54","37286 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30104","13.983507","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30105","13.983840","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30106","13.983849","172.30.1.205","172.30.1.104","TCP","54","37286 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30107","13.985793","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30108","13.986195","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30109","13.986201","172.30.1.205","172.30.1.104","TCP","54","37286 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30110","13.987574","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30111","13.990110","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30112","13.990120","172.30.1.205","172.30.1.104","TCP","54","37286 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30113","13.991104","172.30.1.205","172.30.1.104","TCP","74","44652 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917217 TSecr=0 WS=128" "30114","13.991480","172.30.1.104","172.30.1.205","TCP","66","135 > 44652 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30115","13.991491","172.30.1.205","172.30.1.104","TCP","54","44652 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30116","13.991843","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30117","13.992158","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30118","13.992168","172.30.1.205","172.30.1.104","TCP","54","44652 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30119","13.994432","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30120","13.994852","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30121","13.994859","172.30.1.205","172.30.1.104","TCP","54","44652 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30122","13.996694","172.30.1.205","172.30.1.104","TCP","54","44652 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30123","13.996835","172.30.1.205","172.30.1.104","TCP","74","37290 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917223 TSecr=0 WS=128" "30124","13.996983","172.30.1.104","172.30.1.205","TCP","54","135 > 44652 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30125","13.997050","172.30.1.104","172.30.1.205","TCP","54","135 > 44652 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30126","13.997057","172.30.1.205","172.30.1.104","TCP","54","44652 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30127","13.997124","172.30.1.104","172.30.1.205","TCP","66","49671 > 37290 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30128","13.997133","172.30.1.205","172.30.1.104","TCP","54","37290 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30129","13.997480","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30130","13.997784","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30131","13.997792","172.30.1.205","172.30.1.104","TCP","54","37290 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30132","13.999690","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30133","14.000073","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30134","14.000079","172.30.1.205","172.30.1.104","TCP","54","37290 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30135","14.001467","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30136","14.004012","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30137","14.004023","172.30.1.205","172.30.1.104","TCP","54","37290 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30138","14.005017","172.30.1.205","172.30.1.104","TCP","74","44656 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917231 TSecr=0 WS=128" "30139","14.005348","172.30.1.104","172.30.1.205","TCP","66","135 > 44656 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30140","14.005359","172.30.1.205","172.30.1.104","TCP","54","44656 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30141","14.005710","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30142","14.006019","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30143","14.006027","172.30.1.205","172.30.1.104","TCP","54","44656 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30144","14.008220","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30145","14.008667","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30146","14.008674","172.30.1.205","172.30.1.104","TCP","54","44656 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30147","14.010506","172.30.1.205","172.30.1.104","TCP","54","44656 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30148","14.010631","172.30.1.205","172.30.1.104","TCP","74","37294 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917237 TSecr=0 WS=128" "30149","14.010794","172.30.1.104","172.30.1.205","TCP","54","135 > 44656 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30150","14.010830","172.30.1.104","172.30.1.205","TCP","54","135 > 44656 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30151","14.010837","172.30.1.205","172.30.1.104","TCP","54","44656 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30152","14.010950","172.30.1.104","172.30.1.205","TCP","66","49671 > 37294 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30153","14.010968","172.30.1.205","172.30.1.104","TCP","54","37294 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30154","14.011466","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30155","14.011920","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30156","14.011932","172.30.1.205","172.30.1.104","TCP","54","37294 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30157","14.013947","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30158","14.014350","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30159","14.014356","172.30.1.205","172.30.1.104","TCP","54","37294 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30160","14.015751","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30161","14.018314","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30162","14.018325","172.30.1.205","172.30.1.104","TCP","54","37294 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30163","14.019371","172.30.1.205","172.30.1.104","TCP","74","44660 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917245 TSecr=0 WS=128" "30164","14.019701","172.30.1.104","172.30.1.205","TCP","66","135 > 44660 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30165","14.019714","172.30.1.205","172.30.1.104","TCP","54","44660 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30166","14.020069","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30167","14.020391","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30168","14.020400","172.30.1.205","172.30.1.104","TCP","54","44660 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30169","14.022654","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30170","14.023091","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30171","14.023102","172.30.1.205","172.30.1.104","TCP","54","44660 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30172","14.025057","172.30.1.205","172.30.1.104","TCP","54","44660 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30173","14.025182","172.30.1.205","172.30.1.104","TCP","74","37298 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917251 TSecr=0 WS=128" "30174","14.025348","172.30.1.104","172.30.1.205","TCP","54","135 > 44660 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30175","14.025379","172.30.1.104","172.30.1.205","TCP","54","135 > 44660 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30176","14.025387","172.30.1.205","172.30.1.104","TCP","54","44660 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30177","14.025462","172.30.1.104","172.30.1.205","TCP","66","49671 > 37298 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30178","14.025471","172.30.1.205","172.30.1.104","TCP","54","37298 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30179","14.025818","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30180","14.026126","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30181","14.026135","172.30.1.205","172.30.1.104","TCP","54","37298 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30182","14.028012","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30183","14.028423","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30184","14.028430","172.30.1.205","172.30.1.104","TCP","54","37298 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30185","14.029851","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30186","14.032479","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30187","14.032489","172.30.1.205","172.30.1.104","TCP","54","37298 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30188","14.033466","172.30.1.205","172.30.1.104","TCP","74","44664 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917259 TSecr=0 WS=128" "30189","14.033770","172.30.1.104","172.30.1.205","TCP","66","135 > 44664 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30190","14.033781","172.30.1.205","172.30.1.104","TCP","54","44664 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30191","14.034132","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30192","14.034468","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30193","14.034482","172.30.1.205","172.30.1.104","TCP","54","44664 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30194","14.036748","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30195","14.037168","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30196","14.037175","172.30.1.205","172.30.1.104","TCP","54","44664 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30197","14.038979","172.30.1.205","172.30.1.104","TCP","54","44664 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30198","14.039093","172.30.1.205","172.30.1.104","TCP","74","37302 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917265 TSecr=0 WS=128" "30199","14.039265","172.30.1.104","172.30.1.205","TCP","54","135 > 44664 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30200","14.039297","172.30.1.104","172.30.1.205","TCP","54","135 > 44664 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30201","14.039303","172.30.1.205","172.30.1.104","TCP","54","44664 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30202","14.039337","172.30.1.104","172.30.1.205","TCP","66","49671 > 37302 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30203","14.039346","172.30.1.205","172.30.1.104","TCP","54","37302 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30204","14.039685","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30205","14.040008","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30206","14.040017","172.30.1.205","172.30.1.104","TCP","54","37302 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30207","14.041940","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30208","14.042399","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30209","14.042405","172.30.1.205","172.30.1.104","TCP","54","37302 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30210","14.043738","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30211","14.046271","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30212","14.046281","172.30.1.205","172.30.1.104","TCP","54","37302 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30213","14.047229","172.30.1.205","172.30.1.104","TCP","74","44668 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917273 TSecr=0 WS=128" "30214","14.047555","172.30.1.104","172.30.1.205","TCP","66","135 > 44668 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30215","14.047565","172.30.1.205","172.30.1.104","TCP","54","44668 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30216","14.047912","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30217","14.048254","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30218","14.048263","172.30.1.205","172.30.1.104","TCP","54","44668 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30219","14.050472","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30220","14.050886","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30221","14.050893","172.30.1.205","172.30.1.104","TCP","54","44668 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30222","14.052697","172.30.1.205","172.30.1.104","TCP","54","44668 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30223","14.052829","172.30.1.205","172.30.1.104","TCP","74","37306 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917279 TSecr=0 WS=128" "30224","14.052991","172.30.1.104","172.30.1.205","TCP","54","135 > 44668 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30225","14.053028","172.30.1.104","172.30.1.205","TCP","54","135 > 44668 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30226","14.053034","172.30.1.205","172.30.1.104","TCP","54","44668 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30227","14.053109","172.30.1.104","172.30.1.205","TCP","66","49671 > 37306 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30228","14.053117","172.30.1.205","172.30.1.104","TCP","54","37306 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30229","14.053459","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30230","14.053772","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30231","14.053782","172.30.1.205","172.30.1.104","TCP","54","37306 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30232","14.055651","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30233","14.056053","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30234","14.056061","172.30.1.205","172.30.1.104","TCP","54","37306 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30235","14.057497","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30236","14.060147","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30237","14.060161","172.30.1.205","172.30.1.104","TCP","54","37306 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30238","14.061215","172.30.1.205","172.30.1.104","TCP","74","44672 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917287 TSecr=0 WS=128" "30239","14.061519","172.30.1.104","172.30.1.205","TCP","66","135 > 44672 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30240","14.061531","172.30.1.205","172.30.1.104","TCP","54","44672 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30241","14.061894","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30242","14.062241","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30243","14.062253","172.30.1.205","172.30.1.104","TCP","54","44672 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30244","14.064473","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30245","14.064903","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30246","14.064911","172.30.1.205","172.30.1.104","TCP","54","44672 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30247","14.066757","172.30.1.205","172.30.1.104","TCP","54","44672 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30248","14.066870","172.30.1.205","172.30.1.104","TCP","74","37310 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917293 TSecr=0 WS=128" "30249","14.067051","172.30.1.104","172.30.1.205","TCP","54","135 > 44672 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30250","14.067089","172.30.1.104","172.30.1.205","TCP","54","135 > 44672 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30251","14.067096","172.30.1.205","172.30.1.104","TCP","54","44672 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30252","14.067177","172.30.1.104","172.30.1.205","TCP","66","49671 > 37310 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30253","14.067185","172.30.1.205","172.30.1.104","TCP","54","37310 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30254","14.067536","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30255","14.067869","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30256","14.067878","172.30.1.205","172.30.1.104","TCP","54","37310 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30257","14.069779","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30258","14.070185","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30259","14.070192","172.30.1.205","172.30.1.104","TCP","54","37310 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30260","14.071551","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30261","14.074133","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30262","14.074145","172.30.1.205","172.30.1.104","TCP","54","37310 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30263","14.075151","172.30.1.205","172.30.1.104","TCP","74","44676 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917301 TSecr=0 WS=128" "30264","14.075478","172.30.1.104","172.30.1.205","TCP","66","135 > 44676 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30265","14.075495","172.30.1.205","172.30.1.104","TCP","54","44676 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30266","14.075889","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30267","14.076183","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30268","14.076192","172.30.1.205","172.30.1.104","TCP","54","44676 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30269","14.078483","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30270","14.078891","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30271","14.078898","172.30.1.205","172.30.1.104","TCP","54","44676 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30272","14.080723","172.30.1.205","172.30.1.104","TCP","54","44676 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30273","14.080884","172.30.1.205","172.30.1.104","TCP","74","37314 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917307 TSecr=0 WS=128" "30274","14.081089","172.30.1.104","172.30.1.205","TCP","54","135 > 44676 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30275","14.081101","172.30.1.104","172.30.1.205","TCP","54","135 > 44676 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30276","14.081109","172.30.1.205","172.30.1.104","TCP","54","44676 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30277","14.081183","172.30.1.104","172.30.1.205","TCP","66","49671 > 37314 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30278","14.081192","172.30.1.205","172.30.1.104","TCP","54","37314 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30279","14.081552","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30280","14.081849","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30281","14.081858","172.30.1.205","172.30.1.104","TCP","54","37314 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30282","14.083758","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30283","14.084140","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30284","14.084146","172.30.1.205","172.30.1.104","TCP","54","37314 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30285","14.085540","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30286","14.088079","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30287","14.088089","172.30.1.205","172.30.1.104","TCP","54","37314 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30288","14.089089","172.30.1.205","172.30.1.104","TCP","74","44680 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917315 TSecr=0 WS=128" "30289","14.089400","172.30.1.104","172.30.1.205","TCP","66","135 > 44680 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30290","14.089412","172.30.1.205","172.30.1.104","TCP","54","44680 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30291","14.089765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30292","14.090097","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30293","14.090106","172.30.1.205","172.30.1.104","TCP","54","44680 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30294","14.092288","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30295","14.092703","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30296","14.092710","172.30.1.205","172.30.1.104","TCP","54","44680 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30297","14.093577","172.30.1.205","172.30.1.104","TCP","54","37274 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30298","14.093627","172.30.1.205","172.30.1.104","TCP","54","37278 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30299","14.093664","172.30.1.205","172.30.1.104","TCP","54","37282 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30300","14.093696","172.30.1.205","172.30.1.104","TCP","54","37286 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30301","14.093728","172.30.1.205","172.30.1.104","TCP","54","37290 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30302","14.093756","172.30.1.205","172.30.1.104","TCP","54","37294 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30303","14.093784","172.30.1.205","172.30.1.104","TCP","54","37298 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30304","14.093814","172.30.1.205","172.30.1.104","TCP","54","37302 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30305","14.093844","172.30.1.205","172.30.1.104","TCP","54","37306 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30306","14.093871","172.30.1.205","172.30.1.104","TCP","54","37310 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30307","14.093902","172.30.1.205","172.30.1.104","TCP","54","37314 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30308","14.093970","172.30.1.205","172.30.1.104","TCP","54","37270 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30309","14.094258","172.30.1.104","172.30.1.205","TCP","54","49671 > 37274 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30310","14.094275","172.30.1.104","172.30.1.205","TCP","54","49671 > 37278 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30311","14.094327","172.30.1.104","172.30.1.205","TCP","54","49671 > 37274 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30312","14.094335","172.30.1.205","172.30.1.104","TCP","54","37274 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "30313","14.094348","172.30.1.104","172.30.1.205","TCP","54","49671 > 37282 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30314","14.094373","172.30.1.104","172.30.1.205","TCP","54","49671 > 37286 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30315","14.094393","172.30.1.104","172.30.1.205","TCP","54","49671 > 37286 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30316","14.094396","172.30.1.205","172.30.1.104","TCP","54","37286 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "30317","14.094413","172.30.1.104","172.30.1.205","TCP","54","49671 > 37290 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30318","14.094480","172.30.1.104","172.30.1.205","TCP","54","49671 > 37290 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30319","14.094484","172.30.1.205","172.30.1.104","TCP","54","37290 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "30320","14.094502","172.30.1.104","172.30.1.205","TCP","54","49671 > 37278 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30321","14.094505","172.30.1.205","172.30.1.104","TCP","54","37278 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "30322","14.094528","172.30.1.104","172.30.1.205","TCP","54","49671 > 37294 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30323","14.094541","172.30.1.104","172.30.1.205","TCP","54","49671 > 37294 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30324","14.094545","172.30.1.205","172.30.1.104","TCP","54","37294 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "30325","14.094565","172.30.1.104","172.30.1.205","TCP","54","49671 > 37298 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30326","14.094585","172.30.1.104","172.30.1.205","TCP","54","49671 > 37282 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30327","14.094589","172.30.1.205","172.30.1.104","TCP","54","37282 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "30328","14.094696","172.30.1.104","172.30.1.205","TCP","54","49671 > 37302 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30329","14.094716","172.30.1.104","172.30.1.205","TCP","54","49671 > 37306 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30330","14.094736","172.30.1.104","172.30.1.205","TCP","54","49671 > 37302 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30331","14.094740","172.30.1.205","172.30.1.104","TCP","54","37302 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "30332","14.094757","172.30.1.104","172.30.1.205","TCP","54","49671 > 37306 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30333","14.094761","172.30.1.205","172.30.1.104","TCP","54","37306 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "30334","14.094777","172.30.1.104","172.30.1.205","TCP","54","49671 > 37310 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30335","14.094797","172.30.1.104","172.30.1.205","TCP","54","49671 > 37310 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30336","14.094801","172.30.1.205","172.30.1.104","TCP","54","37310 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "30337","14.094817","172.30.1.104","172.30.1.205","TCP","54","49671 > 37314 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30338","14.094837","172.30.1.104","172.30.1.205","TCP","54","49671 > 37314 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30339","14.094841","172.30.1.205","172.30.1.104","TCP","54","37314 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "30340","14.094880","172.30.1.104","172.30.1.205","TCP","54","49671 > 37270 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30341","14.095260","172.30.1.104","172.30.1.205","TCP","54","49671 > 37298 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30342","14.095266","172.30.1.205","172.30.1.104","TCP","54","37298 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "30343","14.095289","172.30.1.104","172.30.1.205","TCP","54","49671 > 37270 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30344","14.095292","172.30.1.205","172.30.1.104","TCP","54","37270 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "30345","14.095552","172.30.1.205","172.30.1.104","TCP","54","44680 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30346","14.095672","172.30.1.205","172.30.1.104","TCP","74","37318 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917322 TSecr=0 WS=128" "30347","14.095866","172.30.1.104","172.30.1.205","TCP","54","135 > 44680 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30348","14.095973","172.30.1.104","172.30.1.205","TCP","54","135 > 44680 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30349","14.095977","172.30.1.205","172.30.1.104","TCP","54","44680 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30350","14.096004","172.30.1.104","172.30.1.205","TCP","66","49671 > 37318 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30351","14.096012","172.30.1.205","172.30.1.104","TCP","54","37318 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30352","14.096362","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30353","14.096680","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30354","14.096689","172.30.1.205","172.30.1.104","TCP","54","37318 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30355","14.098589","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30356","14.098993","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30357","14.098999","172.30.1.205","172.30.1.104","TCP","54","37318 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30358","14.100356","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30359","14.102926","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30360","14.102936","172.30.1.205","172.30.1.104","TCP","54","37318 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30361","14.103899","172.30.1.205","172.30.1.104","TCP","74","44684 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917330 TSecr=0 WS=128" "30362","14.104233","172.30.1.104","172.30.1.205","TCP","66","135 > 44684 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30363","14.104244","172.30.1.205","172.30.1.104","TCP","54","44684 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30364","14.104596","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30365","14.104944","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30366","14.104954","172.30.1.205","172.30.1.104","TCP","54","44684 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30367","14.107142","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30368","14.107585","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30369","14.107592","172.30.1.205","172.30.1.104","TCP","54","44684 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30370","14.109428","172.30.1.205","172.30.1.104","TCP","54","44684 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30371","14.109541","172.30.1.205","172.30.1.104","TCP","74","37322 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917335 TSecr=0 WS=128" "30372","14.109718","172.30.1.104","172.30.1.205","TCP","54","135 > 44684 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30373","14.109743","172.30.1.104","172.30.1.205","TCP","54","135 > 44684 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30374","14.109750","172.30.1.205","172.30.1.104","TCP","54","44684 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30375","14.109829","172.30.1.104","172.30.1.205","TCP","66","49671 > 37322 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30376","14.109838","172.30.1.205","172.30.1.104","TCP","54","37322 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30377","14.110178","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30378","14.110487","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30379","14.110495","172.30.1.205","172.30.1.104","TCP","54","37322 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30380","14.112352","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30381","14.112738","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30382","14.112745","172.30.1.205","172.30.1.104","TCP","54","37322 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30383","14.114109","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30384","14.116748","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30385","14.116760","172.30.1.205","172.30.1.104","TCP","54","37322 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30386","14.117743","172.30.1.205","172.30.1.104","TCP","74","44688 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917344 TSecr=0 WS=128" "30387","14.118068","172.30.1.104","172.30.1.205","TCP","66","135 > 44688 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30388","14.118079","172.30.1.205","172.30.1.104","TCP","54","44688 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30389","14.118436","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30390","14.118747","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30391","14.118756","172.30.1.205","172.30.1.104","TCP","54","44688 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30392","14.120977","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30393","14.121439","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30394","14.121446","172.30.1.205","172.30.1.104","TCP","54","44688 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30395","14.123266","172.30.1.205","172.30.1.104","TCP","54","44688 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30396","14.123379","172.30.1.205","172.30.1.104","TCP","74","37326 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917349 TSecr=0 WS=128" "30397","14.123538","172.30.1.104","172.30.1.205","TCP","54","135 > 44688 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30398","14.123575","172.30.1.104","172.30.1.205","TCP","54","135 > 44688 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30399","14.123581","172.30.1.205","172.30.1.104","TCP","54","44688 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30400","14.123668","172.30.1.104","172.30.1.205","TCP","66","49671 > 37326 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30401","14.123678","172.30.1.205","172.30.1.104","TCP","54","37326 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30402","14.124020","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30403","14.124349","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30404","14.124358","172.30.1.205","172.30.1.104","TCP","54","37326 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30405","14.126266","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30406","14.126663","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30407","14.126670","172.30.1.205","172.30.1.104","TCP","54","37326 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30408","14.128009","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30409","14.131913","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30410","14.131923","172.30.1.205","172.30.1.104","TCP","54","37326 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30411","14.132894","172.30.1.205","172.30.1.104","TCP","74","44692 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917359 TSecr=0 WS=128" "30412","14.133232","172.30.1.104","172.30.1.205","TCP","66","135 > 44692 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30413","14.133244","172.30.1.205","172.30.1.104","TCP","54","44692 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30414","14.133601","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30415","14.133914","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30416","14.133923","172.30.1.205","172.30.1.104","TCP","54","44692 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30417","14.136117","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30418","14.136558","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30419","14.136564","172.30.1.205","172.30.1.104","TCP","54","44692 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30420","14.138397","172.30.1.205","172.30.1.104","TCP","54","44692 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30421","14.138511","172.30.1.205","172.30.1.104","TCP","74","37330 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917364 TSecr=0 WS=128" "30422","14.138696","172.30.1.104","172.30.1.205","TCP","54","135 > 44692 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30423","14.138765","172.30.1.104","172.30.1.205","TCP","54","135 > 44692 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30424","14.138772","172.30.1.205","172.30.1.104","TCP","54","44692 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30425","14.138856","172.30.1.104","172.30.1.205","TCP","66","49671 > 37330 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30426","14.138864","172.30.1.205","172.30.1.104","TCP","54","37330 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30427","14.139214","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30428","14.140149","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30429","14.140158","172.30.1.205","172.30.1.104","TCP","54","37330 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30430","14.142077","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30431","14.142465","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30432","14.142471","172.30.1.205","172.30.1.104","TCP","54","37330 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30433","14.143817","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30434","14.147933","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30435","14.147944","172.30.1.205","172.30.1.104","TCP","54","37330 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30436","14.148928","172.30.1.205","172.30.1.104","TCP","74","44696 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917375 TSecr=0 WS=128" "30437","14.149264","172.30.1.104","172.30.1.205","TCP","66","135 > 44696 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30438","14.149275","172.30.1.205","172.30.1.104","TCP","54","44696 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30439","14.149645","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30440","14.149996","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30441","14.150005","172.30.1.205","172.30.1.104","TCP","54","44696 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30442","14.152178","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30443","14.152661","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30444","14.152668","172.30.1.205","172.30.1.104","TCP","54","44696 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30445","14.154492","172.30.1.205","172.30.1.104","TCP","54","44696 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30446","14.154604","172.30.1.205","172.30.1.104","TCP","74","37334 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917381 TSecr=0 WS=128" "30447","14.154825","172.30.1.104","172.30.1.205","TCP","54","135 > 44696 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30448","14.154834","172.30.1.104","172.30.1.205","TCP","54","135 > 44696 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30449","14.154840","172.30.1.205","172.30.1.104","TCP","54","44696 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30450","14.154950","172.30.1.104","172.30.1.205","TCP","66","49671 > 37334 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30451","14.154959","172.30.1.205","172.30.1.104","TCP","54","37334 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30452","14.155306","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30453","14.156588","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30454","14.156595","172.30.1.205","172.30.1.104","TCP","54","37334 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30455","14.158483","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30456","14.158913","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30457","14.158920","172.30.1.205","172.30.1.104","TCP","54","37334 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30458","14.160280","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30459","14.162989","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30460","14.163000","172.30.1.205","172.30.1.104","TCP","54","37334 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30461","14.163955","172.30.1.205","172.30.1.104","TCP","74","44700 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917390 TSecr=0 WS=128" "30462","14.164263","172.30.1.104","172.30.1.205","TCP","66","135 > 44700 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30463","14.164274","172.30.1.205","172.30.1.104","TCP","54","44700 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30464","14.164625","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30465","14.164927","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30466","14.164936","172.30.1.205","172.30.1.104","TCP","54","44700 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30467","14.167138","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30468","14.167574","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30469","14.167581","172.30.1.205","172.30.1.104","TCP","54","44700 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30470","14.169415","172.30.1.205","172.30.1.104","TCP","54","44700 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30471","14.169525","172.30.1.205","172.30.1.104","TCP","74","37338 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917395 TSecr=0 WS=128" "30472","14.169681","172.30.1.104","172.30.1.205","TCP","54","135 > 44700 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30473","14.169715","172.30.1.104","172.30.1.205","TCP","54","135 > 44700 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30474","14.169721","172.30.1.205","172.30.1.104","TCP","54","44700 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30475","14.169796","172.30.1.104","172.30.1.205","TCP","66","49671 > 37338 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30476","14.169804","172.30.1.205","172.30.1.104","TCP","54","37338 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30477","14.170146","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30478","14.170451","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30479","14.170460","172.30.1.205","172.30.1.104","TCP","54","37338 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30480","14.172342","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30481","14.172710","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30482","14.172717","172.30.1.205","172.30.1.104","TCP","54","37338 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30483","14.174088","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30484","14.176676","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30485","14.176685","172.30.1.205","172.30.1.104","TCP","54","37338 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30486","14.177668","172.30.1.205","172.30.1.104","TCP","74","44704 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917404 TSecr=0 WS=128" "30487","14.178002","172.30.1.104","172.30.1.205","TCP","66","135 > 44704 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30488","14.178012","172.30.1.205","172.30.1.104","TCP","54","44704 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30489","14.178357","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30490","14.178678","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30491","14.178687","172.30.1.205","172.30.1.104","TCP","54","44704 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30492","14.180897","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30493","14.181318","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30494","14.181324","172.30.1.205","172.30.1.104","TCP","54","44704 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30495","14.183132","172.30.1.205","172.30.1.104","TCP","54","44704 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30496","14.183247","172.30.1.205","172.30.1.104","TCP","74","37342 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917409 TSecr=0 WS=128" "30497","14.183466","172.30.1.104","172.30.1.205","TCP","54","135 > 44704 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30498","14.183504","172.30.1.104","172.30.1.205","TCP","54","135 > 44704 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30499","14.183511","172.30.1.205","172.30.1.104","TCP","54","44704 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30500","14.183550","172.30.1.104","172.30.1.205","TCP","66","49671 > 37342 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30501","14.183558","172.30.1.205","172.30.1.104","TCP","54","37342 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30502","14.183897","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30503","14.184197","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30504","14.184206","172.30.1.205","172.30.1.104","TCP","54","37342 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30505","14.186122","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30506","14.186500","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30507","14.186507","172.30.1.205","172.30.1.104","TCP","54","37342 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30508","14.187858","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30509","14.190442","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30510","14.190451","172.30.1.205","172.30.1.104","TCP","54","37342 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30511","14.191409","172.30.1.205","172.30.1.104","TCP","74","44708 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917417 TSecr=0 WS=128" "30512","14.191738","172.30.1.104","172.30.1.205","TCP","66","135 > 44708 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30513","14.191749","172.30.1.205","172.30.1.104","TCP","54","44708 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30514","14.192104","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30515","14.192412","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30516","14.192421","172.30.1.205","172.30.1.104","TCP","54","44708 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30517","14.194646","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30518","14.195046","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30519","14.195052","172.30.1.205","172.30.1.104","TCP","54","44708 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30520","14.196873","172.30.1.205","172.30.1.104","TCP","54","44708 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30521","14.196983","172.30.1.205","172.30.1.104","TCP","74","37346 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917423 TSecr=0 WS=128" "30522","14.197140","172.30.1.104","172.30.1.205","TCP","54","135 > 44708 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30523","14.197199","172.30.1.104","172.30.1.205","TCP","54","135 > 44708 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30524","14.197205","172.30.1.205","172.30.1.104","TCP","54","44708 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30525","14.197277","172.30.1.104","172.30.1.205","TCP","66","49671 > 37346 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30526","14.197285","172.30.1.205","172.30.1.104","TCP","54","37346 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30527","14.197629","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30528","14.197930","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30529","14.197939","172.30.1.205","172.30.1.104","TCP","54","37346 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30530","14.199852","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30531","14.200227","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30532","14.200233","172.30.1.205","172.30.1.104","TCP","54","37346 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30533","14.201617","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30534","14.207016","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30535","14.207026","172.30.1.205","172.30.1.104","TCP","54","37346 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30536","14.207993","172.30.1.205","172.30.1.104","TCP","74","44712 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917434 TSecr=0 WS=128" "30537","14.208305","172.30.1.104","172.30.1.205","TCP","66","135 > 44712 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30538","14.208317","172.30.1.205","172.30.1.104","TCP","54","44712 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30539","14.208673","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30540","14.208978","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30541","14.208987","172.30.1.205","172.30.1.104","TCP","54","44712 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30542","14.211173","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30543","14.211554","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30544","14.211561","172.30.1.205","172.30.1.104","TCP","54","44712 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30545","14.213386","172.30.1.205","172.30.1.104","TCP","54","44712 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30546","14.213498","172.30.1.205","172.30.1.104","TCP","74","37350 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917439 TSecr=0 WS=128" "30547","14.213657","172.30.1.104","172.30.1.205","TCP","54","135 > 44712 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30548","14.213721","172.30.1.104","172.30.1.205","TCP","54","135 > 44712 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30549","14.213732","172.30.1.205","172.30.1.104","TCP","54","44712 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30550","14.213740","172.30.1.104","172.30.1.205","TCP","66","49671 > 37350 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30551","14.213756","172.30.1.205","172.30.1.104","TCP","54","37350 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30552","14.214157","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30553","14.214452","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30554","14.214461","172.30.1.205","172.30.1.104","TCP","54","37350 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30555","14.216372","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30556","14.216844","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30557","14.216851","172.30.1.205","172.30.1.104","TCP","54","37350 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30558","14.218214","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30559","14.220717","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30560","14.220728","172.30.1.205","172.30.1.104","TCP","54","37350 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30561","14.221735","172.30.1.205","172.30.1.104","TCP","74","44716 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917448 TSecr=0 WS=128" "30562","14.222025","172.30.1.104","172.30.1.205","TCP","66","135 > 44716 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30563","14.222036","172.30.1.205","172.30.1.104","TCP","54","44716 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30564","14.222387","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30565","14.222667","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30566","14.222676","172.30.1.205","172.30.1.104","TCP","54","44716 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30567","14.224897","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30568","14.225280","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30569","14.225287","172.30.1.205","172.30.1.104","TCP","54","44716 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30570","14.227122","172.30.1.205","172.30.1.104","TCP","54","44716 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30571","14.227240","172.30.1.205","172.30.1.104","TCP","74","37354 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917453 TSecr=0 WS=128" "30572","14.227417","172.30.1.104","172.30.1.205","TCP","54","135 > 44716 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30573","14.227453","172.30.1.104","172.30.1.205","TCP","54","135 > 44716 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30574","14.227459","172.30.1.205","172.30.1.104","TCP","54","44716 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30575","14.227547","172.30.1.104","172.30.1.205","TCP","66","49671 > 37354 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30576","14.227555","172.30.1.205","172.30.1.104","TCP","54","37354 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30577","14.227922","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30578","14.228298","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30579","14.228307","172.30.1.205","172.30.1.104","TCP","54","37354 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30580","14.230211","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30581","14.230716","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30582","14.230723","172.30.1.205","172.30.1.104","TCP","54","37354 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30583","14.232076","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30584","14.234643","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30585","14.234654","172.30.1.205","172.30.1.104","TCP","54","37354 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30586","14.235660","172.30.1.205","172.30.1.104","TCP","74","44720 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917462 TSecr=0 WS=128" "30587","14.235975","172.30.1.104","172.30.1.205","TCP","66","135 > 44720 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30588","14.235987","172.30.1.205","172.30.1.104","TCP","54","44720 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30589","14.236349","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30590","14.236660","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30591","14.236669","172.30.1.205","172.30.1.104","TCP","54","44720 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30592","14.238922","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30593","14.239338","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30594","14.239345","172.30.1.205","172.30.1.104","TCP","54","44720 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30595","14.241234","172.30.1.205","172.30.1.104","TCP","54","44720 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30596","14.241350","172.30.1.205","172.30.1.104","TCP","74","37358 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917467 TSecr=0 WS=128" "30597","14.241523","172.30.1.104","172.30.1.205","TCP","54","135 > 44720 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30598","14.241559","172.30.1.104","172.30.1.205","TCP","54","135 > 44720 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30599","14.241567","172.30.1.205","172.30.1.104","TCP","54","44720 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30600","14.241648","172.30.1.104","172.30.1.205","TCP","66","49671 > 37358 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30601","14.241655","172.30.1.205","172.30.1.104","TCP","54","37358 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30602","14.242025","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30603","14.242330","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30604","14.242339","172.30.1.205","172.30.1.104","TCP","54","37358 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30605","14.244219","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30606","14.244605","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30607","14.244611","172.30.1.205","172.30.1.104","TCP","54","37358 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30608","14.245994","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30609","14.248548","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30610","14.248558","172.30.1.205","172.30.1.104","TCP","54","37358 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30611","14.249545","172.30.1.205","172.30.1.104","TCP","74","44724 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917475 TSecr=0 WS=128" "30612","14.249885","172.30.1.104","172.30.1.205","TCP","66","135 > 44724 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30613","14.249902","172.30.1.205","172.30.1.104","TCP","54","44724 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30614","14.250306","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30615","14.250616","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30616","14.250626","172.30.1.205","172.30.1.104","TCP","54","44724 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30617","14.252880","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30618","14.253321","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30619","14.253329","172.30.1.205","172.30.1.104","TCP","54","44724 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30620","14.255180","172.30.1.205","172.30.1.104","TCP","54","44724 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30621","14.255303","172.30.1.205","172.30.1.104","TCP","74","37362 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917481 TSecr=0 WS=128" "30622","14.255479","172.30.1.104","172.30.1.205","TCP","54","135 > 44724 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30623","14.255517","172.30.1.104","172.30.1.205","TCP","54","135 > 44724 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30624","14.255524","172.30.1.205","172.30.1.104","TCP","54","44724 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30625","14.255604","172.30.1.104","172.30.1.205","TCP","66","49671 > 37362 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30626","14.255612","172.30.1.205","172.30.1.104","TCP","54","37362 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30627","14.255961","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30628","14.256277","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30629","14.256287","172.30.1.205","172.30.1.104","TCP","54","37362 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30630","14.258218","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30631","14.258614","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30632","14.258620","172.30.1.205","172.30.1.104","TCP","54","37362 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30633","14.259989","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30634","14.262658","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30635","14.262672","172.30.1.205","172.30.1.104","TCP","54","37362 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30636","14.263729","172.30.1.205","172.30.1.104","TCP","74","44728 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917490 TSecr=0 WS=128" "30637","14.264018","172.30.1.104","172.30.1.205","TCP","66","135 > 44728 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30638","14.264030","172.30.1.205","172.30.1.104","TCP","54","44728 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30639","14.264393","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30640","14.264738","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30641","14.264748","172.30.1.205","172.30.1.104","TCP","54","44728 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30642","14.266983","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30643","14.267396","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30644","14.267403","172.30.1.205","172.30.1.104","TCP","54","44728 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30645","14.268266","172.30.1.205","172.30.1.104","TCP","54","37322 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30646","14.268317","172.30.1.205","172.30.1.104","TCP","54","37326 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30647","14.268354","172.30.1.205","172.30.1.104","TCP","54","37330 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30648","14.268389","172.30.1.205","172.30.1.104","TCP","54","37334 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30649","14.268422","172.30.1.205","172.30.1.104","TCP","54","37338 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30650","14.268459","172.30.1.205","172.30.1.104","TCP","54","37342 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30651","14.268491","172.30.1.205","172.30.1.104","TCP","54","37346 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30652","14.268524","172.30.1.205","172.30.1.104","TCP","54","37350 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30653","14.268551","172.30.1.205","172.30.1.104","TCP","54","37354 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30654","14.268584","172.30.1.205","172.30.1.104","TCP","54","37358 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30655","14.268608","172.30.1.205","172.30.1.104","TCP","54","37362 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30656","14.268670","172.30.1.104","172.30.1.205","TCP","54","49671 > 37322 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30657","14.268682","172.30.1.104","172.30.1.205","TCP","54","49671 > 37326 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30658","14.268694","172.30.1.104","172.30.1.205","TCP","54","49671 > 37322 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30659","14.268701","172.30.1.205","172.30.1.104","TCP","54","37322 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "30660","14.268715","172.30.1.104","172.30.1.205","TCP","54","49671 > 37330 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30661","14.268730","172.30.1.205","172.30.1.104","TCP","54","37318 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30662","14.268809","172.30.1.104","172.30.1.205","TCP","54","49671 > 37334 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30663","14.269098","172.30.1.104","172.30.1.205","TCP","54","49671 > 37334 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30664","14.269105","172.30.1.205","172.30.1.104","TCP","54","37334 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "30665","14.269114","172.30.1.104","172.30.1.205","TCP","54","49671 > 37338 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30666","14.269131","172.30.1.104","172.30.1.205","TCP","54","49671 > 37326 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30667","14.269134","172.30.1.205","172.30.1.104","TCP","54","37326 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "30668","14.269190","172.30.1.104","172.30.1.205","TCP","54","49671 > 37338 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30669","14.269194","172.30.1.205","172.30.1.104","TCP","54","37338 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "30670","14.269220","172.30.1.104","172.30.1.205","TCP","54","49671 > 37330 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30671","14.269223","172.30.1.205","172.30.1.104","TCP","54","37330 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "30672","14.269245","172.30.1.104","172.30.1.205","TCP","54","49671 > 37342 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30673","14.269278","172.30.1.104","172.30.1.205","TCP","54","49671 > 37346 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30674","14.269301","172.30.1.104","172.30.1.205","TCP","54","49671 > 37342 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30675","14.269305","172.30.1.205","172.30.1.104","TCP","54","37342 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "30676","14.269320","172.30.1.104","172.30.1.205","TCP","54","49671 > 37350 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30677","14.269342","172.30.1.104","172.30.1.205","TCP","54","49671 > 37346 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30678","14.269346","172.30.1.205","172.30.1.104","TCP","54","37346 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "30679","14.269363","172.30.1.104","172.30.1.205","TCP","54","49671 > 37354 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30680","14.269492","172.30.1.104","172.30.1.205","TCP","54","49671 > 37350 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30681","14.269497","172.30.1.205","172.30.1.104","TCP","54","37350 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "30682","14.269512","172.30.1.104","172.30.1.205","TCP","54","49671 > 37354 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30683","14.269515","172.30.1.205","172.30.1.104","TCP","54","37354 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "30684","14.269537","172.30.1.104","172.30.1.205","TCP","54","49671 > 37358 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30685","14.269556","172.30.1.104","172.30.1.205","TCP","54","49671 > 37362 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30686","14.269576","172.30.1.104","172.30.1.205","TCP","54","49671 > 37358 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30687","14.269579","172.30.1.205","172.30.1.104","TCP","54","37358 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "30688","14.269850","172.30.1.104","172.30.1.205","TCP","54","49671 > 37318 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30689","14.269869","172.30.1.104","172.30.1.205","TCP","54","49671 > 37362 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30690","14.269873","172.30.1.205","172.30.1.104","TCP","54","37362 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "30691","14.269897","172.30.1.104","172.30.1.205","TCP","54","49671 > 37318 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "30692","14.269900","172.30.1.205","172.30.1.104","TCP","54","37318 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "30693","14.270398","172.30.1.205","172.30.1.104","TCP","54","44728 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30694","14.270530","172.30.1.205","172.30.1.104","TCP","74","37366 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917496 TSecr=0 WS=128" "30695","14.270659","172.30.1.104","172.30.1.205","TCP","54","135 > 44728 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30696","14.270696","172.30.1.104","172.30.1.205","TCP","54","135 > 44728 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30697","14.270701","172.30.1.205","172.30.1.104","TCP","54","44728 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30698","14.270825","172.30.1.104","172.30.1.205","TCP","66","49671 > 37366 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30699","14.270834","172.30.1.205","172.30.1.104","TCP","54","37366 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30700","14.271197","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30701","14.271518","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30702","14.271527","172.30.1.205","172.30.1.104","TCP","54","37366 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30703","14.273437","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30704","14.274375","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30705","14.274382","172.30.1.205","172.30.1.104","TCP","54","37366 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30706","14.275774","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30707","14.278438","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30708","14.278448","172.30.1.205","172.30.1.104","TCP","54","37366 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30709","14.279438","172.30.1.205","172.30.1.104","TCP","74","44732 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917505 TSecr=0 WS=128" "30710","14.279763","172.30.1.104","172.30.1.205","TCP","66","135 > 44732 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30711","14.279774","172.30.1.205","172.30.1.104","TCP","54","44732 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30712","14.280132","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30713","14.280457","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30714","14.280465","172.30.1.205","172.30.1.104","TCP","54","44732 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30715","14.282714","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30716","14.283144","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30717","14.283151","172.30.1.205","172.30.1.104","TCP","54","44732 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30718","14.285045","172.30.1.205","172.30.1.104","TCP","54","44732 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30719","14.285199","172.30.1.205","172.30.1.104","TCP","74","37370 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917511 TSecr=0 WS=128" "30720","14.285334","172.30.1.104","172.30.1.205","TCP","54","135 > 44732 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30721","14.285367","172.30.1.104","172.30.1.205","TCP","54","135 > 44732 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30722","14.285376","172.30.1.205","172.30.1.104","TCP","54","44732 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30723","14.285505","172.30.1.104","172.30.1.205","TCP","66","49671 > 37370 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30724","14.285514","172.30.1.205","172.30.1.104","TCP","54","37370 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30725","14.285872","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30726","14.286176","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30727","14.286184","172.30.1.205","172.30.1.104","TCP","54","37370 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30728","14.288064","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30729","14.288443","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30730","14.288450","172.30.1.205","172.30.1.104","TCP","54","37370 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30731","14.289847","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30732","14.292414","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30733","14.292424","172.30.1.205","172.30.1.104","TCP","54","37370 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30734","14.293428","172.30.1.205","172.30.1.104","TCP","74","44736 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917519 TSecr=0 WS=128" "30735","14.293729","172.30.1.104","172.30.1.205","TCP","66","135 > 44736 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30736","14.293741","172.30.1.205","172.30.1.104","TCP","54","44736 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30737","14.294094","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30738","14.294401","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30739","14.294410","172.30.1.205","172.30.1.104","TCP","54","44736 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30740","14.296653","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30741","14.297048","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30742","14.297055","172.30.1.205","172.30.1.104","TCP","54","44736 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30743","14.298898","172.30.1.205","172.30.1.104","TCP","54","44736 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30744","14.299021","172.30.1.205","172.30.1.104","TCP","74","37374 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917525 TSecr=0 WS=128" "30745","14.299183","172.30.1.104","172.30.1.205","TCP","54","135 > 44736 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30746","14.299236","172.30.1.104","172.30.1.205","TCP","54","135 > 44736 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30747","14.299243","172.30.1.205","172.30.1.104","TCP","54","44736 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30748","14.299337","172.30.1.104","172.30.1.205","TCP","66","49671 > 37374 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30749","14.299346","172.30.1.205","172.30.1.104","TCP","54","37374 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30750","14.299696","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30751","14.301177","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30752","14.301190","172.30.1.205","172.30.1.104","TCP","54","37374 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30753","14.303196","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30754","14.303632","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30755","14.303639","172.30.1.205","172.30.1.104","TCP","54","37374 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30756","14.305042","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30757","14.307616","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30758","14.307626","172.30.1.205","172.30.1.104","TCP","54","37374 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30759","14.308659","172.30.1.205","172.30.1.104","TCP","74","44740 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917535 TSecr=0 WS=128" "30760","14.308966","172.30.1.104","172.30.1.205","TCP","66","135 > 44740 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30761","14.308980","172.30.1.205","172.30.1.104","TCP","54","44740 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30762","14.309350","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30763","14.309664","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30764","14.309673","172.30.1.205","172.30.1.104","TCP","54","44740 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30765","14.311908","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30766","14.312396","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30767","14.312402","172.30.1.205","172.30.1.104","TCP","54","44740 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30768","14.314254","172.30.1.205","172.30.1.104","TCP","54","44740 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30769","14.314394","172.30.1.205","172.30.1.104","TCP","74","37378 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917540 TSecr=0 WS=128" "30770","14.314523","172.30.1.104","172.30.1.205","TCP","54","135 > 44740 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30771","14.314558","172.30.1.104","172.30.1.205","TCP","54","135 > 44740 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30772","14.314565","172.30.1.205","172.30.1.104","TCP","54","44740 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30773","14.314744","172.30.1.104","172.30.1.205","TCP","66","49671 > 37378 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30774","14.314752","172.30.1.205","172.30.1.104","TCP","54","37378 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30775","14.315122","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30776","14.316580","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30777","14.316589","172.30.1.205","172.30.1.104","TCP","54","37378 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30778","14.318500","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30779","14.318861","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30780","14.318867","172.30.1.205","172.30.1.104","TCP","54","37378 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30781","14.320234","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30782","14.322761","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30783","14.322771","172.30.1.205","172.30.1.104","TCP","54","37378 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30784","14.323795","172.30.1.205","172.30.1.104","TCP","74","44744 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917550 TSecr=0 WS=128" "30785","14.324112","172.30.1.104","172.30.1.205","TCP","66","135 > 44744 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30786","14.324124","172.30.1.205","172.30.1.104","TCP","54","44744 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30787","14.324481","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30788","14.324791","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30789","14.324801","172.30.1.205","172.30.1.104","TCP","54","44744 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30790","14.327035","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30791","14.327427","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30792","14.327434","172.30.1.205","172.30.1.104","TCP","54","44744 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30793","14.329273","172.30.1.205","172.30.1.104","TCP","54","44744 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30794","14.329389","172.30.1.205","172.30.1.104","TCP","74","37382 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917555 TSecr=0 WS=128" "30795","14.329547","172.30.1.104","172.30.1.205","TCP","54","135 > 44744 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30796","14.329579","172.30.1.104","172.30.1.205","TCP","54","135 > 44744 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30797","14.329586","172.30.1.205","172.30.1.104","TCP","54","44744 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30798","14.329697","172.30.1.104","172.30.1.205","TCP","66","49671 > 37382 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30799","14.329710","172.30.1.205","172.30.1.104","TCP","54","37382 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30800","14.330056","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30801","14.330371","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30802","14.330380","172.30.1.205","172.30.1.104","TCP","54","37382 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30803","14.332255","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30804","14.332645","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30805","14.332652","172.30.1.205","172.30.1.104","TCP","54","37382 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30806","14.334025","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30807","14.336671","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30808","14.336682","172.30.1.205","172.30.1.104","TCP","54","37382 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30809","14.337682","172.30.1.205","172.30.1.104","TCP","74","44748 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917564 TSecr=0 WS=128" "30810","14.338048","172.30.1.104","172.30.1.205","TCP","66","135 > 44748 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30811","14.338058","172.30.1.205","172.30.1.104","TCP","54","44748 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30812","14.338406","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30813","14.338731","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30814","14.338740","172.30.1.205","172.30.1.104","TCP","54","44748 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30815","14.340952","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30816","14.341386","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30817","14.341393","172.30.1.205","172.30.1.104","TCP","54","44748 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30818","14.343209","172.30.1.205","172.30.1.104","TCP","54","44748 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30819","14.343322","172.30.1.205","172.30.1.104","TCP","74","37386 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917569 TSecr=0 WS=128" "30820","14.343487","172.30.1.104","172.30.1.205","TCP","54","135 > 44748 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30821","14.343521","172.30.1.104","172.30.1.205","TCP","54","135 > 44748 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30822","14.343528","172.30.1.205","172.30.1.104","TCP","54","44748 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30823","14.343611","172.30.1.104","172.30.1.205","TCP","66","49671 > 37386 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30824","14.343619","172.30.1.205","172.30.1.104","TCP","54","37386 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30825","14.343962","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30826","14.344307","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30827","14.344314","172.30.1.205","172.30.1.104","TCP","54","37386 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30828","14.346213","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30829","14.346591","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30830","14.346598","172.30.1.205","172.30.1.104","TCP","54","37386 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30831","14.347946","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30832","14.350592","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30833","14.350602","172.30.1.205","172.30.1.104","TCP","54","37386 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30834","14.351560","172.30.1.205","172.30.1.104","TCP","74","44752 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917577 TSecr=0 WS=128" "30835","14.351885","172.30.1.104","172.30.1.205","TCP","66","135 > 44752 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30836","14.351895","172.30.1.205","172.30.1.104","TCP","54","44752 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30837","14.352238","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30838","14.352580","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30839","14.352589","172.30.1.205","172.30.1.104","TCP","54","44752 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30840","14.354795","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30841","14.355243","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30842","14.355249","172.30.1.205","172.30.1.104","TCP","54","44752 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30843","14.357078","172.30.1.205","172.30.1.104","TCP","54","44752 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30844","14.357191","172.30.1.205","172.30.1.104","TCP","74","37390 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917583 TSecr=0 WS=128" "30845","14.357404","172.30.1.104","172.30.1.205","TCP","54","135 > 44752 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30846","14.357426","172.30.1.104","172.30.1.205","TCP","54","135 > 44752 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30847","14.357433","172.30.1.205","172.30.1.104","TCP","54","44752 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30848","14.357521","172.30.1.104","172.30.1.205","TCP","66","49671 > 37390 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30849","14.357529","172.30.1.205","172.30.1.104","TCP","54","37390 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30850","14.357893","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30851","14.358217","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30852","14.358226","172.30.1.205","172.30.1.104","TCP","54","37390 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30853","14.360085","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30854","14.360469","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30855","14.360476","172.30.1.205","172.30.1.104","TCP","54","37390 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30856","14.361848","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30857","14.364543","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30858","14.364552","172.30.1.205","172.30.1.104","TCP","54","37390 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30859","14.365518","172.30.1.205","172.30.1.104","TCP","74","44756 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917591 TSecr=0 WS=128" "30860","14.365829","172.30.1.104","172.30.1.205","TCP","66","135 > 44756 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30861","14.365839","172.30.1.205","172.30.1.104","TCP","54","44756 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30862","14.366184","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30863","14.366523","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30864","14.366539","172.30.1.205","172.30.1.104","TCP","54","44756 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30865","14.368747","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30866","14.369170","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30867","14.369177","172.30.1.205","172.30.1.104","TCP","54","44756 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30868","14.370990","172.30.1.205","172.30.1.104","TCP","54","44756 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30869","14.371102","172.30.1.205","172.30.1.104","TCP","74","37394 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917597 TSecr=0 WS=128" "30870","14.371280","172.30.1.104","172.30.1.205","TCP","54","135 > 44756 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30871","14.371331","172.30.1.104","172.30.1.205","TCP","54","135 > 44756 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30872","14.371337","172.30.1.205","172.30.1.104","TCP","54","44756 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30873","14.371416","172.30.1.104","172.30.1.205","TCP","66","49671 > 37394 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30874","14.371425","172.30.1.205","172.30.1.104","TCP","54","37394 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30875","14.371766","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30876","14.372092","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30877","14.372101","172.30.1.205","172.30.1.104","TCP","54","37394 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30878","14.374007","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30879","14.374409","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30880","14.374415","172.30.1.205","172.30.1.104","TCP","54","37394 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30881","14.375763","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30882","14.378388","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30883","14.378397","172.30.1.205","172.30.1.104","TCP","54","37394 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30884","14.379350","172.30.1.205","172.30.1.104","TCP","74","44760 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917605 TSecr=0 WS=128" "30885","14.379652","172.30.1.104","172.30.1.205","TCP","66","135 > 44760 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30886","14.379663","172.30.1.205","172.30.1.104","TCP","54","44760 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30887","14.380029","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30888","14.380311","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30889","14.380319","172.30.1.205","172.30.1.104","TCP","54","44760 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30890","14.382538","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30891","14.382951","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30892","14.382963","172.30.1.205","172.30.1.104","TCP","54","44760 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30893","14.385055","172.30.1.205","172.30.1.104","TCP","54","44760 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30894","14.385163","172.30.1.205","172.30.1.104","TCP","74","37398 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917611 TSecr=0 WS=128" "30895","14.385369","172.30.1.104","172.30.1.205","TCP","54","135 > 44760 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30896","14.385407","172.30.1.104","172.30.1.205","TCP","54","135 > 44760 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30897","14.385413","172.30.1.205","172.30.1.104","TCP","54","44760 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30898","14.385475","172.30.1.104","172.30.1.205","TCP","66","49671 > 37398 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30899","14.385483","172.30.1.205","172.30.1.104","TCP","54","37398 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30900","14.385830","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30901","14.386138","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30902","14.386146","172.30.1.205","172.30.1.104","TCP","54","37398 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30903","14.388005","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30904","14.388394","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30905","14.388400","172.30.1.205","172.30.1.104","TCP","54","37398 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30906","14.389766","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30907","14.392418","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30908","14.392428","172.30.1.205","172.30.1.104","TCP","54","37398 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30909","14.393393","172.30.1.205","172.30.1.104","TCP","74","44764 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917619 TSecr=0 WS=128" "30910","14.393743","172.30.1.104","172.30.1.205","TCP","66","135 > 44764 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30911","14.393753","172.30.1.205","172.30.1.104","TCP","54","44764 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30912","14.394097","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30913","14.394401","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30914","14.394410","172.30.1.205","172.30.1.104","TCP","54","44764 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30915","14.396575","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30916","14.396992","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30917","14.397006","172.30.1.205","172.30.1.104","TCP","54","44764 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30918","14.398815","172.30.1.205","172.30.1.104","TCP","54","44764 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30919","14.398926","172.30.1.205","172.30.1.104","TCP","74","37402 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917625 TSecr=0 WS=128" "30920","14.399120","172.30.1.104","172.30.1.205","TCP","54","135 > 44764 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30921","14.399149","172.30.1.104","172.30.1.205","TCP","54","135 > 44764 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30922","14.399154","172.30.1.205","172.30.1.104","TCP","54","44764 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30923","14.399214","172.30.1.104","172.30.1.205","TCP","66","49671 > 37402 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30924","14.399222","172.30.1.205","172.30.1.104","TCP","54","37402 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30925","14.399560","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30926","14.399869","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30927","14.399877","172.30.1.205","172.30.1.104","TCP","54","37402 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30928","14.401754","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30929","14.402178","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30930","14.402185","172.30.1.205","172.30.1.104","TCP","54","37402 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30931","14.403565","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30932","14.406251","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30933","14.406260","172.30.1.205","172.30.1.104","TCP","54","37402 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30934","14.407200","172.30.1.205","172.30.1.104","TCP","74","44768 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917633 TSecr=0 WS=128" "30935","14.407616","172.30.1.104","172.30.1.205","TCP","66","135 > 44768 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30936","14.407626","172.30.1.205","172.30.1.104","TCP","54","44768 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30937","14.407975","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30938","14.408345","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30939","14.408354","172.30.1.205","172.30.1.104","TCP","54","44768 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30940","14.410567","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30941","14.411029","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30942","14.411035","172.30.1.205","172.30.1.104","TCP","54","44768 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30943","14.412852","172.30.1.205","172.30.1.104","TCP","54","44768 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30944","14.412962","172.30.1.205","172.30.1.104","TCP","74","37406 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917639 TSecr=0 WS=128" "30945","14.413169","172.30.1.104","172.30.1.205","TCP","54","135 > 44768 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30946","14.413177","172.30.1.104","172.30.1.205","TCP","54","135 > 44768 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30947","14.413182","172.30.1.205","172.30.1.104","TCP","54","44768 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30948","14.413228","172.30.1.104","172.30.1.205","TCP","66","49671 > 37406 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30949","14.413237","172.30.1.205","172.30.1.104","TCP","54","37406 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30950","14.413582","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30951","14.413877","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30952","14.413886","172.30.1.205","172.30.1.104","TCP","54","37406 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30953","14.415753","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30954","14.416138","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30955","14.416144","172.30.1.205","172.30.1.104","TCP","54","37406 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30956","14.417509","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30957","14.420343","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30958","14.420352","172.30.1.205","172.30.1.104","TCP","54","37406 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30959","14.421313","172.30.1.205","172.30.1.104","TCP","74","44772 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917647 TSecr=0 WS=128" "30960","14.421626","172.30.1.104","172.30.1.205","TCP","66","135 > 44772 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30961","14.421637","172.30.1.205","172.30.1.104","TCP","54","44772 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30962","14.421987","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30963","14.422335","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30964","14.422344","172.30.1.205","172.30.1.104","TCP","54","44772 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30965","14.424518","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30966","14.424945","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30967","14.424952","172.30.1.205","172.30.1.104","TCP","54","44772 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30968","14.426757","172.30.1.205","172.30.1.104","TCP","54","44772 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "30969","14.426870","172.30.1.205","172.30.1.104","TCP","74","37410 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917653 TSecr=0 WS=128" "30970","14.427063","172.30.1.104","172.30.1.205","TCP","54","135 > 44772 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30971","14.427095","172.30.1.104","172.30.1.205","TCP","54","135 > 44772 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "30972","14.427101","172.30.1.205","172.30.1.104","TCP","54","44772 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "30973","14.427176","172.30.1.104","172.30.1.205","TCP","66","49671 > 37410 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30974","14.427184","172.30.1.205","172.30.1.104","TCP","54","37410 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30975","14.427523","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "30976","14.427839","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30977","14.427846","172.30.1.205","172.30.1.104","TCP","54","37410 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30978","14.429726","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "30979","14.430123","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "30980","14.430130","172.30.1.205","172.30.1.104","TCP","54","37410 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "30981","14.431487","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "30982","14.434243","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "30983","14.434253","172.30.1.205","172.30.1.104","TCP","54","37410 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "30984","14.435215","172.30.1.205","172.30.1.104","TCP","74","44776 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917661 TSecr=0 WS=128" "30985","14.435537","172.30.1.104","172.30.1.205","TCP","66","135 > 44776 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "30986","14.435548","172.30.1.205","172.30.1.104","TCP","54","44776 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "30987","14.435891","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "30988","14.436192","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "30989","14.436200","172.30.1.205","172.30.1.104","TCP","54","44776 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "30990","14.438391","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "30991","14.438850","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "30992","14.438856","172.30.1.205","172.30.1.104","TCP","54","44776 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "30993","14.439727","172.30.1.205","172.30.1.104","TCP","54","37370 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30994","14.439775","172.30.1.205","172.30.1.104","TCP","54","37374 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30995","14.439822","172.30.1.205","172.30.1.104","TCP","54","37378 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30996","14.439858","172.30.1.205","172.30.1.104","TCP","54","37382 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30997","14.439891","172.30.1.205","172.30.1.104","TCP","54","37386 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30998","14.439923","172.30.1.205","172.30.1.104","TCP","54","37390 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "30999","14.439951","172.30.1.205","172.30.1.104","TCP","54","37394 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31000","14.439983","172.30.1.205","172.30.1.104","TCP","54","37398 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31001","14.440009","172.30.1.205","172.30.1.104","TCP","54","37402 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31002","14.440041","172.30.1.205","172.30.1.104","TCP","54","37406 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31003","14.440067","172.30.1.205","172.30.1.104","TCP","54","37410 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31004","14.440134","172.30.1.205","172.30.1.104","TCP","54","37366 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31005","14.440428","172.30.1.104","172.30.1.205","TCP","54","49671 > 37370 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31006","14.440458","172.30.1.104","172.30.1.205","TCP","54","49671 > 37374 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31007","14.440495","172.30.1.104","172.30.1.205","TCP","54","49671 > 37370 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31008","14.440502","172.30.1.205","172.30.1.104","TCP","54","37370 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31009","14.440511","172.30.1.104","172.30.1.205","TCP","54","49671 > 37378 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31010","14.440546","172.30.1.104","172.30.1.205","TCP","54","49671 > 37382 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31011","14.440596","172.30.1.104","172.30.1.205","TCP","54","49671 > 37374 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31012","14.440601","172.30.1.205","172.30.1.104","TCP","54","37374 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31013","14.440615","172.30.1.104","172.30.1.205","TCP","54","49671 > 37386 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31014","14.440638","172.30.1.104","172.30.1.205","TCP","54","49671 > 37386 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31015","14.440641","172.30.1.205","172.30.1.104","TCP","54","37386 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31016","14.440659","172.30.1.104","172.30.1.205","TCP","54","49671 > 37390 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31017","14.440679","172.30.1.104","172.30.1.205","TCP","54","49671 > 37390 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31018","14.440681","172.30.1.205","172.30.1.104","TCP","54","37390 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31019","14.440747","172.30.1.104","172.30.1.205","TCP","54","49671 > 37394 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31020","14.440767","172.30.1.104","172.30.1.205","TCP","54","49671 > 37394 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31021","14.440771","172.30.1.205","172.30.1.104","TCP","54","37394 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31022","14.440787","172.30.1.104","172.30.1.205","TCP","54","49671 > 37398 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31023","14.440808","172.30.1.104","172.30.1.205","TCP","54","49671 > 37398 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31024","14.440811","172.30.1.205","172.30.1.104","TCP","54","37398 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31025","14.440883","172.30.1.104","172.30.1.205","TCP","54","49671 > 37402 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31026","14.440903","172.30.1.104","172.30.1.205","TCP","54","49671 > 37406 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31027","14.440923","172.30.1.104","172.30.1.205","TCP","54","49671 > 37378 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31028","14.440927","172.30.1.205","172.30.1.104","TCP","54","37378 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31029","14.440942","172.30.1.104","172.30.1.205","TCP","54","49671 > 37406 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31030","14.440946","172.30.1.205","172.30.1.104","TCP","54","37406 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31031","14.440962","172.30.1.104","172.30.1.205","TCP","54","49671 > 37410 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31032","14.441046","172.30.1.104","172.30.1.205","TCP","54","49671 > 37410 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31033","14.441049","172.30.1.205","172.30.1.104","TCP","54","37410 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31034","14.441065","172.30.1.104","172.30.1.205","TCP","54","49671 > 37382 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31035","14.441068","172.30.1.205","172.30.1.104","TCP","54","37382 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31036","14.441461","172.30.1.104","172.30.1.205","TCP","54","49671 > 37366 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31037","14.441505","172.30.1.104","172.30.1.205","TCP","54","49671 > 37402 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31038","14.441510","172.30.1.205","172.30.1.104","TCP","54","37402 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31039","14.441526","172.30.1.104","172.30.1.205","TCP","54","49671 > 37366 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31040","14.441536","172.30.1.205","172.30.1.104","TCP","54","37366 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31041","14.441773","172.30.1.205","172.30.1.104","TCP","54","44776 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31042","14.441886","172.30.1.205","172.30.1.104","TCP","74","37414 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917668 TSecr=0 WS=128" "31043","14.442050","172.30.1.104","172.30.1.205","TCP","54","135 > 44776 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31044","14.442085","172.30.1.104","172.30.1.205","TCP","54","135 > 44776 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31045","14.442090","172.30.1.205","172.30.1.104","TCP","54","44776 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31046","14.442164","172.30.1.104","172.30.1.205","TCP","66","49671 > 37414 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31047","14.442172","172.30.1.205","172.30.1.104","TCP","54","37414 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31048","14.442521","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31049","14.442843","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31050","14.442852","172.30.1.205","172.30.1.104","TCP","54","37414 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31051","14.444744","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31052","14.445137","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31053","14.445144","172.30.1.205","172.30.1.104","TCP","54","37414 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31054","14.446501","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31055","14.449151","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31056","14.449162","172.30.1.205","172.30.1.104","TCP","54","37414 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31057","14.450133","172.30.1.205","172.30.1.104","TCP","74","44780 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917676 TSecr=0 WS=128" "31058","14.450461","172.30.1.104","172.30.1.205","TCP","66","135 > 44780 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31059","14.450472","172.30.1.205","172.30.1.104","TCP","54","44780 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31060","14.450825","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31061","14.451141","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31062","14.451152","172.30.1.205","172.30.1.104","TCP","54","44780 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31063","14.453364","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31064","14.453794","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31065","14.453801","172.30.1.205","172.30.1.104","TCP","54","44780 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31066","14.455589","172.30.1.205","172.30.1.104","TCP","54","44780 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31067","14.455700","172.30.1.205","172.30.1.104","TCP","74","37418 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917682 TSecr=0 WS=128" "31068","14.455986","172.30.1.104","172.30.1.205","TCP","54","135 > 44780 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31069","14.455997","172.30.1.104","172.30.1.205","TCP","54","135 > 44780 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31070","14.456010","172.30.1.205","172.30.1.104","TCP","54","44780 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31071","14.456264","172.30.1.104","172.30.1.205","TCP","66","49671 > 37418 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31072","14.456273","172.30.1.205","172.30.1.104","TCP","54","37418 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31073","14.456631","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31074","14.457725","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31075","14.457733","172.30.1.205","172.30.1.104","TCP","54","37418 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31076","14.459583","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31077","14.460906","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31078","14.460912","172.30.1.205","172.30.1.104","TCP","54","37418 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31079","14.462253","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31080","14.464819","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31081","14.464829","172.30.1.205","172.30.1.104","TCP","54","37418 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31082","14.465781","172.30.1.205","172.30.1.104","TCP","74","44784 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917692 TSecr=0 WS=128" "31083","14.466103","172.30.1.104","172.30.1.205","TCP","66","135 > 44784 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31084","14.466114","172.30.1.205","172.30.1.104","TCP","54","44784 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31085","14.466464","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31086","14.466796","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31087","14.466805","172.30.1.205","172.30.1.104","TCP","54","44784 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31088","14.469019","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31089","14.469463","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31090","14.469470","172.30.1.205","172.30.1.104","TCP","54","44784 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31091","14.471278","172.30.1.205","172.30.1.104","TCP","54","44784 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31092","14.471387","172.30.1.205","172.30.1.104","TCP","74","37422 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917697 TSecr=0 WS=128" "31093","14.471571","172.30.1.104","172.30.1.205","TCP","54","135 > 44784 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31094","14.471604","172.30.1.104","172.30.1.205","TCP","54","135 > 44784 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31095","14.471610","172.30.1.205","172.30.1.104","TCP","54","44784 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31096","14.471696","172.30.1.104","172.30.1.205","TCP","66","49671 > 37422 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31097","14.471704","172.30.1.205","172.30.1.104","TCP","54","37422 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31098","14.472048","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31099","14.472363","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31100","14.472371","172.30.1.205","172.30.1.104","TCP","54","37422 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31101","14.474290","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31102","14.474684","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31103","14.474690","172.30.1.205","172.30.1.104","TCP","54","37422 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31104","14.476023","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31105","14.478644","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31106","14.478658","172.30.1.205","172.30.1.104","TCP","54","37422 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31107","14.479689","172.30.1.205","172.30.1.104","TCP","74","44788 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917706 TSecr=0 WS=128" "31108","14.480035","172.30.1.104","172.30.1.205","TCP","66","135 > 44788 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31109","14.480048","172.30.1.205","172.30.1.104","TCP","54","44788 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31110","14.480427","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31111","14.480731","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31112","14.480745","172.30.1.205","172.30.1.104","TCP","54","44788 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31113","14.482969","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31114","14.483397","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31115","14.483404","172.30.1.205","172.30.1.104","TCP","54","44788 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31116","14.485268","172.30.1.205","172.30.1.104","TCP","54","44788 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31117","14.485384","172.30.1.205","172.30.1.104","TCP","74","37426 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917711 TSecr=0 WS=128" "31118","14.485562","172.30.1.104","172.30.1.205","TCP","54","135 > 44788 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31119","14.485599","172.30.1.104","172.30.1.205","TCP","54","135 > 44788 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31120","14.485606","172.30.1.205","172.30.1.104","TCP","54","44788 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31121","14.485645","172.30.1.104","172.30.1.205","TCP","66","49671 > 37426 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31122","14.485654","172.30.1.205","172.30.1.104","TCP","54","37426 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31123","14.486005","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31124","14.486323","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31125","14.486337","172.30.1.205","172.30.1.104","TCP","54","37426 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31126","14.488318","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31127","14.488713","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31128","14.488720","172.30.1.205","172.30.1.104","TCP","54","37426 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31129","14.490104","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31130","14.492649","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31131","14.492659","172.30.1.205","172.30.1.104","TCP","54","37426 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31132","14.493640","172.30.1.205","172.30.1.104","TCP","74","44792 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917720 TSecr=0 WS=128" "31133","14.493955","172.30.1.104","172.30.1.205","TCP","66","135 > 44792 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31134","14.493966","172.30.1.205","172.30.1.104","TCP","54","44792 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31135","14.494311","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31136","14.494637","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31137","14.494646","172.30.1.205","172.30.1.104","TCP","54","44792 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31138","14.496840","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31139","14.497294","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31140","14.497304","172.30.1.205","172.30.1.104","TCP","54","44792 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31141","14.499197","172.30.1.205","172.30.1.104","TCP","54","44792 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31142","14.499326","172.30.1.205","172.30.1.104","TCP","74","37430 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917725 TSecr=0 WS=128" "31143","14.499477","172.30.1.104","172.30.1.205","TCP","54","135 > 44792 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31144","14.499510","172.30.1.104","172.30.1.205","TCP","54","135 > 44792 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31145","14.499516","172.30.1.205","172.30.1.104","TCP","54","44792 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31146","14.499595","172.30.1.104","172.30.1.205","TCP","66","49671 > 37430 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31147","14.499608","172.30.1.205","172.30.1.104","TCP","54","37430 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31148","14.500247","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31149","14.500586","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31150","14.500595","172.30.1.205","172.30.1.104","TCP","54","37430 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31151","14.502516","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31152","14.502911","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31153","14.502918","172.30.1.205","172.30.1.104","TCP","54","37430 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31154","14.504263","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31155","14.506919","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31156","14.506931","172.30.1.205","172.30.1.104","TCP","54","37430 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31157","14.507962","172.30.1.205","172.30.1.104","TCP","74","44796 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917734 TSecr=0 WS=128" "31158","14.508250","172.30.1.104","172.30.1.205","TCP","66","135 > 44796 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31159","14.508261","172.30.1.205","172.30.1.104","TCP","54","44796 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31160","14.508616","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31161","14.508947","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31162","14.508956","172.30.1.205","172.30.1.104","TCP","54","44796 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31163","14.511206","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31164","14.511633","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31165","14.511640","172.30.1.205","172.30.1.104","TCP","54","44796 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31166","14.513479","172.30.1.205","172.30.1.104","TCP","54","44796 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31167","14.513599","172.30.1.205","172.30.1.104","TCP","74","37434 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917740 TSecr=0 WS=128" "31168","14.513760","172.30.1.104","172.30.1.205","TCP","54","135 > 44796 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31169","14.513795","172.30.1.104","172.30.1.205","TCP","54","135 > 44796 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31170","14.513802","172.30.1.205","172.30.1.104","TCP","54","44796 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31171","14.513879","172.30.1.104","172.30.1.205","TCP","66","49671 > 37434 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31172","14.513893","172.30.1.205","172.30.1.104","TCP","54","37434 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31173","14.514267","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31174","14.514578","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31175","14.514590","172.30.1.205","172.30.1.104","TCP","54","37434 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31176","14.516533","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31177","14.516937","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31178","14.516944","172.30.1.205","172.30.1.104","TCP","54","37434 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31179","14.518329","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31180","14.520880","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31181","14.520891","172.30.1.205","172.30.1.104","TCP","54","37434 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31182","14.521898","172.30.1.205","172.30.1.104","TCP","74","44800 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917748 TSecr=0 WS=128" "31183","14.522234","172.30.1.104","172.30.1.205","TCP","66","135 > 44800 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31184","14.522246","172.30.1.205","172.30.1.104","TCP","54","44800 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31185","14.522602","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31186","14.522916","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31187","14.522928","172.30.1.205","172.30.1.104","TCP","54","44800 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31188","14.525220","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31189","14.525616","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31190","14.525622","172.30.1.205","172.30.1.104","TCP","54","44800 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31191","14.527447","172.30.1.205","172.30.1.104","TCP","54","44800 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31192","14.527568","172.30.1.205","172.30.1.104","TCP","74","37438 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917753 TSecr=0 WS=128" "31193","14.527748","172.30.1.104","172.30.1.205","TCP","54","135 > 44800 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31194","14.527780","172.30.1.104","172.30.1.205","TCP","54","135 > 44800 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31195","14.527787","172.30.1.205","172.30.1.104","TCP","54","44800 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31196","14.527869","172.30.1.104","172.30.1.205","TCP","66","49671 > 37438 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31197","14.527877","172.30.1.205","172.30.1.104","TCP","54","37438 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31198","14.528221","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31199","14.528532","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31200","14.528540","172.30.1.205","172.30.1.104","TCP","54","37438 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31201","14.530438","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31202","14.530838","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31203","14.530845","172.30.1.205","172.30.1.104","TCP","54","37438 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31204","14.532195","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31205","14.534747","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31206","14.534757","172.30.1.205","172.30.1.104","TCP","54","37438 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31207","14.535727","172.30.1.205","172.30.1.104","TCP","74","44804 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917762 TSecr=0 WS=128" "31208","14.536039","172.30.1.104","172.30.1.205","TCP","66","135 > 44804 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31209","14.536050","172.30.1.205","172.30.1.104","TCP","54","44804 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31210","14.536402","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31211","14.536694","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31212","14.536703","172.30.1.205","172.30.1.104","TCP","54","44804 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31213","14.538909","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31214","14.539316","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31215","14.539323","172.30.1.205","172.30.1.104","TCP","54","44804 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31216","14.541154","172.30.1.205","172.30.1.104","TCP","54","44804 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31217","14.541264","172.30.1.205","172.30.1.104","TCP","74","37442 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917767 TSecr=0 WS=128" "31218","14.541458","172.30.1.104","172.30.1.205","TCP","54","135 > 44804 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31219","14.541469","172.30.1.104","172.30.1.205","TCP","54","135 > 44804 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31220","14.541475","172.30.1.205","172.30.1.104","TCP","54","44804 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31221","14.541548","172.30.1.104","172.30.1.205","TCP","66","49671 > 37442 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31222","14.541556","172.30.1.205","172.30.1.104","TCP","54","37442 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31223","14.541903","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31224","14.542198","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31225","14.542205","172.30.1.205","172.30.1.104","TCP","54","37442 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31226","14.544069","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31227","14.544454","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31228","14.544460","172.30.1.205","172.30.1.104","TCP","54","37442 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31229","14.545834","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31230","14.548426","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31231","14.548435","172.30.1.205","172.30.1.104","TCP","54","37442 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31232","14.549395","172.30.1.205","172.30.1.104","TCP","74","44808 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917775 TSecr=0 WS=128" "31233","14.549695","172.30.1.104","172.30.1.205","TCP","66","135 > 44808 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31234","14.549717","172.30.1.205","172.30.1.104","TCP","54","44808 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31235","14.550072","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31236","14.550393","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31237","14.550402","172.30.1.205","172.30.1.104","TCP","54","44808 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31238","14.552611","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31239","14.553005","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31240","14.553012","172.30.1.205","172.30.1.104","TCP","54","44808 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31241","14.554811","172.30.1.205","172.30.1.104","TCP","54","44808 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31242","14.554923","172.30.1.205","172.30.1.104","TCP","74","37446 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917781 TSecr=0 WS=128" "31243","14.555133","172.30.1.104","172.30.1.205","TCP","54","135 > 44808 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31244","14.555175","172.30.1.104","172.30.1.205","TCP","54","135 > 44808 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31245","14.555181","172.30.1.205","172.30.1.104","TCP","54","44808 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31246","14.555219","172.30.1.104","172.30.1.205","TCP","66","49671 > 37446 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31247","14.555228","172.30.1.205","172.30.1.104","TCP","54","37446 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31248","14.555593","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31249","14.555895","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31250","14.555904","172.30.1.205","172.30.1.104","TCP","54","37446 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31251","14.557780","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31252","14.558179","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31253","14.558186","172.30.1.205","172.30.1.104","TCP","54","37446 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31254","14.559521","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31255","14.562065","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31256","14.562074","172.30.1.205","172.30.1.104","TCP","54","37446 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31257","14.563021","172.30.1.205","172.30.1.104","TCP","74","44812 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917789 TSecr=0 WS=128" "31258","14.563325","172.30.1.104","172.30.1.205","TCP","66","135 > 44812 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31259","14.563336","172.30.1.205","172.30.1.104","TCP","54","44812 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31260","14.563681","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31261","14.563980","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31262","14.563989","172.30.1.205","172.30.1.104","TCP","54","44812 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31263","14.566197","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31264","14.566604","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31265","14.566611","172.30.1.205","172.30.1.104","TCP","54","44812 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31266","14.568414","172.30.1.205","172.30.1.104","TCP","54","44812 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31267","14.568527","172.30.1.205","172.30.1.104","TCP","74","37450 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917794 TSecr=0 WS=128" "31268","14.568708","172.30.1.104","172.30.1.205","TCP","54","135 > 44812 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31269","14.568740","172.30.1.104","172.30.1.205","TCP","54","135 > 44812 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31270","14.568746","172.30.1.205","172.30.1.104","TCP","54","44812 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31271","14.568823","172.30.1.104","172.30.1.205","TCP","66","49671 > 37450 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31272","14.568832","172.30.1.205","172.30.1.104","TCP","54","37450 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31273","14.569181","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31274","14.569475","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31275","14.569482","172.30.1.205","172.30.1.104","TCP","54","37450 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31276","14.571345","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31277","14.571729","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31278","14.571735","172.30.1.205","172.30.1.104","TCP","54","37450 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31279","14.573128","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31280","14.575779","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31281","14.575794","172.30.1.205","172.30.1.104","TCP","54","37450 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31282","14.576895","172.30.1.205","172.30.1.104","TCP","74","44816 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917803 TSecr=0 WS=128" "31283","14.577203","172.30.1.104","172.30.1.205","TCP","66","135 > 44816 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31284","14.577218","172.30.1.205","172.30.1.104","TCP","54","44816 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31285","14.577582","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31286","14.577906","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31287","14.577915","172.30.1.205","172.30.1.104","TCP","54","44816 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31288","14.580149","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31289","14.580556","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31290","14.580563","172.30.1.205","172.30.1.104","TCP","54","44816 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31291","14.582387","172.30.1.205","172.30.1.104","TCP","54","44816 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31292","14.582504","172.30.1.205","172.30.1.104","TCP","74","37454 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917808 TSecr=0 WS=128" "31293","14.582666","172.30.1.104","172.30.1.205","TCP","54","135 > 44816 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31294","14.582677","172.30.1.104","172.30.1.205","TCP","54","135 > 44816 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31295","14.582685","172.30.1.205","172.30.1.104","TCP","54","44816 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31296","14.582784","172.30.1.104","172.30.1.205","TCP","66","49671 > 37454 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31297","14.582792","172.30.1.205","172.30.1.104","TCP","54","37454 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31298","14.583145","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31299","14.583463","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31300","14.583472","172.30.1.205","172.30.1.104","TCP","54","37454 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31301","14.585378","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31302","14.585774","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31303","14.585781","172.30.1.205","172.30.1.104","TCP","54","37454 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31304","14.587122","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31305","14.589760","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31306","14.589770","172.30.1.205","172.30.1.104","TCP","54","37454 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31307","14.590713","172.30.1.205","172.30.1.104","TCP","74","44820 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917817 TSecr=0 WS=128" "31308","14.591009","172.30.1.104","172.30.1.205","TCP","66","135 > 44820 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31309","14.591020","172.30.1.205","172.30.1.104","TCP","54","44820 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31310","14.591363","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31311","14.591676","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31312","14.591685","172.30.1.205","172.30.1.104","TCP","54","44820 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31313","14.593894","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31314","14.594355","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31315","14.594362","172.30.1.205","172.30.1.104","TCP","54","44820 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31316","14.596209","172.30.1.205","172.30.1.104","TCP","54","44820 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31317","14.596320","172.30.1.205","172.30.1.104","TCP","74","37458 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917822 TSecr=0 WS=128" "31318","14.596511","172.30.1.104","172.30.1.205","TCP","54","135 > 44820 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31319","14.596573","172.30.1.104","172.30.1.205","TCP","54","135 > 44820 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31320","14.596580","172.30.1.205","172.30.1.104","TCP","54","44820 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31321","14.596662","172.30.1.104","172.30.1.205","TCP","66","49671 > 37458 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31322","14.596670","172.30.1.205","172.30.1.104","TCP","54","37458 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31323","14.597041","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31324","14.599313","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31325","14.599321","172.30.1.205","172.30.1.104","TCP","54","37458 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31326","14.601215","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31327","14.601638","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31328","14.601644","172.30.1.205","172.30.1.104","TCP","54","37458 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31329","14.602989","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31330","14.606375","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31331","14.606385","172.30.1.205","172.30.1.104","TCP","54","37458 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31332","14.607371","172.30.1.205","172.30.1.104","TCP","74","44824 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917833 TSecr=0 WS=128" "31333","14.607692","172.30.1.104","172.30.1.205","TCP","66","135 > 44824 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31334","14.607704","172.30.1.205","172.30.1.104","TCP","54","44824 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31335","14.608062","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31336","14.608386","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31337","14.608395","172.30.1.205","172.30.1.104","TCP","54","44824 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31338","14.610591","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31339","14.611006","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31340","14.611013","172.30.1.205","172.30.1.104","TCP","54","44824 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31341","14.611866","172.30.1.205","172.30.1.104","TCP","54","37418 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31342","14.611916","172.30.1.205","172.30.1.104","TCP","54","37422 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31343","14.611952","172.30.1.205","172.30.1.104","TCP","54","37426 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31344","14.611981","172.30.1.205","172.30.1.104","TCP","54","37430 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31345","14.612009","172.30.1.205","172.30.1.104","TCP","54","37434 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31346","14.612042","172.30.1.205","172.30.1.104","TCP","54","37438 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31347","14.612069","172.30.1.205","172.30.1.104","TCP","54","37442 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31348","14.612096","172.30.1.205","172.30.1.104","TCP","54","37446 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31349","14.612122","172.30.1.205","172.30.1.104","TCP","54","37450 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31350","14.612153","172.30.1.205","172.30.1.104","TCP","54","37454 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31351","14.612181","172.30.1.205","172.30.1.104","TCP","54","37458 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31352","14.612248","172.30.1.205","172.30.1.104","TCP","54","37414 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31353","14.612504","172.30.1.104","172.30.1.205","TCP","54","49671 > 37418 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31354","14.612526","172.30.1.104","172.30.1.205","TCP","54","49671 > 37422 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31355","14.612553","172.30.1.104","172.30.1.205","TCP","54","49671 > 37418 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31356","14.612561","172.30.1.205","172.30.1.104","TCP","54","37418 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31357","14.612579","172.30.1.104","172.30.1.205","TCP","54","49671 > 37426 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31358","14.612609","172.30.1.104","172.30.1.205","TCP","54","49671 > 37430 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31359","14.612634","172.30.1.104","172.30.1.205","TCP","54","49671 > 37422 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31360","14.612639","172.30.1.205","172.30.1.104","TCP","54","37422 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31361","14.612661","172.30.1.104","172.30.1.205","TCP","54","49671 > 37434 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31362","14.612687","172.30.1.104","172.30.1.205","TCP","54","49671 > 37434 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31363","14.612691","172.30.1.205","172.30.1.104","TCP","54","37434 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31364","14.612715","172.30.1.104","172.30.1.205","TCP","54","49671 > 37438 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31365","14.612742","172.30.1.104","172.30.1.205","TCP","54","49671 > 37438 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31366","14.612745","172.30.1.205","172.30.1.104","TCP","54","37438 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31367","14.612836","172.30.1.104","172.30.1.205","TCP","54","49671 > 37442 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31368","14.612861","172.30.1.104","172.30.1.205","TCP","54","49671 > 37442 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31369","14.612865","172.30.1.205","172.30.1.104","TCP","54","37442 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31370","14.612888","172.30.1.104","172.30.1.205","TCP","54","49671 > 37446 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31371","14.612914","172.30.1.104","172.30.1.205","TCP","54","49671 > 37446 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31372","14.612918","172.30.1.205","172.30.1.104","TCP","54","37446 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31373","14.612940","172.30.1.104","172.30.1.205","TCP","54","49671 > 37450 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31374","14.612966","172.30.1.104","172.30.1.205","TCP","54","49671 > 37426 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31375","14.612970","172.30.1.205","172.30.1.104","TCP","54","37426 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31376","14.612993","172.30.1.104","172.30.1.205","TCP","54","49671 > 37454 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31377","14.613022","172.30.1.104","172.30.1.205","TCP","54","49671 > 37458 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31378","14.613134","172.30.1.104","172.30.1.205","TCP","54","49671 > 37414 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31379","14.613169","172.30.1.104","172.30.1.205","TCP","54","49671 > 37458 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31380","14.613173","172.30.1.205","172.30.1.104","TCP","54","37458 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31381","14.613246","172.30.1.104","172.30.1.205","TCP","54","49671 > 37454 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31382","14.613249","172.30.1.205","172.30.1.104","TCP","54","37454 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31383","14.613250","172.30.1.104","172.30.1.205","TCP","54","49671 > 37450 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31384","14.613252","172.30.1.205","172.30.1.104","TCP","54","37450 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31385","14.613253","172.30.1.104","172.30.1.205","TCP","54","49671 > 37414 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31386","14.613255","172.30.1.205","172.30.1.104","TCP","54","37414 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31387","14.613277","172.30.1.104","172.30.1.205","TCP","54","49671 > 37430 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31388","14.613280","172.30.1.205","172.30.1.104","TCP","54","37430 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31389","14.613869","172.30.1.205","172.30.1.104","TCP","54","44824 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31390","14.613991","172.30.1.205","172.30.1.104","TCP","74","37462 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917840 TSecr=0 WS=128" "31391","14.614150","172.30.1.104","172.30.1.205","TCP","54","135 > 44824 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31392","14.614174","172.30.1.104","172.30.1.205","TCP","54","135 > 44824 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31393","14.614179","172.30.1.205","172.30.1.104","TCP","54","44824 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31394","14.614266","172.30.1.104","172.30.1.205","TCP","66","49671 > 37462 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31395","14.614274","172.30.1.205","172.30.1.104","TCP","54","37462 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31396","14.614625","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31397","14.614983","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31398","14.614991","172.30.1.205","172.30.1.104","TCP","54","37462 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31399","14.616882","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31400","14.617323","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31401","14.617329","172.30.1.205","172.30.1.104","TCP","54","37462 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31402","14.618685","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31403","14.621375","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31404","14.621385","172.30.1.205","172.30.1.104","TCP","54","37462 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31405","14.622373","172.30.1.205","172.30.1.104","TCP","74","44828 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917848 TSecr=0 WS=128" "31406","14.622715","172.30.1.104","172.30.1.205","TCP","66","135 > 44828 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31407","14.622728","172.30.1.205","172.30.1.104","TCP","54","44828 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31408","14.623085","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31409","14.623391","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31410","14.623400","172.30.1.205","172.30.1.104","TCP","54","44828 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31411","14.625604","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31412","14.626017","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31413","14.626023","172.30.1.205","172.30.1.104","TCP","54","44828 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31414","14.627834","172.30.1.205","172.30.1.104","TCP","54","44828 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31415","14.627946","172.30.1.205","172.30.1.104","TCP","74","37466 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917854 TSecr=0 WS=128" "31416","14.628117","172.30.1.104","172.30.1.205","TCP","54","135 > 44828 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31417","14.628154","172.30.1.104","172.30.1.205","TCP","54","135 > 44828 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31418","14.628160","172.30.1.205","172.30.1.104","TCP","54","44828 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31419","14.628246","172.30.1.104","172.30.1.205","TCP","66","49671 > 37466 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31420","14.628256","172.30.1.205","172.30.1.104","TCP","54","37466 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31421","14.628605","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31422","14.628929","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31423","14.628938","172.30.1.205","172.30.1.104","TCP","54","37466 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31424","14.630818","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31425","14.631210","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31426","14.631217","172.30.1.205","172.30.1.104","TCP","54","37466 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31427","14.632564","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31428","14.635198","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31429","14.635209","172.30.1.205","172.30.1.104","TCP","54","37466 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31430","14.636255","172.30.1.205","172.30.1.104","TCP","74","44832 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917862 TSecr=0 WS=128" "31431","14.636589","172.30.1.104","172.30.1.205","TCP","66","135 > 44832 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31432","14.636604","172.30.1.205","172.30.1.104","TCP","54","44832 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31433","14.637002","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31434","14.637371","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31435","14.637380","172.30.1.205","172.30.1.104","TCP","54","44832 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31436","14.639626","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31437","14.640059","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31438","14.640065","172.30.1.205","172.30.1.104","TCP","54","44832 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31439","14.641922","172.30.1.205","172.30.1.104","TCP","54","44832 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31440","14.642068","172.30.1.205","172.30.1.104","TCP","74","37470 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917868 TSecr=0 WS=128" "31441","14.642222","172.30.1.104","172.30.1.205","TCP","54","135 > 44832 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31442","14.642297","172.30.1.104","172.30.1.205","TCP","54","135 > 44832 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31443","14.642305","172.30.1.205","172.30.1.104","TCP","54","44832 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31444","14.642416","172.30.1.104","172.30.1.205","TCP","66","49671 > 37470 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31445","14.642425","172.30.1.205","172.30.1.104","TCP","54","37470 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31446","14.642775","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31447","14.643059","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31448","14.643066","172.30.1.205","172.30.1.104","TCP","54","37470 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31449","14.644998","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31450","14.645439","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31451","14.645445","172.30.1.205","172.30.1.104","TCP","54","37470 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31452","14.646820","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31453","14.649518","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31454","14.649530","172.30.1.205","172.30.1.104","TCP","54","37470 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31455","14.650586","172.30.1.205","172.30.1.104","TCP","74","44836 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917877 TSecr=0 WS=128" "31456","14.651017","172.30.1.104","172.30.1.205","TCP","66","135 > 44836 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31457","14.651029","172.30.1.205","172.30.1.104","TCP","54","44836 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31458","14.651389","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31459","14.651688","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31460","14.651697","172.30.1.205","172.30.1.104","TCP","54","44836 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31461","14.653973","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31462","14.654388","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31463","14.654394","172.30.1.205","172.30.1.104","TCP","54","44836 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31464","14.656230","172.30.1.205","172.30.1.104","TCP","54","44836 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31465","14.656355","172.30.1.205","172.30.1.104","TCP","74","37474 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917882 TSecr=0 WS=128" "31466","14.656561","172.30.1.104","172.30.1.205","TCP","54","135 > 44836 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31467","14.656574","172.30.1.104","172.30.1.205","TCP","54","135 > 44836 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31468","14.656581","172.30.1.205","172.30.1.104","TCP","54","44836 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31469","14.656664","172.30.1.104","172.30.1.205","TCP","66","49671 > 37474 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31470","14.656672","172.30.1.205","172.30.1.104","TCP","54","37474 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31471","14.657048","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31472","14.657351","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31473","14.657359","172.30.1.205","172.30.1.104","TCP","54","37474 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31474","14.659249","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31475","14.659664","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31476","14.659670","172.30.1.205","172.30.1.104","TCP","54","37474 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31477","14.661064","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31478","14.663717","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31479","14.663728","172.30.1.205","172.30.1.104","TCP","54","37474 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31480","14.664757","172.30.1.205","172.30.1.104","TCP","74","44840 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917891 TSecr=0 WS=128" "31481","14.665058","172.30.1.104","172.30.1.205","TCP","66","135 > 44840 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31482","14.665071","172.30.1.205","172.30.1.104","TCP","54","44840 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31483","14.665427","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31484","14.665758","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31485","14.665767","172.30.1.205","172.30.1.104","TCP","54","44840 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31486","14.667984","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31487","14.668443","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31488","14.668452","172.30.1.205","172.30.1.104","TCP","54","44840 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31489","14.670294","172.30.1.205","172.30.1.104","TCP","54","44840 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31490","14.670440","172.30.1.205","172.30.1.104","TCP","74","37478 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917896 TSecr=0 WS=128" "31491","14.670599","172.30.1.104","172.30.1.205","TCP","54","135 > 44840 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31492","14.670612","172.30.1.104","172.30.1.205","TCP","54","135 > 44840 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31493","14.670620","172.30.1.205","172.30.1.104","TCP","54","44840 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31494","14.670703","172.30.1.104","172.30.1.205","TCP","66","49671 > 37478 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31495","14.670721","172.30.1.205","172.30.1.104","TCP","54","37478 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31496","14.671135","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31497","14.671492","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31498","14.671503","172.30.1.205","172.30.1.104","TCP","54","37478 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31499","14.673474","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31500","14.673869","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31501","14.673874","172.30.1.205","172.30.1.104","TCP","54","37478 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31502","14.675269","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31503","14.677991","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31504","14.678005","172.30.1.205","172.30.1.104","TCP","54","37478 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31505","14.679101","172.30.1.205","172.30.1.104","TCP","74","44844 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917905 TSecr=0 WS=128" "31506","14.679471","172.30.1.104","172.30.1.205","TCP","66","135 > 44844 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31507","14.679485","172.30.1.205","172.30.1.104","TCP","54","44844 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31508","14.679854","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31509","14.680195","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31510","14.680209","172.30.1.205","172.30.1.104","TCP","54","44844 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31511","14.682559","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31512","14.682996","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31513","14.683003","172.30.1.205","172.30.1.104","TCP","54","44844 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31514","14.684865","172.30.1.205","172.30.1.104","TCP","54","44844 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31515","14.684994","172.30.1.205","172.30.1.104","TCP","74","37482 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917911 TSecr=0 WS=128" "31516","14.685189","172.30.1.104","172.30.1.205","TCP","54","135 > 44844 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31517","14.685215","172.30.1.104","172.30.1.205","TCP","54","135 > 44844 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31518","14.685223","172.30.1.205","172.30.1.104","TCP","54","44844 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31519","14.685332","172.30.1.104","172.30.1.205","TCP","66","49671 > 37482 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31520","14.685340","172.30.1.205","172.30.1.104","TCP","54","37482 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31521","14.685691","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31522","14.686005","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31523","14.686014","172.30.1.205","172.30.1.104","TCP","54","37482 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31524","14.687908","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31525","14.688280","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31526","14.688287","172.30.1.205","172.30.1.104","TCP","54","37482 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31527","14.689675","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31528","14.692410","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31529","14.692420","172.30.1.205","172.30.1.104","TCP","54","37482 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31530","14.693425","172.30.1.205","172.30.1.104","TCP","74","44848 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917919 TSecr=0 WS=128" "31531","14.693732","172.30.1.104","172.30.1.205","TCP","66","135 > 44848 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31532","14.693743","172.30.1.205","172.30.1.104","TCP","54","44848 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31533","14.694087","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31534","14.694429","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31535","14.694438","172.30.1.205","172.30.1.104","TCP","54","44848 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31536","14.696636","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31537","14.697100","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31538","14.697108","172.30.1.205","172.30.1.104","TCP","54","44848 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31539","14.698932","172.30.1.205","172.30.1.104","TCP","54","44848 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31540","14.699059","172.30.1.205","172.30.1.104","TCP","74","37486 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917925 TSecr=0 WS=128" "31541","14.699231","172.30.1.104","172.30.1.205","TCP","54","135 > 44848 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31542","14.699260","172.30.1.104","172.30.1.205","TCP","54","135 > 44848 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31543","14.699268","172.30.1.205","172.30.1.104","TCP","54","44848 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31544","14.699387","172.30.1.104","172.30.1.205","TCP","66","49671 > 37486 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31545","14.699396","172.30.1.205","172.30.1.104","TCP","54","37486 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31546","14.699740","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31547","14.700193","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31548","14.700201","172.30.1.205","172.30.1.104","TCP","54","37486 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31549","14.702115","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31550","14.704889","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31551","14.704899","172.30.1.205","172.30.1.104","TCP","54","37486 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31552","14.706367","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31553","14.709018","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31554","14.709035","172.30.1.205","172.30.1.104","TCP","54","37486 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31555","14.710072","172.30.1.205","172.30.1.104","TCP","74","44852 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917936 TSecr=0 WS=128" "31556","14.710454","172.30.1.104","172.30.1.205","TCP","66","135 > 44852 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31557","14.710468","172.30.1.205","172.30.1.104","TCP","54","44852 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31558","14.710834","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31559","14.711161","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31560","14.711170","172.30.1.205","172.30.1.104","TCP","54","44852 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31561","14.713424","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31562","14.713943","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31563","14.713951","172.30.1.205","172.30.1.104","TCP","54","44852 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31564","14.715776","172.30.1.205","172.30.1.104","TCP","54","44852 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31565","14.715893","172.30.1.205","172.30.1.104","TCP","74","37490 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917942 TSecr=0 WS=128" "31566","14.716072","172.30.1.104","172.30.1.205","TCP","54","135 > 44852 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31567","14.716104","172.30.1.104","172.30.1.205","TCP","54","135 > 44852 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31568","14.716112","172.30.1.205","172.30.1.104","TCP","54","44852 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31569","14.716191","172.30.1.104","172.30.1.205","TCP","66","49671 > 37490 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31570","14.716199","172.30.1.205","172.30.1.104","TCP","54","37490 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31571","14.716550","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31572","14.716862","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31573","14.716871","172.30.1.205","172.30.1.104","TCP","54","37490 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31574","14.718774","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31575","14.720142","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31576","14.720148","172.30.1.205","172.30.1.104","TCP","54","37490 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31577","14.721541","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31578","14.724186","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31579","14.724200","172.30.1.205","172.30.1.104","TCP","54","37490 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31580","14.725259","172.30.1.205","172.30.1.104","TCP","74","44856 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917951 TSecr=0 WS=128" "31581","14.725573","172.30.1.104","172.30.1.205","TCP","66","135 > 44856 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31582","14.725585","172.30.1.205","172.30.1.104","TCP","54","44856 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31583","14.725946","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31584","14.726314","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31585","14.726327","172.30.1.205","172.30.1.104","TCP","54","44856 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31586","14.728595","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31587","14.729014","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31588","14.729022","172.30.1.205","172.30.1.104","TCP","54","44856 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31589","14.730861","172.30.1.205","172.30.1.104","TCP","54","44856 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31590","14.730980","172.30.1.205","172.30.1.104","TCP","74","37494 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917957 TSecr=0 WS=128" "31591","14.731177","172.30.1.104","172.30.1.205","TCP","54","135 > 44856 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31592","14.731192","172.30.1.104","172.30.1.205","TCP","54","135 > 44856 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31593","14.731198","172.30.1.205","172.30.1.104","TCP","54","44856 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31594","14.731281","172.30.1.104","172.30.1.205","TCP","66","49671 > 37494 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31595","14.731290","172.30.1.205","172.30.1.104","TCP","54","37494 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31596","14.731640","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31597","14.731958","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31598","14.731967","172.30.1.205","172.30.1.104","TCP","54","37494 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31599","14.733901","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31600","14.734335","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31601","14.734343","172.30.1.205","172.30.1.104","TCP","54","37494 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31602","14.735723","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31603","14.738377","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31604","14.738387","172.30.1.205","172.30.1.104","TCP","54","37494 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31605","14.739361","172.30.1.205","172.30.1.104","TCP","74","44860 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917965 TSecr=0 WS=128" "31606","14.739686","172.30.1.104","172.30.1.205","TCP","66","135 > 44860 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31607","14.739696","172.30.1.205","172.30.1.104","TCP","54","44860 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31608","14.740058","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31609","14.740348","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31610","14.740359","172.30.1.205","172.30.1.104","TCP","54","44860 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31611","14.742589","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31612","14.743003","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31613","14.743010","172.30.1.205","172.30.1.104","TCP","54","44860 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31614","14.744851","172.30.1.205","172.30.1.104","TCP","54","44860 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31615","14.744962","172.30.1.205","172.30.1.104","TCP","74","37498 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917971 TSecr=0 WS=128" "31616","14.745161","172.30.1.104","172.30.1.205","TCP","54","135 > 44860 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31617","14.745231","172.30.1.104","172.30.1.205","TCP","54","135 > 44860 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31618","14.745236","172.30.1.205","172.30.1.104","TCP","54","44860 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31619","14.745316","172.30.1.104","172.30.1.205","TCP","66","49671 > 37498 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31620","14.745324","172.30.1.205","172.30.1.104","TCP","54","37498 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31621","14.745675","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31622","14.746020","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31623","14.746029","172.30.1.205","172.30.1.104","TCP","54","37498 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31624","14.747908","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31625","14.748301","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31626","14.748307","172.30.1.205","172.30.1.104","TCP","54","37498 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31627","14.749687","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31628","14.752423","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31629","14.752432","172.30.1.205","172.30.1.104","TCP","54","37498 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31630","14.753386","172.30.1.205","172.30.1.104","TCP","74","44864 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917979 TSecr=0 WS=128" "31631","14.753713","172.30.1.104","172.30.1.205","TCP","66","135 > 44864 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31632","14.753723","172.30.1.205","172.30.1.104","TCP","54","44864 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31633","14.754075","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31634","14.754394","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31635","14.754403","172.30.1.205","172.30.1.104","TCP","54","44864 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31636","14.756594","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31637","14.757060","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31638","14.757067","172.30.1.205","172.30.1.104","TCP","54","44864 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31639","14.758881","172.30.1.205","172.30.1.104","TCP","54","44864 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31640","14.758995","172.30.1.205","172.30.1.104","TCP","74","37502 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917985 TSecr=0 WS=128" "31641","14.759170","172.30.1.104","172.30.1.205","TCP","54","135 > 44864 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31642","14.759211","172.30.1.104","172.30.1.205","TCP","54","135 > 44864 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31643","14.759217","172.30.1.205","172.30.1.104","TCP","54","44864 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31644","14.759298","172.30.1.104","172.30.1.205","TCP","66","49671 > 37502 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31645","14.759306","172.30.1.205","172.30.1.104","TCP","54","37502 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31646","14.759655","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31647","14.759983","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31648","14.759991","172.30.1.205","172.30.1.104","TCP","54","37502 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31649","14.761901","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31650","14.762336","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31651","14.762342","172.30.1.205","172.30.1.104","TCP","54","37502 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31652","14.763710","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31653","14.766426","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31654","14.766436","172.30.1.205","172.30.1.104","TCP","54","37502 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31655","14.767391","172.30.1.205","172.30.1.104","TCP","74","44868 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917993 TSecr=0 WS=128" "31656","14.767702","172.30.1.104","172.30.1.205","TCP","66","135 > 44868 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31657","14.767713","172.30.1.205","172.30.1.104","TCP","54","44868 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31658","14.768061","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31659","14.768373","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31660","14.768382","172.30.1.205","172.30.1.104","TCP","54","44868 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31661","14.770590","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31662","14.771022","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31663","14.771028","172.30.1.205","172.30.1.104","TCP","54","44868 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31664","14.772859","172.30.1.205","172.30.1.104","TCP","54","44868 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31665","14.772968","172.30.1.205","172.30.1.104","TCP","74","37506 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499917999 TSecr=0 WS=128" "31666","14.773152","172.30.1.104","172.30.1.205","TCP","54","135 > 44868 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31667","14.773190","172.30.1.104","172.30.1.205","TCP","54","135 > 44868 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31668","14.773195","172.30.1.205","172.30.1.104","TCP","54","44868 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31669","14.773332","172.30.1.104","172.30.1.205","TCP","66","49671 > 37506 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31670","14.773340","172.30.1.205","172.30.1.104","TCP","54","37506 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31671","14.773691","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31672","14.774005","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31673","14.774014","172.30.1.205","172.30.1.104","TCP","54","37506 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31674","14.775886","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31675","14.776614","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31676","14.776626","172.30.1.205","172.30.1.104","TCP","54","37506 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31677","14.778072","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31678","14.780831","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31679","14.780841","172.30.1.205","172.30.1.104","TCP","54","37506 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31680","14.781779","172.30.1.205","172.30.1.104","TCP","74","44872 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918008 TSecr=0 WS=128" "31681","14.782139","172.30.1.104","172.30.1.205","TCP","66","135 > 44872 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31682","14.782149","172.30.1.205","172.30.1.104","TCP","54","44872 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31683","14.782504","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31684","14.782850","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31685","14.782858","172.30.1.205","172.30.1.104","TCP","54","44872 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31686","14.785066","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31687","14.785701","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31688","14.785708","172.30.1.205","172.30.1.104","TCP","54","44872 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31689","14.786549","172.30.1.205","172.30.1.104","TCP","54","37466 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31690","14.786599","172.30.1.205","172.30.1.104","TCP","54","37470 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31691","14.786638","172.30.1.205","172.30.1.104","TCP","54","37474 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31692","14.786667","172.30.1.205","172.30.1.104","TCP","54","37478 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31693","14.786700","172.30.1.205","172.30.1.104","TCP","54","37482 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31694","14.786726","172.30.1.205","172.30.1.104","TCP","54","37486 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31695","14.786753","172.30.1.205","172.30.1.104","TCP","54","37490 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31696","14.786780","172.30.1.205","172.30.1.104","TCP","54","37494 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31697","14.786802","172.30.1.205","172.30.1.104","TCP","54","37498 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31698","14.786832","172.30.1.205","172.30.1.104","TCP","54","37502 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31699","14.786859","172.30.1.205","172.30.1.104","TCP","54","37506 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31700","14.786929","172.30.1.205","172.30.1.104","TCP","54","37462 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "31701","14.787205","172.30.1.104","172.30.1.205","TCP","54","49671 > 37466 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31702","14.787226","172.30.1.104","172.30.1.205","TCP","54","49671 > 37470 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31703","14.787253","172.30.1.104","172.30.1.205","TCP","54","49671 > 37466 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31704","14.787259","172.30.1.205","172.30.1.104","TCP","54","37466 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31705","14.787278","172.30.1.104","172.30.1.205","TCP","54","49671 > 37474 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31706","14.787317","172.30.1.104","172.30.1.205","TCP","54","49671 > 37478 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31707","14.787369","172.30.1.104","172.30.1.205","TCP","54","49671 > 37478 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31708","14.787375","172.30.1.205","172.30.1.104","TCP","54","37478 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31709","14.787392","172.30.1.104","172.30.1.205","TCP","54","49671 > 37482 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31710","14.787468","172.30.1.104","172.30.1.205","TCP","54","49671 > 37486 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31711","14.787471","172.30.1.104","172.30.1.205","TCP","54","49671 > 37486 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31712","14.787474","172.30.1.205","172.30.1.104","TCP","54","37486 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31713","14.787504","172.30.1.104","172.30.1.205","TCP","54","49671 > 37490 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31714","14.787529","172.30.1.104","172.30.1.205","TCP","54","49671 > 37482 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31715","14.787534","172.30.1.205","172.30.1.104","TCP","54","37482 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31716","14.787550","172.30.1.104","172.30.1.205","TCP","54","49671 > 37494 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31717","14.787571","172.30.1.104","172.30.1.205","TCP","54","49671 > 37490 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31718","14.787575","172.30.1.205","172.30.1.104","TCP","54","37490 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31719","14.787591","172.30.1.104","172.30.1.205","TCP","54","49671 > 37498 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31720","14.787610","172.30.1.104","172.30.1.205","TCP","54","49671 > 37494 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31721","14.787614","172.30.1.205","172.30.1.104","TCP","54","37494 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31722","14.787631","172.30.1.104","172.30.1.205","TCP","54","49671 > 37498 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31723","14.787634","172.30.1.205","172.30.1.104","TCP","54","37498 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31724","14.787650","172.30.1.104","172.30.1.205","TCP","54","49671 > 37502 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31725","14.787671","172.30.1.104","172.30.1.205","TCP","54","49671 > 37506 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31726","14.787692","172.30.1.104","172.30.1.205","TCP","54","49671 > 37502 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31727","14.787696","172.30.1.205","172.30.1.104","TCP","54","37502 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31728","14.787853","172.30.1.104","172.30.1.205","TCP","54","49671 > 37506 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31729","14.787856","172.30.1.205","172.30.1.104","TCP","54","37506 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31730","14.788122","172.30.1.104","172.30.1.205","TCP","54","49671 > 37462 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31731","14.788139","172.30.1.104","172.30.1.205","TCP","54","49671 > 37462 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31732","14.788143","172.30.1.205","172.30.1.104","TCP","54","37462 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31733","14.788166","172.30.1.104","172.30.1.205","TCP","54","49671 > 37470 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31734","14.788169","172.30.1.205","172.30.1.104","TCP","54","37470 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31735","14.788191","172.30.1.104","172.30.1.205","TCP","54","49671 > 37474 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "31736","14.788194","172.30.1.205","172.30.1.104","TCP","54","37474 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "31737","14.788656","172.30.1.205","172.30.1.104","TCP","54","44872 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31738","14.788767","172.30.1.205","172.30.1.104","TCP","74","37510 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918015 TSecr=0 WS=128" "31739","14.789149","172.30.1.104","172.30.1.205","TCP","66","49671 > 37510 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31740","14.789160","172.30.1.205","172.30.1.104","TCP","54","37510 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31741","14.789175","172.30.1.104","172.30.1.205","TCP","54","135 > 44872 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31742","14.789183","172.30.1.104","172.30.1.205","TCP","54","135 > 44872 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31743","14.789187","172.30.1.205","172.30.1.104","TCP","54","44872 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31744","14.789535","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31745","14.789868","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31746","14.789877","172.30.1.205","172.30.1.104","TCP","54","37510 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31747","14.791747","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31748","14.792294","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31749","14.792300","172.30.1.205","172.30.1.104","TCP","54","37510 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31750","14.793697","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31751","14.796459","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31752","14.796468","172.30.1.205","172.30.1.104","TCP","54","37510 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31753","14.797417","172.30.1.205","172.30.1.104","TCP","74","44876 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918023 TSecr=0 WS=128" "31754","14.797768","172.30.1.104","172.30.1.205","TCP","66","135 > 44876 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31755","14.797778","172.30.1.205","172.30.1.104","TCP","54","44876 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31756","14.798128","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31757","14.798435","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31758","14.798444","172.30.1.205","172.30.1.104","TCP","54","44876 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31759","14.800618","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31760","14.801039","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31761","14.801046","172.30.1.205","172.30.1.104","TCP","54","44876 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31762","14.802878","172.30.1.205","172.30.1.104","TCP","54","44876 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31763","14.802991","172.30.1.205","172.30.1.104","TCP","74","37514 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918029 TSecr=0 WS=128" "31764","14.803142","172.30.1.104","172.30.1.205","TCP","54","135 > 44876 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31765","14.803176","172.30.1.104","172.30.1.205","TCP","54","135 > 44876 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31766","14.803181","172.30.1.205","172.30.1.104","TCP","54","44876 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31767","14.803285","172.30.1.104","172.30.1.205","TCP","66","49671 > 37514 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31768","14.803294","172.30.1.205","172.30.1.104","TCP","54","37514 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31769","14.803636","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31770","14.803930","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31771","14.803937","172.30.1.205","172.30.1.104","TCP","54","37514 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31772","14.805827","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31773","14.806204","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31774","14.806211","172.30.1.205","172.30.1.104","TCP","54","37514 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31775","14.807560","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31776","14.810338","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31777","14.810348","172.30.1.205","172.30.1.104","TCP","54","37514 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31778","14.811286","172.30.1.205","172.30.1.104","TCP","74","44880 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918037 TSecr=0 WS=128" "31779","14.811596","172.30.1.104","172.30.1.205","TCP","66","135 > 44880 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31780","14.811606","172.30.1.205","172.30.1.104","TCP","54","44880 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31781","14.811966","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31782","14.812263","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31783","14.812272","172.30.1.205","172.30.1.104","TCP","54","44880 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31784","14.814483","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31785","14.814845","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31786","14.814852","172.30.1.205","172.30.1.104","TCP","54","44880 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31787","14.816663","172.30.1.205","172.30.1.104","TCP","54","44880 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31788","14.816792","172.30.1.205","172.30.1.104","TCP","74","37518 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918043 TSecr=0 WS=128" "31789","14.817214","172.30.1.104","172.30.1.205","TCP","54","135 > 44880 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31790","14.817252","172.30.1.104","172.30.1.205","TCP","54","135 > 44880 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31791","14.817258","172.30.1.205","172.30.1.104","TCP","54","44880 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31792","14.817276","172.30.1.104","172.30.1.205","TCP","66","49671 > 37518 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31793","14.817284","172.30.1.205","172.30.1.104","TCP","54","37518 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31794","14.817626","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31795","14.817899","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31796","14.817908","172.30.1.205","172.30.1.104","TCP","54","37518 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31797","14.819810","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31798","14.820152","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31799","14.820159","172.30.1.205","172.30.1.104","TCP","54","37518 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31800","14.821533","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31801","14.824133","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31802","14.824142","172.30.1.205","172.30.1.104","TCP","54","37518 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31803","14.825097","172.30.1.205","172.30.1.104","TCP","74","44884 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918051 TSecr=0 WS=128" "31804","14.825466","172.30.1.104","172.30.1.205","TCP","66","135 > 44884 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31805","14.825477","172.30.1.205","172.30.1.104","TCP","54","44884 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31806","14.825834","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31807","14.826113","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31808","14.826122","172.30.1.205","172.30.1.104","TCP","54","44884 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31809","14.828324","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31810","14.828709","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31811","14.828716","172.30.1.205","172.30.1.104","TCP","54","44884 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31812","14.830567","172.30.1.205","172.30.1.104","TCP","54","44884 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31813","14.830697","172.30.1.205","172.30.1.104","TCP","74","37522 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918057 TSecr=0 WS=128" "31814","14.830843","172.30.1.104","172.30.1.205","TCP","54","135 > 44884 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31815","14.830852","172.30.1.104","172.30.1.205","TCP","54","135 > 44884 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31816","14.830857","172.30.1.205","172.30.1.104","TCP","54","44884 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31817","14.830960","172.30.1.104","172.30.1.205","TCP","66","49671 > 37522 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31818","14.830968","172.30.1.205","172.30.1.104","TCP","54","37522 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31819","14.831342","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31820","14.831629","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31821","14.831639","172.30.1.205","172.30.1.104","TCP","54","37522 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31822","14.833697","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31823","14.834219","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31824","14.834226","172.30.1.205","172.30.1.104","TCP","54","37522 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31825","14.835643","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31826","14.838278","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31827","14.838288","172.30.1.205","172.30.1.104","TCP","54","37522 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31828","14.839228","172.30.1.205","172.30.1.104","TCP","74","44888 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918065 TSecr=0 WS=128" "31829","14.839543","172.30.1.104","172.30.1.205","TCP","66","135 > 44888 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31830","14.839553","172.30.1.205","172.30.1.104","TCP","54","44888 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31831","14.839922","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31832","14.840239","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31833","14.840250","172.30.1.205","172.30.1.104","TCP","54","44888 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31834","14.842512","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31835","14.842900","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31836","14.842907","172.30.1.205","172.30.1.104","TCP","54","44888 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31837","14.844738","172.30.1.205","172.30.1.104","TCP","54","44888 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31838","14.844875","172.30.1.205","172.30.1.104","TCP","74","37526 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918071 TSecr=0 WS=128" "31839","14.845146","172.30.1.104","172.30.1.205","TCP","54","135 > 44888 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31840","14.845161","172.30.1.104","172.30.1.205","TCP","54","135 > 44888 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31841","14.845167","172.30.1.205","172.30.1.104","TCP","54","44888 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31842","14.845284","172.30.1.104","172.30.1.205","TCP","66","49671 > 37526 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31843","14.845293","172.30.1.205","172.30.1.104","TCP","54","37526 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31844","14.845641","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31845","14.846065","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31846","14.846074","172.30.1.205","172.30.1.104","TCP","54","37526 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31847","14.847930","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31848","14.848339","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31849","14.848345","172.30.1.205","172.30.1.104","TCP","54","37526 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31850","14.849742","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31851","14.853663","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31852","14.853677","172.30.1.205","172.30.1.104","TCP","54","37526 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31853","14.854671","172.30.1.205","172.30.1.104","TCP","74","44892 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918081 TSecr=0 WS=128" "31854","14.854994","172.30.1.104","172.30.1.205","TCP","66","135 > 44892 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31855","14.855007","172.30.1.205","172.30.1.104","TCP","54","44892 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31856","14.855365","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31857","14.855690","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31858","14.855700","172.30.1.205","172.30.1.104","TCP","54","44892 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31859","14.857945","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31860","14.858308","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31861","14.858315","172.30.1.205","172.30.1.104","TCP","54","44892 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31862","14.860145","172.30.1.205","172.30.1.104","TCP","54","44892 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31863","14.860258","172.30.1.205","172.30.1.104","TCP","74","37530 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918086 TSecr=0 WS=128" "31864","14.860397","172.30.1.104","172.30.1.205","TCP","54","135 > 44892 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31865","14.860439","172.30.1.104","172.30.1.205","TCP","54","135 > 44892 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31866","14.860445","172.30.1.205","172.30.1.104","TCP","54","44892 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31867","14.860531","172.30.1.104","172.30.1.205","TCP","66","49671 > 37530 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31868","14.860541","172.30.1.205","172.30.1.104","TCP","54","37530 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31869","14.860927","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31870","14.861221","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31871","14.861230","172.30.1.205","172.30.1.104","TCP","54","37530 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31872","14.863125","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31873","14.863482","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31874","14.863488","172.30.1.205","172.30.1.104","TCP","54","37530 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31875","14.864868","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31876","14.867491","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31877","14.867500","172.30.1.205","172.30.1.104","TCP","54","37530 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31878","14.868437","172.30.1.205","172.30.1.104","TCP","74","44896 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918094 TSecr=0 WS=128" "31879","14.868718","172.30.1.104","172.30.1.205","TCP","66","135 > 44896 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31880","14.868729","172.30.1.205","172.30.1.104","TCP","54","44896 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31881","14.869100","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31882","14.869374","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31883","14.869384","172.30.1.205","172.30.1.104","TCP","54","44896 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31884","14.871601","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31885","14.871981","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31886","14.871991","172.30.1.205","172.30.1.104","TCP","54","44896 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31887","14.873933","172.30.1.205","172.30.1.104","TCP","54","44896 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31888","14.874061","172.30.1.205","172.30.1.104","TCP","74","37534 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918100 TSecr=0 WS=128" "31889","14.874229","172.30.1.104","172.30.1.205","TCP","54","135 > 44896 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31890","14.874239","172.30.1.104","172.30.1.205","TCP","54","135 > 44896 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31891","14.874245","172.30.1.205","172.30.1.104","TCP","54","44896 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31892","14.874423","172.30.1.104","172.30.1.205","TCP","66","49671 > 37534 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31893","14.874432","172.30.1.205","172.30.1.104","TCP","54","37534 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31894","14.874784","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31895","14.875069","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31896","14.875081","172.30.1.205","172.30.1.104","TCP","54","37534 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31897","14.877027","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31898","14.877411","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31899","14.877418","172.30.1.205","172.30.1.104","TCP","54","37534 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31900","14.878787","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31901","14.881418","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31902","14.881429","172.30.1.205","172.30.1.104","TCP","54","37534 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31903","14.882400","172.30.1.205","172.30.1.104","TCP","74","44900 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918108 TSecr=0 WS=128" "31904","14.882722","172.30.1.104","172.30.1.205","TCP","66","135 > 44900 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31905","14.882733","172.30.1.205","172.30.1.104","TCP","54","44900 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31906","14.883093","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31907","14.883389","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31908","14.883400","172.30.1.205","172.30.1.104","TCP","54","44900 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31909","14.885652","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31910","14.886113","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31911","14.886120","172.30.1.205","172.30.1.104","TCP","54","44900 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31912","14.887946","172.30.1.205","172.30.1.104","TCP","54","44900 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31913","14.888072","172.30.1.205","172.30.1.104","TCP","74","37538 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918114 TSecr=0 WS=128" "31914","14.888218","172.30.1.104","172.30.1.205","TCP","54","135 > 44900 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31915","14.888230","172.30.1.104","172.30.1.205","TCP","54","135 > 44900 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31916","14.888236","172.30.1.205","172.30.1.104","TCP","54","44900 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31917","14.888336","172.30.1.104","172.30.1.205","TCP","66","49671 > 37538 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31918","14.888346","172.30.1.205","172.30.1.104","TCP","54","37538 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31919","14.888696","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31920","14.888971","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31921","14.888987","172.30.1.205","172.30.1.104","TCP","54","37538 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31922","14.890894","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31923","14.891302","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31924","14.891308","172.30.1.205","172.30.1.104","TCP","54","37538 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31925","14.892673","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31926","14.895257","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31927","14.895269","172.30.1.205","172.30.1.104","TCP","54","37538 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31928","14.896256","172.30.1.205","172.30.1.104","TCP","74","44904 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918122 TSecr=0 WS=128" "31929","14.896533","172.30.1.104","172.30.1.205","TCP","66","135 > 44904 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31930","14.896544","172.30.1.205","172.30.1.104","TCP","54","44904 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31931","14.896929","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31932","14.897194","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31933","14.897203","172.30.1.205","172.30.1.104","TCP","54","44904 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31934","14.899505","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31935","14.899868","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31936","14.899875","172.30.1.205","172.30.1.104","TCP","54","44904 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31937","14.901713","172.30.1.205","172.30.1.104","TCP","54","44904 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31938","14.901827","172.30.1.205","172.30.1.104","TCP","74","37542 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918128 TSecr=0 WS=128" "31939","14.901978","172.30.1.104","172.30.1.205","TCP","54","135 > 44904 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31940","14.902036","172.30.1.104","172.30.1.205","TCP","54","135 > 44904 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31941","14.902042","172.30.1.205","172.30.1.104","TCP","54","44904 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31942","14.902083","172.30.1.104","172.30.1.205","TCP","66","49671 > 37542 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31943","14.902091","172.30.1.205","172.30.1.104","TCP","54","37542 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31944","14.902454","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31945","14.902739","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31946","14.902747","172.30.1.205","172.30.1.104","TCP","54","37542 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31947","14.904620","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31948","14.904974","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31949","14.904981","172.30.1.205","172.30.1.104","TCP","54","37542 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31950","14.906338","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31951","14.908935","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31952","14.908948","172.30.1.205","172.30.1.104","TCP","54","37542 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31953","14.909911","172.30.1.205","172.30.1.104","TCP","74","44908 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918136 TSecr=0 WS=128" "31954","14.910295","172.30.1.104","172.30.1.205","TCP","66","135 > 44908 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31955","14.910306","172.30.1.205","172.30.1.104","TCP","54","44908 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31956","14.910657","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31957","14.910942","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31958","14.910952","172.30.1.205","172.30.1.104","TCP","54","44908 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31959","14.913189","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31960","14.913563","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31961","14.913570","172.30.1.205","172.30.1.104","TCP","54","44908 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31962","14.915393","172.30.1.205","172.30.1.104","TCP","54","44908 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31963","14.915508","172.30.1.205","172.30.1.104","TCP","74","37546 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918141 TSecr=0 WS=128" "31964","14.915648","172.30.1.104","172.30.1.205","TCP","54","135 > 44908 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31965","14.915659","172.30.1.104","172.30.1.205","TCP","54","135 > 44908 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31966","14.915665","172.30.1.205","172.30.1.104","TCP","54","44908 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31967","14.915822","172.30.1.104","172.30.1.205","TCP","66","49671 > 37546 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31968","14.915830","172.30.1.205","172.30.1.104","TCP","54","37546 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31969","14.916182","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31970","14.917068","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31971","14.917076","172.30.1.205","172.30.1.104","TCP","54","37546 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31972","14.918963","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31973","14.919336","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31974","14.919342","172.30.1.205","172.30.1.104","TCP","54","37546 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "31975","14.920697","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "31976","14.923316","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "31977","14.923326","172.30.1.205","172.30.1.104","TCP","54","37546 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "31978","14.924319","172.30.1.205","172.30.1.104","TCP","74","44912 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918150 TSecr=0 WS=128" "31979","14.924659","172.30.1.104","172.30.1.205","TCP","66","135 > 44912 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31980","14.924670","172.30.1.205","172.30.1.104","TCP","54","44912 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31981","14.925054","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "31982","14.925341","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31983","14.925350","172.30.1.205","172.30.1.104","TCP","54","44912 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31984","14.927574","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "31985","14.927968","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "31986","14.927974","172.30.1.205","172.30.1.104","TCP","54","44912 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "31987","14.929828","172.30.1.205","172.30.1.104","TCP","54","44912 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "31988","14.929962","172.30.1.205","172.30.1.104","TCP","74","37550 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918156 TSecr=0 WS=128" "31989","14.930072","172.30.1.104","172.30.1.205","TCP","54","135 > 44912 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31990","14.930088","172.30.1.104","172.30.1.205","TCP","54","135 > 44912 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "31991","14.930094","172.30.1.205","172.30.1.104","TCP","54","44912 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "31992","14.930240","172.30.1.104","172.30.1.205","TCP","66","49671 > 37550 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "31993","14.930248","172.30.1.205","172.30.1.104","TCP","54","37550 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "31994","14.930603","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "31995","14.930980","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "31996","14.930995","172.30.1.205","172.30.1.104","TCP","54","37550 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "31997","14.932904","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "31998","14.933247","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "31999","14.933253","172.30.1.205","172.30.1.104","TCP","54","37550 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32000","14.934618","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32001","14.939809","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32002","14.939821","172.30.1.205","172.30.1.104","TCP","54","37550 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32003","14.940868","172.30.1.205","172.30.1.104","TCP","74","44916 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918167 TSecr=0 WS=128" "32004","14.941211","172.30.1.104","172.30.1.205","TCP","66","135 > 44916 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32005","14.941223","172.30.1.205","172.30.1.104","TCP","54","44916 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32006","14.941582","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32007","14.941901","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32008","14.941910","172.30.1.205","172.30.1.104","TCP","54","44916 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32009","14.944121","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32010","14.944526","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32011","14.944533","172.30.1.205","172.30.1.104","TCP","54","44916 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32012","14.946371","172.30.1.205","172.30.1.104","TCP","54","44916 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32013","14.946485","172.30.1.205","172.30.1.104","TCP","74","37554 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918172 TSecr=0 WS=128" "32014","14.946629","172.30.1.104","172.30.1.205","TCP","54","135 > 44916 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32015","14.946645","172.30.1.104","172.30.1.205","TCP","54","135 > 44916 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32016","14.946652","172.30.1.205","172.30.1.104","TCP","54","44916 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32017","14.946777","172.30.1.104","172.30.1.205","TCP","66","49671 > 37554 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32018","14.946786","172.30.1.205","172.30.1.104","TCP","54","37554 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32019","14.947140","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32020","14.947473","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32021","14.947480","172.30.1.205","172.30.1.104","TCP","54","37554 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32022","14.949378","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32023","14.949750","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32024","14.949756","172.30.1.205","172.30.1.104","TCP","54","37554 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32025","14.951110","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32026","14.954736","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32027","14.954747","172.30.1.205","172.30.1.104","TCP","54","37554 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32028","14.955702","172.30.1.205","172.30.1.104","TCP","74","44920 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918182 TSecr=0 WS=128" "32029","14.956075","172.30.1.104","172.30.1.205","TCP","66","135 > 44920 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32030","14.956088","172.30.1.205","172.30.1.104","TCP","54","44920 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32031","14.956449","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32032","14.956770","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32033","14.956788","172.30.1.205","172.30.1.104","TCP","54","44920 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32034","14.958982","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32035","14.959384","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32036","14.959390","172.30.1.205","172.30.1.104","TCP","54","44920 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32037","14.960243","172.30.1.205","172.30.1.104","TCP","54","37514 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32038","14.960297","172.30.1.205","172.30.1.104","TCP","54","37518 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32039","14.960335","172.30.1.205","172.30.1.104","TCP","54","37522 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32040","14.960368","172.30.1.205","172.30.1.104","TCP","54","37526 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32041","14.960400","172.30.1.205","172.30.1.104","TCP","54","37530 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32042","14.960432","172.30.1.205","172.30.1.104","TCP","54","37534 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32043","14.960459","172.30.1.205","172.30.1.104","TCP","54","37538 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32044","14.960484","172.30.1.205","172.30.1.104","TCP","54","37542 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32045","14.960501","172.30.1.104","172.30.1.205","TCP","54","49671 > 37514 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32046","14.960537","172.30.1.205","172.30.1.104","TCP","54","37546 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32047","14.960570","172.30.1.205","172.30.1.104","TCP","54","37550 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32048","14.960596","172.30.1.205","172.30.1.104","TCP","54","37554 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32049","14.960614","172.30.1.104","172.30.1.205","TCP","54","49671 > 37518 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32050","14.960632","172.30.1.104","172.30.1.205","TCP","54","49671 > 37514 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32051","14.960639","172.30.1.205","172.30.1.104","TCP","54","37514 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32052","14.960653","172.30.1.104","172.30.1.205","TCP","54","49671 > 37518 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32053","14.960656","172.30.1.205","172.30.1.104","TCP","54","37518 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32054","14.960674","172.30.1.104","172.30.1.205","TCP","54","49671 > 37522 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32055","14.960696","172.30.1.104","172.30.1.205","TCP","54","49671 > 37526 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32056","14.960732","172.30.1.205","172.30.1.104","TCP","54","37510 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32057","14.960808","172.30.1.104","172.30.1.205","TCP","54","49671 > 37530 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32058","14.960828","172.30.1.104","172.30.1.205","TCP","54","49671 > 37534 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32059","14.960849","172.30.1.104","172.30.1.205","TCP","54","49671 > 37530 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32060","14.960855","172.30.1.205","172.30.1.104","TCP","54","37530 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32061","14.960870","172.30.1.104","172.30.1.205","TCP","54","49671 > 37522 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32062","14.960873","172.30.1.205","172.30.1.104","TCP","54","37522 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32063","14.960890","172.30.1.104","172.30.1.205","TCP","54","49671 > 37526 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32064","14.960893","172.30.1.205","172.30.1.104","TCP","54","37526 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32065","14.960912","172.30.1.104","172.30.1.205","TCP","54","49671 > 37534 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32066","14.960915","172.30.1.205","172.30.1.104","TCP","54","37534 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32067","14.960933","172.30.1.104","172.30.1.205","TCP","54","49671 > 37538 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32068","14.961089","172.30.1.104","172.30.1.205","TCP","54","49671 > 37542 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32069","14.961108","172.30.1.104","172.30.1.205","TCP","54","49671 > 37546 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32070","14.961143","172.30.1.104","172.30.1.205","TCP","54","49671 > 37538 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32071","14.961147","172.30.1.205","172.30.1.104","TCP","54","37538 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32072","14.961161","172.30.1.104","172.30.1.205","TCP","54","49671 > 37542 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32073","14.961164","172.30.1.205","172.30.1.104","TCP","54","37542 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32074","14.961191","172.30.1.104","172.30.1.205","TCP","54","49671 > 37546 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32075","14.961194","172.30.1.205","172.30.1.104","TCP","54","37546 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32076","14.961218","172.30.1.104","172.30.1.205","TCP","54","49671 > 37550 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32077","14.961244","172.30.1.104","172.30.1.205","TCP","54","49671 > 37554 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32078","14.961339","172.30.1.104","172.30.1.205","TCP","54","49671 > 37550 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32079","14.961344","172.30.1.205","172.30.1.104","TCP","54","37550 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32080","14.961366","172.30.1.104","172.30.1.205","TCP","54","49671 > 37554 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32081","14.961369","172.30.1.205","172.30.1.104","TCP","54","37554 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32082","14.961393","172.30.1.104","172.30.1.205","TCP","54","49671 > 37510 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32083","14.961430","172.30.1.104","172.30.1.205","TCP","54","49671 > 37510 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32084","14.961433","172.30.1.205","172.30.1.104","TCP","54","37510 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32085","14.962261","172.30.1.205","172.30.1.104","TCP","54","44920 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32086","14.962373","172.30.1.205","172.30.1.104","TCP","74","37558 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918188 TSecr=0 WS=128" "32087","14.962539","172.30.1.104","172.30.1.205","TCP","54","135 > 44920 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32088","14.962594","172.30.1.104","172.30.1.205","TCP","54","135 > 44920 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32089","14.962599","172.30.1.205","172.30.1.104","TCP","54","44920 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32090","14.962641","172.30.1.104","172.30.1.205","TCP","66","49671 > 37558 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32091","14.962650","172.30.1.205","172.30.1.104","TCP","54","37558 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32092","14.963011","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32093","14.963316","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32094","14.963325","172.30.1.205","172.30.1.104","TCP","54","37558 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32095","14.965228","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32096","14.965656","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32097","14.965699","172.30.1.205","172.30.1.104","TCP","54","37558 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32098","14.967046","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32099","14.969814","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32100","14.969824","172.30.1.205","172.30.1.104","TCP","54","37558 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32101","14.970765","172.30.1.205","172.30.1.104","TCP","74","44924 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918197 TSecr=0 WS=128" "32102","14.971108","172.30.1.104","172.30.1.205","TCP","66","135 > 44924 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32103","14.971130","172.30.1.205","172.30.1.104","TCP","54","44924 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32104","14.971660","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32105","14.972035","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32106","14.972043","172.30.1.205","172.30.1.104","TCP","54","44924 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32107","14.974264","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32108","14.974698","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32109","14.974711","172.30.1.205","172.30.1.104","TCP","54","44924 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32110","14.976523","172.30.1.205","172.30.1.104","TCP","54","44924 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32111","14.976636","172.30.1.205","172.30.1.104","TCP","74","37562 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918203 TSecr=0 WS=128" "32112","14.976816","172.30.1.104","172.30.1.205","TCP","54","135 > 44924 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32113","14.976840","172.30.1.104","172.30.1.205","TCP","54","135 > 44924 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32114","14.976846","172.30.1.205","172.30.1.104","TCP","54","44924 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32115","14.976939","172.30.1.104","172.30.1.205","TCP","66","49671 > 37562 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32116","14.976947","172.30.1.205","172.30.1.104","TCP","54","37562 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32117","14.977298","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32118","14.977591","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32119","14.977600","172.30.1.205","172.30.1.104","TCP","54","37562 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32120","14.979478","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32121","14.979843","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32122","14.979849","172.30.1.205","172.30.1.104","TCP","54","37562 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32123","14.981228","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32124","14.983912","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32125","14.983921","172.30.1.205","172.30.1.104","TCP","54","37562 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32126","14.984877","172.30.1.205","172.30.1.104","TCP","74","44928 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918211 TSecr=0 WS=128" "32127","14.985197","172.30.1.104","172.30.1.205","TCP","66","135 > 44928 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32128","14.985207","172.30.1.205","172.30.1.104","TCP","54","44928 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32129","14.985563","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32130","14.985847","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32131","14.985862","172.30.1.205","172.30.1.104","TCP","54","44928 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32132","14.988173","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32133","14.988597","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32134","14.988615","172.30.1.205","172.30.1.104","TCP","54","44928 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32135","14.990686","172.30.1.205","172.30.1.104","TCP","54","44928 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32136","14.990812","172.30.1.205","172.30.1.104","TCP","74","37566 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918217 TSecr=0 WS=128" "32137","14.990980","172.30.1.104","172.30.1.205","TCP","54","135 > 44928 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32138","14.991033","172.30.1.104","172.30.1.205","TCP","54","135 > 44928 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32139","14.991058","172.30.1.205","172.30.1.104","TCP","54","44928 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32140","14.991065","172.30.1.104","172.30.1.205","TCP","66","49671 > 37566 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32141","14.991077","172.30.1.205","172.30.1.104","TCP","54","37566 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32142","14.991431","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32143","14.991747","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32144","14.991756","172.30.1.205","172.30.1.104","TCP","54","37566 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32145","14.993682","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32146","14.994083","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32147","14.994096","172.30.1.205","172.30.1.104","TCP","54","37566 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32148","14.995711","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32149","14.998479","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32150","14.998491","172.30.1.205","172.30.1.104","TCP","54","37566 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32151","14.999546","172.30.1.205","172.30.1.104","TCP","74","44932 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918225 TSecr=0 WS=128" "32152","14.999870","172.30.1.104","172.30.1.205","TCP","66","135 > 44932 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32153","14.999882","172.30.1.205","172.30.1.104","TCP","54","44932 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32154","15.000241","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32155","15.003460","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32156","15.003469","172.30.1.205","172.30.1.104","TCP","54","44932 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32157","15.005745","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32158","15.006152","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32159","15.006159","172.30.1.205","172.30.1.104","TCP","54","44932 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32160","15.007982","172.30.1.205","172.30.1.104","TCP","54","44932 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32161","15.008091","172.30.1.205","172.30.1.104","TCP","74","37570 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918234 TSecr=0 WS=128" "32162","15.008252","172.30.1.104","172.30.1.205","TCP","54","135 > 44932 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32163","15.008362","172.30.1.104","172.30.1.205","TCP","66","49671 > 37570 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32164","15.008371","172.30.1.205","172.30.1.104","TCP","54","37570 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32165","15.008472","172.30.1.104","172.30.1.205","TCP","54","135 > 44932 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32166","15.008479","172.30.1.205","172.30.1.104","TCP","54","44932 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32167","15.008752","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32168","15.009056","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32169","15.009064","172.30.1.205","172.30.1.104","TCP","54","37570 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32170","15.010953","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32171","15.011315","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32172","15.011321","172.30.1.205","172.30.1.104","TCP","54","37570 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32173","15.012688","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32174","15.015402","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32175","15.015418","172.30.1.205","172.30.1.104","TCP","54","37570 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32176","15.016542","172.30.1.205","172.30.1.104","TCP","74","44936 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918242 TSecr=0 WS=128" "32177","15.016893","172.30.1.104","172.30.1.205","TCP","66","135 > 44936 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32178","15.016908","172.30.1.205","172.30.1.104","TCP","54","44936 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32179","15.017312","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32180","15.017602","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32181","15.017611","172.30.1.205","172.30.1.104","TCP","54","44936 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32182","15.019872","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32183","15.020298","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32184","15.020305","172.30.1.205","172.30.1.104","TCP","54","44936 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32185","15.022160","172.30.1.205","172.30.1.104","TCP","54","44936 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32186","15.022285","172.30.1.205","172.30.1.104","TCP","74","37574 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918248 TSecr=0 WS=128" "32187","15.022423","172.30.1.104","172.30.1.205","TCP","54","135 > 44936 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32188","15.022451","172.30.1.104","172.30.1.205","TCP","54","135 > 44936 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32189","15.022458","172.30.1.205","172.30.1.104","TCP","54","44936 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32190","15.022548","172.30.1.104","172.30.1.205","TCP","66","49671 > 37574 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32191","15.022557","172.30.1.205","172.30.1.104","TCP","54","37574 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32192","15.022907","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32193","15.023205","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32194","15.023214","172.30.1.205","172.30.1.104","TCP","54","37574 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32195","15.025151","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32196","15.025524","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32197","15.025530","172.30.1.205","172.30.1.104","TCP","54","37574 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32198","15.026906","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32199","15.029665","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32200","15.029675","172.30.1.205","172.30.1.104","TCP","54","37574 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32201","15.030662","172.30.1.205","172.30.1.104","TCP","74","44940 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918257 TSecr=0 WS=128" "32202","15.030962","172.30.1.104","172.30.1.205","TCP","66","135 > 44940 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32203","15.030974","172.30.1.205","172.30.1.104","TCP","54","44940 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32204","15.031330","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32205","15.031633","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32206","15.031642","172.30.1.205","172.30.1.104","TCP","54","44940 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32207","15.033882","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32208","15.034291","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32209","15.034298","172.30.1.205","172.30.1.104","TCP","54","44940 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32210","15.036126","172.30.1.205","172.30.1.104","TCP","54","44940 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32211","15.036244","172.30.1.205","172.30.1.104","TCP","74","37578 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918262 TSecr=0 WS=128" "32212","15.036413","172.30.1.104","172.30.1.205","TCP","54","135 > 44940 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32213","15.036450","172.30.1.104","172.30.1.205","TCP","54","135 > 44940 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32214","15.036456","172.30.1.205","172.30.1.104","TCP","54","44940 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32215","15.036539","172.30.1.104","172.30.1.205","TCP","66","49671 > 37578 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32216","15.036548","172.30.1.205","172.30.1.104","TCP","54","37578 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32217","15.036924","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32218","15.037211","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32219","15.037221","172.30.1.205","172.30.1.104","TCP","54","37578 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32220","15.039133","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32221","15.040909","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32222","15.040916","172.30.1.205","172.30.1.104","TCP","54","37578 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32223","15.042288","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32224","15.045149","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32225","15.045159","172.30.1.205","172.30.1.104","TCP","54","37578 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32226","15.046155","172.30.1.205","172.30.1.104","TCP","74","44944 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918272 TSecr=0 WS=128" "32227","15.046497","172.30.1.104","172.30.1.205","TCP","66","135 > 44944 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32228","15.046511","172.30.1.205","172.30.1.104","TCP","54","44944 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32229","15.046880","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32230","15.047185","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32231","15.047195","172.30.1.205","172.30.1.104","TCP","54","44944 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32232","15.049428","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32233","15.049844","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32234","15.049851","172.30.1.205","172.30.1.104","TCP","54","44944 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32235","15.051667","172.30.1.205","172.30.1.104","TCP","54","44944 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32236","15.051784","172.30.1.205","172.30.1.104","TCP","74","37582 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918278 TSecr=0 WS=128" "32237","15.051937","172.30.1.104","172.30.1.205","TCP","54","135 > 44944 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32238","15.051961","172.30.1.104","172.30.1.205","TCP","54","135 > 44944 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32239","15.051967","172.30.1.205","172.30.1.104","TCP","54","44944 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32240","15.052051","172.30.1.104","172.30.1.205","TCP","66","49671 > 37582 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32241","15.052060","172.30.1.205","172.30.1.104","TCP","54","37582 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32242","15.052414","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32243","15.053641","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32244","15.053651","172.30.1.205","172.30.1.104","TCP","54","37582 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32245","15.055530","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32246","15.055892","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32247","15.055898","172.30.1.205","172.30.1.104","TCP","54","37582 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32248","15.057320","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32249","15.060125","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32250","15.060134","172.30.1.205","172.30.1.104","TCP","54","37582 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32251","15.061099","172.30.1.205","172.30.1.104","TCP","74","44948 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918287 TSecr=0 WS=128" "32252","15.061396","172.30.1.104","172.30.1.205","TCP","66","135 > 44948 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32253","15.061408","172.30.1.205","172.30.1.104","TCP","54","44948 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32254","15.061767","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32255","15.062061","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32256","15.062070","172.30.1.205","172.30.1.104","TCP","54","44948 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32257","15.064307","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32258","15.064730","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32259","15.064737","172.30.1.205","172.30.1.104","TCP","54","44948 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32260","15.066556","172.30.1.205","172.30.1.104","TCP","54","44948 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32261","15.066680","172.30.1.205","172.30.1.104","TCP","74","37586 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918293 TSecr=0 WS=128" "32262","15.066853","172.30.1.104","172.30.1.205","TCP","54","135 > 44948 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32263","15.066877","172.30.1.104","172.30.1.205","TCP","54","135 > 44948 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32264","15.066882","172.30.1.205","172.30.1.104","TCP","54","44948 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32265","15.066971","172.30.1.104","172.30.1.205","TCP","66","49671 > 37586 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32266","15.066987","172.30.1.205","172.30.1.104","TCP","54","37586 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32267","15.067603","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32268","15.068766","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32269","15.068784","172.30.1.205","172.30.1.104","TCP","54","37586 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32270","15.070686","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32271","15.071035","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32272","15.071042","172.30.1.205","172.30.1.104","TCP","54","37586 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32273","15.072394","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32274","15.075119","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32275","15.075129","172.30.1.205","172.30.1.104","TCP","54","37586 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32276","15.076075","172.30.1.205","172.30.1.104","TCP","74","44952 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918302 TSecr=0 WS=128" "32277","15.076408","172.30.1.104","172.30.1.205","TCP","66","135 > 44952 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32278","15.076419","172.30.1.205","172.30.1.104","TCP","54","44952 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32279","15.076767","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32280","15.077063","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32281","15.077072","172.30.1.205","172.30.1.104","TCP","54","44952 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32282","15.079254","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32283","15.079633","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32284","15.079640","172.30.1.205","172.30.1.104","TCP","54","44952 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32285","15.081472","172.30.1.205","172.30.1.104","TCP","54","44952 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32286","15.081585","172.30.1.205","172.30.1.104","TCP","74","37590 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918308 TSecr=0 WS=128" "32287","15.081749","172.30.1.104","172.30.1.205","TCP","54","135 > 44952 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32288","15.081794","172.30.1.104","172.30.1.205","TCP","54","135 > 44952 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32289","15.081800","172.30.1.205","172.30.1.104","TCP","54","44952 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32290","15.081894","172.30.1.104","172.30.1.205","TCP","66","49671 > 37590 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32291","15.081902","172.30.1.205","172.30.1.104","TCP","54","37590 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32292","15.082246","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32293","15.082519","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32294","15.082527","172.30.1.205","172.30.1.104","TCP","54","37590 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32295","15.084404","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32296","15.084803","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32297","15.084810","172.30.1.205","172.30.1.104","TCP","54","37590 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32298","15.086167","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32299","15.088750","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32300","15.088759","172.30.1.205","172.30.1.104","TCP","54","37590 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32301","15.089721","172.30.1.205","172.30.1.104","TCP","74","44956 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918316 TSecr=0 WS=128" "32302","15.090080","172.30.1.104","172.30.1.205","TCP","66","135 > 44956 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32303","15.090091","172.30.1.205","172.30.1.104","TCP","54","44956 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32304","15.090439","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32305","15.090739","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32306","15.090748","172.30.1.205","172.30.1.104","TCP","54","44956 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32307","15.092952","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32308","15.093343","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32309","15.093350","172.30.1.205","172.30.1.104","TCP","54","44956 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32310","15.095159","172.30.1.205","172.30.1.104","TCP","54","44956 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32311","15.095272","172.30.1.205","172.30.1.104","TCP","74","37594 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918321 TSecr=0 WS=128" "32312","15.095437","172.30.1.104","172.30.1.205","TCP","54","135 > 44956 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32313","15.095461","172.30.1.104","172.30.1.205","TCP","54","135 > 44956 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32314","15.095466","172.30.1.205","172.30.1.104","TCP","54","44956 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32315","15.095548","172.30.1.104","172.30.1.205","TCP","66","49671 > 37594 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32316","15.095557","172.30.1.205","172.30.1.104","TCP","54","37594 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32317","15.095902","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32318","15.097778","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32319","15.097803","172.30.1.205","172.30.1.104","TCP","54","37594 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32320","15.099666","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32321","15.100033","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32322","15.100040","172.30.1.205","172.30.1.104","TCP","54","37594 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32323","15.101425","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32324","15.104056","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32325","15.104074","172.30.1.205","172.30.1.104","TCP","54","37594 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32326","15.105257","172.30.1.205","172.30.1.104","TCP","74","44960 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918331 TSecr=0 WS=128" "32327","15.105619","172.30.1.104","172.30.1.205","TCP","66","135 > 44960 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32328","15.105630","172.30.1.205","172.30.1.104","TCP","54","44960 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32329","15.105984","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32330","15.106293","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32331","15.106303","172.30.1.205","172.30.1.104","TCP","54","44960 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32332","15.108494","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32333","15.108872","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32334","15.108879","172.30.1.205","172.30.1.104","TCP","54","44960 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32335","15.110684","172.30.1.205","172.30.1.104","TCP","54","44960 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32336","15.110796","172.30.1.205","172.30.1.104","TCP","74","37598 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918337 TSecr=0 WS=128" "32337","15.110936","172.30.1.104","172.30.1.205","TCP","54","135 > 44960 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32338","15.110958","172.30.1.104","172.30.1.205","TCP","54","135 > 44960 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32339","15.110965","172.30.1.205","172.30.1.104","TCP","54","44960 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32340","15.111080","172.30.1.104","172.30.1.205","TCP","66","49671 > 37598 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32341","15.111088","172.30.1.205","172.30.1.104","TCP","54","37598 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32342","15.111438","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32343","15.111762","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32344","15.111771","172.30.1.205","172.30.1.104","TCP","54","37598 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32345","15.113703","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32346","15.114097","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32347","15.114102","172.30.1.205","172.30.1.104","TCP","54","37598 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32348","15.115492","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32349","15.118153","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32350","15.118168","172.30.1.205","172.30.1.104","TCP","54","37598 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32351","15.119189","172.30.1.205","172.30.1.104","TCP","74","44964 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918345 TSecr=0 WS=128" "32352","15.119507","172.30.1.104","172.30.1.205","TCP","66","135 > 44964 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32353","15.119528","172.30.1.205","172.30.1.104","TCP","54","44964 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32354","15.120136","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32355","15.120438","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32356","15.120455","172.30.1.205","172.30.1.104","TCP","54","44964 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32357","15.122977","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32358","15.123374","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32359","15.123381","172.30.1.205","172.30.1.104","TCP","54","44964 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32360","15.125213","172.30.1.205","172.30.1.104","TCP","54","44964 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32361","15.125324","172.30.1.205","172.30.1.104","TCP","74","37602 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918351 TSecr=0 WS=128" "32362","15.125475","172.30.1.104","172.30.1.205","TCP","54","135 > 44964 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32363","15.125514","172.30.1.104","172.30.1.205","TCP","54","135 > 44964 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32364","15.125519","172.30.1.205","172.30.1.104","TCP","54","44964 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32365","15.125633","172.30.1.104","172.30.1.205","TCP","66","49671 > 37602 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32366","15.125642","172.30.1.205","172.30.1.104","TCP","54","37602 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32367","15.126002","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32368","15.126290","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32369","15.126299","172.30.1.205","172.30.1.104","TCP","54","37602 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32370","15.128159","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32371","15.129349","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32372","15.129356","172.30.1.205","172.30.1.104","TCP","54","37602 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32373","15.130715","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32374","15.133451","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32375","15.133460","172.30.1.205","172.30.1.104","TCP","54","37602 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32376","15.134404","172.30.1.205","172.30.1.104","TCP","74","44968 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918360 TSecr=0 WS=128" "32377","15.134715","172.30.1.104","172.30.1.205","TCP","66","135 > 44968 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32378","15.134726","172.30.1.205","172.30.1.104","TCP","54","44968 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32379","15.135089","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32380","15.135375","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32381","15.135384","172.30.1.205","172.30.1.104","TCP","54","44968 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32382","15.137614","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32383","15.138021","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32384","15.138027","172.30.1.205","172.30.1.104","TCP","54","44968 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32385","15.138903","172.30.1.205","172.30.1.104","TCP","54","37558 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32386","15.138951","172.30.1.205","172.30.1.104","TCP","54","37562 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32387","15.138989","172.30.1.205","172.30.1.104","TCP","54","37566 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32388","15.139025","172.30.1.205","172.30.1.104","TCP","54","37570 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32389","15.139053","172.30.1.205","172.30.1.104","TCP","54","37574 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32390","15.139088","172.30.1.205","172.30.1.104","TCP","54","37578 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32391","15.139116","172.30.1.205","172.30.1.104","TCP","54","37582 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32392","15.139139","172.30.1.205","172.30.1.104","TCP","54","37586 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32393","15.139156","172.30.1.104","172.30.1.205","TCP","54","49671 > 37558 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32394","15.139186","172.30.1.205","172.30.1.104","TCP","54","37590 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32395","15.139217","172.30.1.205","172.30.1.104","TCP","54","37594 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32396","15.139244","172.30.1.205","172.30.1.104","TCP","54","37598 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32397","15.139277","172.30.1.205","172.30.1.104","TCP","54","37602 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32398","15.139551","172.30.1.104","172.30.1.205","TCP","54","49671 > 37562 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32399","15.139572","172.30.1.104","172.30.1.205","TCP","54","49671 > 37562 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32400","15.139589","172.30.1.205","172.30.1.104","TCP","54","37562 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32401","15.139602","172.30.1.104","172.30.1.205","TCP","54","49671 > 37558 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32402","15.139605","172.30.1.205","172.30.1.104","TCP","54","37558 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32403","15.139634","172.30.1.104","172.30.1.205","TCP","54","49671 > 37566 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32404","15.139659","172.30.1.104","172.30.1.205","TCP","54","49671 > 37570 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32405","15.139685","172.30.1.104","172.30.1.205","TCP","54","49671 > 37570 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32406","15.139689","172.30.1.205","172.30.1.104","TCP","54","37570 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32407","15.139711","172.30.1.104","172.30.1.205","TCP","54","49671 > 37566 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32408","15.139714","172.30.1.205","172.30.1.104","TCP","54","37566 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32409","15.139738","172.30.1.104","172.30.1.205","TCP","54","49671 > 37574 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32410","15.139765","172.30.1.104","172.30.1.205","TCP","54","49671 > 37578 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32411","15.139790","172.30.1.104","172.30.1.205","TCP","54","49671 > 37574 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32412","15.139794","172.30.1.205","172.30.1.104","TCP","54","37574 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32413","15.139817","172.30.1.104","172.30.1.205","TCP","54","49671 > 37582 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32414","15.139843","172.30.1.104","172.30.1.205","TCP","54","49671 > 37586 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32415","15.139874","172.30.1.104","172.30.1.205","TCP","54","49671 > 37586 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32416","15.139878","172.30.1.205","172.30.1.104","TCP","54","37586 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32417","15.139899","172.30.1.104","172.30.1.205","TCP","54","49671 > 37578 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32418","15.139902","172.30.1.205","172.30.1.104","TCP","54","37578 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32419","15.139926","172.30.1.104","172.30.1.205","TCP","54","49671 > 37590 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32420","15.139953","172.30.1.104","172.30.1.205","TCP","54","49671 > 37594 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32421","15.139980","172.30.1.104","172.30.1.205","TCP","54","49671 > 37594 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32422","15.139984","172.30.1.205","172.30.1.104","TCP","54","37594 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32423","15.140006","172.30.1.104","172.30.1.205","TCP","54","49671 > 37598 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32424","15.140033","172.30.1.104","172.30.1.205","TCP","54","49671 > 37598 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32425","15.140037","172.30.1.205","172.30.1.104","TCP","54","37598 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32426","15.140060","172.30.1.104","172.30.1.205","TCP","54","49671 > 37602 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32427","15.140087","172.30.1.104","172.30.1.205","TCP","54","49671 > 37602 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32428","15.140091","172.30.1.205","172.30.1.104","TCP","54","37602 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32429","15.140113","172.30.1.104","172.30.1.205","TCP","54","49671 > 37582 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32430","15.140116","172.30.1.205","172.30.1.104","TCP","54","37582 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32431","15.140140","172.30.1.104","172.30.1.205","TCP","54","49671 > 37590 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32432","15.140143","172.30.1.205","172.30.1.104","TCP","54","37590 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32433","15.140948","172.30.1.205","172.30.1.104","TCP","54","44968 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32434","15.141059","172.30.1.205","172.30.1.104","TCP","74","37606 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918367 TSecr=0 WS=128" "32435","15.141208","172.30.1.104","172.30.1.205","TCP","54","135 > 44968 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32436","15.141232","172.30.1.104","172.30.1.205","TCP","54","135 > 44968 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32437","15.141237","172.30.1.205","172.30.1.104","TCP","54","44968 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32438","15.141358","172.30.1.104","172.30.1.205","TCP","66","49671 > 37606 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32439","15.141366","172.30.1.205","172.30.1.104","TCP","54","37606 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32440","15.141727","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32441","15.142016","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32442","15.142025","172.30.1.205","172.30.1.104","TCP","54","37606 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32443","15.143917","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32444","15.146107","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32445","15.146124","172.30.1.205","172.30.1.104","TCP","54","37606 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32446","15.147537","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32447","15.150202","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32448","15.150212","172.30.1.205","172.30.1.104","TCP","54","37606 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32449","15.151159","172.30.1.205","172.30.1.104","TCP","74","44972 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918377 TSecr=0 WS=128" "32450","15.151481","172.30.1.104","172.30.1.205","TCP","66","135 > 44972 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32451","15.151492","172.30.1.205","172.30.1.104","TCP","54","44972 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32452","15.151843","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32453","15.152133","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32454","15.152142","172.30.1.205","172.30.1.104","TCP","54","44972 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32455","15.154353","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32456","15.154748","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32457","15.154755","172.30.1.205","172.30.1.104","TCP","54","44972 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32458","15.156567","172.30.1.205","172.30.1.104","TCP","54","44972 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32459","15.156679","172.30.1.205","172.30.1.104","TCP","74","37610 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918383 TSecr=0 WS=128" "32460","15.156844","172.30.1.104","172.30.1.205","TCP","54","135 > 44972 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32461","15.156868","172.30.1.104","172.30.1.205","TCP","54","135 > 44972 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32462","15.156874","172.30.1.205","172.30.1.104","TCP","54","44972 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32463","15.156962","172.30.1.104","172.30.1.205","TCP","66","49671 > 37610 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32464","15.156970","172.30.1.205","172.30.1.104","TCP","54","37610 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32465","15.157327","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32466","15.157637","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32467","15.157646","172.30.1.205","172.30.1.104","TCP","54","37610 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32468","15.159518","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32469","15.159913","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32470","15.159928","172.30.1.205","172.30.1.104","TCP","54","37610 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32471","15.161574","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32472","15.164266","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32473","15.164277","172.30.1.205","172.30.1.104","TCP","54","37610 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32474","15.165305","172.30.1.205","172.30.1.104","TCP","74","44976 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918391 TSecr=0 WS=128" "32475","15.165609","172.30.1.104","172.30.1.205","TCP","66","135 > 44976 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32476","15.165621","172.30.1.205","172.30.1.104","TCP","54","44976 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32477","15.165976","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32478","15.166267","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32479","15.166276","172.30.1.205","172.30.1.104","TCP","54","44976 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32480","15.168508","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32481","15.168909","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32482","15.168916","172.30.1.205","172.30.1.104","TCP","54","44976 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32483","15.170730","172.30.1.205","172.30.1.104","TCP","54","44976 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32484","15.170856","172.30.1.205","172.30.1.104","TCP","74","37614 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918397 TSecr=0 WS=128" "32485","15.170996","172.30.1.104","172.30.1.205","TCP","54","135 > 44976 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32486","15.171022","172.30.1.104","172.30.1.205","TCP","54","135 > 44976 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32487","15.171037","172.30.1.205","172.30.1.104","TCP","54","44976 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32488","15.171140","172.30.1.104","172.30.1.205","TCP","66","49671 > 37614 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32489","15.171149","172.30.1.205","172.30.1.104","TCP","54","37614 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32490","15.171498","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32491","15.171814","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32492","15.171823","172.30.1.205","172.30.1.104","TCP","54","37614 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32493","15.173767","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32494","15.174131","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32495","15.174138","172.30.1.205","172.30.1.104","TCP","54","37614 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32496","15.175502","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32497","15.178141","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32498","15.178156","172.30.1.205","172.30.1.104","TCP","54","37614 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32499","15.179184","172.30.1.205","172.30.1.104","TCP","74","44980 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918405 TSecr=0 WS=128" "32500","15.179505","172.30.1.104","172.30.1.205","TCP","66","135 > 44980 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32501","15.179517","172.30.1.205","172.30.1.104","TCP","54","44980 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32502","15.179870","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32503","15.180159","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32504","15.180168","172.30.1.205","172.30.1.104","TCP","54","44980 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32505","15.182423","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32506","15.182848","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32507","15.182854","172.30.1.205","172.30.1.104","TCP","54","44980 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32508","15.184684","172.30.1.205","172.30.1.104","TCP","54","44980 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32509","15.184822","172.30.1.205","172.30.1.104","TCP","74","37618 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918411 TSecr=0 WS=128" "32510","15.184958","172.30.1.104","172.30.1.205","TCP","54","135 > 44980 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32511","15.184982","172.30.1.104","172.30.1.205","TCP","54","135 > 44980 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32512","15.184989","172.30.1.205","172.30.1.104","TCP","54","44980 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32513","15.185122","172.30.1.104","172.30.1.205","TCP","66","49671 > 37618 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32514","15.185131","172.30.1.205","172.30.1.104","TCP","54","37618 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32515","15.185479","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32516","15.185774","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32517","15.185781","172.30.1.205","172.30.1.104","TCP","54","37618 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32518","15.187652","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32519","15.188044","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32520","15.188050","172.30.1.205","172.30.1.104","TCP","54","37618 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32521","15.189446","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32522","15.192157","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32523","15.192166","172.30.1.205","172.30.1.104","TCP","54","37618 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32524","15.193129","172.30.1.205","172.30.1.104","TCP","74","44984 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918419 TSecr=0 WS=128" "32525","15.193453","172.30.1.104","172.30.1.205","TCP","66","135 > 44984 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32526","15.193464","172.30.1.205","172.30.1.104","TCP","54","44984 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32527","15.193818","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32528","15.194267","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32529","15.194276","172.30.1.205","172.30.1.104","TCP","54","44984 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32530","15.196451","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32531","15.196863","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32532","15.196870","172.30.1.205","172.30.1.104","TCP","54","44984 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32533","15.198677","172.30.1.205","172.30.1.104","TCP","54","44984 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32534","15.198789","172.30.1.205","172.30.1.104","TCP","74","37622 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918425 TSecr=0 WS=128" "32535","15.198945","172.30.1.104","172.30.1.205","TCP","54","135 > 44984 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32536","15.198998","172.30.1.104","172.30.1.205","TCP","54","135 > 44984 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32537","15.199004","172.30.1.205","172.30.1.104","TCP","54","44984 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32538","15.199084","172.30.1.104","172.30.1.205","TCP","66","49671 > 37622 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32539","15.199092","172.30.1.205","172.30.1.104","TCP","54","37622 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32540","15.199467","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32541","15.199757","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32542","15.199766","172.30.1.205","172.30.1.104","TCP","54","37622 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32543","15.201663","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32544","15.202041","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32545","15.202047","172.30.1.205","172.30.1.104","TCP","54","37622 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32546","15.203397","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32547","15.206197","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32548","15.206206","172.30.1.205","172.30.1.104","TCP","54","37622 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32549","15.207169","172.30.1.205","172.30.1.104","TCP","74","44988 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918433 TSecr=0 WS=128" "32550","15.207496","172.30.1.104","172.30.1.205","TCP","66","135 > 44988 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32551","15.207507","172.30.1.205","172.30.1.104","TCP","54","44988 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32552","15.207859","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32553","15.208149","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32554","15.208158","172.30.1.205","172.30.1.104","TCP","54","44988 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32555","15.210399","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32556","15.210811","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32557","15.210818","172.30.1.205","172.30.1.104","TCP","54","44988 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32558","15.212647","172.30.1.205","172.30.1.104","TCP","54","44988 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32559","15.212761","172.30.1.205","172.30.1.104","TCP","74","37626 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918439 TSecr=0 WS=128" "32560","15.212937","172.30.1.104","172.30.1.205","TCP","54","135 > 44988 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32561","15.212962","172.30.1.104","172.30.1.205","TCP","54","135 > 44988 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32562","15.212969","172.30.1.205","172.30.1.104","TCP","54","44988 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32563","15.213063","172.30.1.104","172.30.1.205","TCP","66","49671 > 37626 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32564","15.213070","172.30.1.205","172.30.1.104","TCP","54","37626 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32565","15.213420","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32566","15.213732","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32567","15.213740","172.30.1.205","172.30.1.104","TCP","54","37626 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32568","15.215609","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32569","15.216005","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32570","15.216012","172.30.1.205","172.30.1.104","TCP","54","37626 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32571","15.217411","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32572","15.220180","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32573","15.220189","172.30.1.205","172.30.1.104","TCP","54","37626 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32574","15.221176","172.30.1.205","172.30.1.104","TCP","74","44992 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918447 TSecr=0 WS=128" "32575","15.221506","172.30.1.104","172.30.1.205","TCP","66","135 > 44992 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32576","15.221517","172.30.1.205","172.30.1.104","TCP","54","44992 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32577","15.221869","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32578","15.222182","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32579","15.222191","172.30.1.205","172.30.1.104","TCP","54","44992 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32580","15.224400","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32581","15.224844","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32582","15.224851","172.30.1.205","172.30.1.104","TCP","54","44992 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32583","15.226698","172.30.1.205","172.30.1.104","TCP","54","44992 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32584","15.226813","172.30.1.205","172.30.1.104","TCP","74","37630 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918453 TSecr=0 WS=128" "32585","15.226963","172.30.1.104","172.30.1.205","TCP","54","135 > 44992 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32586","15.226987","172.30.1.104","172.30.1.205","TCP","54","135 > 44992 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32587","15.226993","172.30.1.205","172.30.1.104","TCP","54","44992 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32588","15.227158","172.30.1.104","172.30.1.205","TCP","66","49671 > 37630 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32589","15.227166","172.30.1.205","172.30.1.104","TCP","54","37630 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32590","15.227522","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32591","15.227820","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32592","15.227829","172.30.1.205","172.30.1.104","TCP","54","37630 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32593","15.229734","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32594","15.230134","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32595","15.230141","172.30.1.205","172.30.1.104","TCP","54","37630 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32596","15.231502","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32597","15.234310","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32598","15.234320","172.30.1.205","172.30.1.104","TCP","54","37630 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32599","15.235273","172.30.1.205","172.30.1.104","TCP","74","44996 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918461 TSecr=0 WS=128" "32600","15.235604","172.30.1.104","172.30.1.205","TCP","66","135 > 44996 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32601","15.235614","172.30.1.205","172.30.1.104","TCP","54","44996 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32602","15.235966","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32603","15.236326","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32604","15.236335","172.30.1.205","172.30.1.104","TCP","54","44996 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32605","15.238566","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32606","15.238994","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32607","15.239001","172.30.1.205","172.30.1.104","TCP","54","44996 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32608","15.240831","172.30.1.205","172.30.1.104","TCP","54","44996 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32609","15.240944","172.30.1.205","172.30.1.104","TCP","74","37634 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918467 TSecr=0 WS=128" "32610","15.241108","172.30.1.104","172.30.1.205","TCP","54","135 > 44996 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32611","15.241133","172.30.1.104","172.30.1.205","TCP","54","135 > 44996 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32612","15.241138","172.30.1.205","172.30.1.104","TCP","54","44996 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32613","15.241256","172.30.1.104","172.30.1.205","TCP","66","49671 > 37634 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32614","15.241264","172.30.1.205","172.30.1.104","TCP","54","37634 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32615","15.241616","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32616","15.242907","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32617","15.242918","172.30.1.205","172.30.1.104","TCP","54","37634 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32618","15.245111","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32619","15.245540","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32620","15.245547","172.30.1.205","172.30.1.104","TCP","54","37634 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32621","15.246910","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32622","15.249748","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32623","15.249759","172.30.1.205","172.30.1.104","TCP","54","37634 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32624","15.250733","172.30.1.205","172.30.1.104","TCP","74","45000 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918477 TSecr=0 WS=128" "32625","15.251050","172.30.1.104","172.30.1.205","TCP","66","135 > 45000 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32626","15.251062","172.30.1.205","172.30.1.104","TCP","54","45000 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32627","15.251415","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32628","15.251720","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32629","15.251729","172.30.1.205","172.30.1.104","TCP","54","45000 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32630","15.253949","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32631","15.254368","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32632","15.254380","172.30.1.205","172.30.1.104","TCP","54","45000 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32633","15.256203","172.30.1.205","172.30.1.104","TCP","54","45000 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32634","15.256318","172.30.1.205","172.30.1.104","TCP","74","37638 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918482 TSecr=0 WS=128" "32635","15.256479","172.30.1.104","172.30.1.205","TCP","54","135 > 45000 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32636","15.256507","172.30.1.104","172.30.1.205","TCP","54","135 > 45000 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32637","15.256513","172.30.1.205","172.30.1.104","TCP","54","45000 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32638","15.256637","172.30.1.104","172.30.1.205","TCP","66","49671 > 37638 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32639","15.256646","172.30.1.205","172.30.1.104","TCP","54","37638 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32640","15.257025","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32641","15.257361","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32642","15.257371","172.30.1.205","172.30.1.104","TCP","54","37638 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32643","15.259248","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32644","15.259664","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32645","15.259671","172.30.1.205","172.30.1.104","TCP","54","37638 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32646","15.261060","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32647","15.263920","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32648","15.263932","172.30.1.205","172.30.1.104","TCP","54","37638 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32649","15.264932","172.30.1.205","172.30.1.104","TCP","74","45004 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918491 TSecr=0 WS=128" "32650","15.265243","172.30.1.104","172.30.1.205","TCP","66","135 > 45004 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32651","15.265254","172.30.1.205","172.30.1.104","TCP","54","45004 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32652","15.265617","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32653","15.265916","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32654","15.265926","172.30.1.205","172.30.1.104","TCP","54","45004 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32655","15.268125","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32656","15.268551","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32657","15.268557","172.30.1.205","172.30.1.104","TCP","54","45004 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32658","15.270402","172.30.1.205","172.30.1.104","TCP","54","45004 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32659","15.270515","172.30.1.205","172.30.1.104","TCP","74","37642 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918496 TSecr=0 WS=128" "32660","15.270673","172.30.1.104","172.30.1.205","TCP","54","135 > 45004 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32661","15.270684","172.30.1.104","172.30.1.205","TCP","54","135 > 45004 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32662","15.270690","172.30.1.205","172.30.1.104","TCP","54","45004 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32663","15.270786","172.30.1.104","172.30.1.205","TCP","66","49671 > 37642 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32664","15.270795","172.30.1.205","172.30.1.104","TCP","54","37642 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32665","15.271145","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32666","15.271428","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32667","15.271437","172.30.1.205","172.30.1.104","TCP","54","37642 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32668","15.273353","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32669","15.273731","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32670","15.273742","172.30.1.205","172.30.1.104","TCP","54","37642 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32671","15.275331","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32672","15.278046","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32673","15.278056","172.30.1.205","172.30.1.104","TCP","54","37642 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32674","15.279025","172.30.1.205","172.30.1.104","TCP","74","45008 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918505 TSecr=0 WS=128" "32675","15.279382","172.30.1.104","172.30.1.205","TCP","66","135 > 45008 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32676","15.279395","172.30.1.205","172.30.1.104","TCP","54","45008 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32677","15.279755","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32678","15.280036","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32679","15.280045","172.30.1.205","172.30.1.104","TCP","54","45008 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32680","15.282270","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32681","15.282673","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32682","15.282686","172.30.1.205","172.30.1.104","TCP","54","45008 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32683","15.284654","172.30.1.205","172.30.1.104","TCP","54","45008 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32684","15.284768","172.30.1.205","172.30.1.104","TCP","74","37646 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918511 TSecr=0 WS=128" "32685","15.284976","172.30.1.104","172.30.1.205","TCP","54","135 > 45008 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32686","15.284984","172.30.1.104","172.30.1.205","TCP","54","135 > 45008 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32687","15.284989","172.30.1.205","172.30.1.104","TCP","54","45008 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32688","15.285101","172.30.1.104","172.30.1.205","TCP","66","49671 > 37646 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32689","15.285109","172.30.1.205","172.30.1.104","TCP","54","37646 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32690","15.285460","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32691","15.285758","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32692","15.285767","172.30.1.205","172.30.1.104","TCP","54","37646 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32693","15.287657","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32694","15.288025","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32695","15.288031","172.30.1.205","172.30.1.104","TCP","54","37646 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32696","15.289415","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32697","15.292142","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32698","15.292165","172.30.1.205","172.30.1.104","TCP","54","37646 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32699","15.293279","172.30.1.205","172.30.1.104","TCP","74","45012 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918519 TSecr=0 WS=128" "32700","15.293623","172.30.1.104","172.30.1.205","TCP","66","135 > 45012 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32701","15.293634","172.30.1.205","172.30.1.104","TCP","54","45012 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32702","15.293988","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32703","15.294311","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32704","15.294329","172.30.1.205","172.30.1.104","TCP","54","45012 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32705","15.296812","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32706","15.297220","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32707","15.297227","172.30.1.205","172.30.1.104","TCP","54","45012 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32708","15.299036","172.30.1.205","172.30.1.104","TCP","54","45012 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32709","15.299148","172.30.1.205","172.30.1.104","TCP","74","37650 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918525 TSecr=0 WS=128" "32710","15.299343","172.30.1.104","172.30.1.205","TCP","54","135 > 45012 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32711","15.299352","172.30.1.104","172.30.1.205","TCP","54","135 > 45012 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32712","15.299357","172.30.1.205","172.30.1.104","TCP","54","45012 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32713","15.299444","172.30.1.104","172.30.1.205","TCP","66","49671 > 37650 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32714","15.299452","172.30.1.205","172.30.1.104","TCP","54","37650 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32715","15.299795","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32716","15.300092","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32717","15.300100","172.30.1.205","172.30.1.104","TCP","54","37650 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32718","15.301989","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32719","15.302357","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32720","15.302362","172.30.1.205","172.30.1.104","TCP","54","37650 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32721","15.303704","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32722","15.306340","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32723","15.306351","172.30.1.205","172.30.1.104","TCP","54","37650 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32724","15.307301","172.30.1.205","172.30.1.104","TCP","74","45016 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918533 TSecr=0 WS=128" "32725","15.307604","172.30.1.104","172.30.1.205","TCP","66","135 > 45016 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32726","15.307615","172.30.1.205","172.30.1.104","TCP","54","45016 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32727","15.307995","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32728","15.308271","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32729","15.308280","172.30.1.205","172.30.1.104","TCP","54","45016 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32730","15.310476","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32731","15.310853","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32732","15.310859","172.30.1.205","172.30.1.104","TCP","54","45016 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32733","15.311704","172.30.1.205","172.30.1.104","TCP","54","37610 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32734","15.311754","172.30.1.205","172.30.1.104","TCP","54","37614 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32735","15.311786","172.30.1.205","172.30.1.104","TCP","54","37618 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32736","15.311821","172.30.1.205","172.30.1.104","TCP","54","37622 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32737","15.311854","172.30.1.205","172.30.1.104","TCP","54","37626 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32738","15.311885","172.30.1.205","172.30.1.104","TCP","54","37630 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32739","15.311918","172.30.1.205","172.30.1.104","TCP","54","37634 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32740","15.311950","172.30.1.205","172.30.1.104","TCP","54","37638 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32741","15.311977","172.30.1.205","172.30.1.104","TCP","54","37642 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32742","15.312004","172.30.1.205","172.30.1.104","TCP","54","37646 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32743","15.312030","172.30.1.205","172.30.1.104","TCP","54","37650 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32744","15.312094","172.30.1.205","172.30.1.104","TCP","54","37606 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "32745","15.312330","172.30.1.104","172.30.1.205","TCP","54","49671 > 37610 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32746","15.312339","172.30.1.104","172.30.1.205","TCP","54","49671 > 37614 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32747","15.312343","172.30.1.104","172.30.1.205","TCP","54","49671 > 37618 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32748","15.312345","172.30.1.104","172.30.1.205","TCP","54","49671 > 37610 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32749","15.312351","172.30.1.205","172.30.1.104","TCP","54","37610 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32750","15.312358","172.30.1.104","172.30.1.205","TCP","54","49671 > 37622 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32751","15.312361","172.30.1.104","172.30.1.205","TCP","54","49671 > 37626 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32752","15.312364","172.30.1.104","172.30.1.205","TCP","54","49671 > 37614 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32753","15.312367","172.30.1.205","172.30.1.104","TCP","54","37614 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32754","15.312372","172.30.1.104","172.30.1.205","TCP","54","49671 > 37630 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32755","15.312375","172.30.1.104","172.30.1.205","TCP","54","49671 > 37630 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32756","15.312377","172.30.1.205","172.30.1.104","TCP","54","37630 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32757","15.312378","172.30.1.104","172.30.1.205","TCP","54","49671 > 37626 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32758","15.312380","172.30.1.205","172.30.1.104","TCP","54","37626 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32759","15.312381","172.30.1.104","172.30.1.205","TCP","54","49671 > 37618 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32760","15.312383","172.30.1.205","172.30.1.104","TCP","54","37618 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32761","15.312385","172.30.1.104","172.30.1.205","TCP","54","49671 > 37622 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32762","15.312386","172.30.1.205","172.30.1.104","TCP","54","37622 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32763","15.312594","172.30.1.104","172.30.1.205","TCP","54","49671 > 37634 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32764","15.312601","172.30.1.104","172.30.1.205","TCP","54","49671 > 37638 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32765","15.312603","172.30.1.104","172.30.1.205","TCP","54","49671 > 37642 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32766","15.312605","172.30.1.104","172.30.1.205","TCP","54","49671 > 37634 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32767","15.312610","172.30.1.205","172.30.1.104","TCP","54","37634 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32768","15.312616","172.30.1.104","172.30.1.205","TCP","54","49671 > 37638 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32769","15.312618","172.30.1.205","172.30.1.104","TCP","54","37638 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32770","15.312619","172.30.1.104","172.30.1.205","TCP","54","49671 > 37642 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32771","15.312621","172.30.1.205","172.30.1.104","TCP","54","37642 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32772","15.312831","172.30.1.104","172.30.1.205","TCP","54","49671 > 37646 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32773","15.312837","172.30.1.104","172.30.1.205","TCP","54","49671 > 37650 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32774","15.312840","172.30.1.104","172.30.1.205","TCP","54","49671 > 37606 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32775","15.312843","172.30.1.104","172.30.1.205","TCP","54","49671 > 37646 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32776","15.312847","172.30.1.205","172.30.1.104","TCP","54","37646 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32777","15.312853","172.30.1.104","172.30.1.205","TCP","54","49671 > 37650 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32778","15.312855","172.30.1.205","172.30.1.104","TCP","54","37650 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32779","15.312857","172.30.1.104","172.30.1.205","TCP","54","49671 > 37606 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "32780","15.312858","172.30.1.205","172.30.1.104","TCP","54","37606 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "32781","15.313579","172.30.1.205","172.30.1.104","TCP","54","45016 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32782","15.313691","172.30.1.205","172.30.1.104","TCP","74","37654 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918540 TSecr=0 WS=128" "32783","15.313811","172.30.1.104","172.30.1.205","TCP","54","135 > 45016 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32784","15.313853","172.30.1.104","172.30.1.205","TCP","54","135 > 45016 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32785","15.313858","172.30.1.205","172.30.1.104","TCP","54","45016 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32786","15.313965","172.30.1.104","172.30.1.205","TCP","66","49671 > 37654 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32787","15.313974","172.30.1.205","172.30.1.104","TCP","54","37654 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32788","15.314329","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32789","15.314614","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32790","15.314623","172.30.1.205","172.30.1.104","TCP","54","37654 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32791","15.316497","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32792","15.316889","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32793","15.316896","172.30.1.205","172.30.1.104","TCP","54","37654 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32794","15.318262","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32795","15.320893","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32796","15.320902","172.30.1.205","172.30.1.104","TCP","54","37654 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32797","15.321851","172.30.1.205","172.30.1.104","TCP","74","45020 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918548 TSecr=0 WS=128" "32798","15.322148","172.30.1.104","172.30.1.205","TCP","66","135 > 45020 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32799","15.322159","172.30.1.205","172.30.1.104","TCP","54","45020 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32800","15.322513","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32801","15.322783","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32802","15.322792","172.30.1.205","172.30.1.104","TCP","54","45020 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32803","15.324991","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32804","15.325390","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32805","15.325397","172.30.1.205","172.30.1.104","TCP","54","45020 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32806","15.327211","172.30.1.205","172.30.1.104","TCP","54","45020 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32807","15.327323","172.30.1.205","172.30.1.104","TCP","74","37658 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918553 TSecr=0 WS=128" "32808","15.327516","172.30.1.104","172.30.1.205","TCP","54","135 > 45020 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32809","15.327525","172.30.1.104","172.30.1.205","TCP","54","135 > 45020 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32810","15.327530","172.30.1.205","172.30.1.104","TCP","54","45020 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32811","15.327618","172.30.1.104","172.30.1.205","TCP","66","49671 > 37658 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32812","15.327635","172.30.1.205","172.30.1.104","TCP","54","37658 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32813","15.328037","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32814","15.329220","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32815","15.329236","172.30.1.205","172.30.1.104","TCP","54","37658 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32816","15.331316","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32817","15.331724","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32818","15.331730","172.30.1.205","172.30.1.104","TCP","54","37658 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32819","15.333134","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32820","15.335863","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32821","15.335874","172.30.1.205","172.30.1.104","TCP","54","37658 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32822","15.336866","172.30.1.205","172.30.1.104","TCP","74","45024 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918563 TSecr=0 WS=128" "32823","15.337174","172.30.1.104","172.30.1.205","TCP","66","135 > 45024 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32824","15.337188","172.30.1.205","172.30.1.104","TCP","54","45024 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32825","15.337575","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32826","15.337856","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32827","15.337865","172.30.1.205","172.30.1.104","TCP","54","45024 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32828","15.340073","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32829","15.340463","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32830","15.340469","172.30.1.205","172.30.1.104","TCP","54","45024 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32831","15.342296","172.30.1.205","172.30.1.104","TCP","54","45024 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32832","15.342410","172.30.1.205","172.30.1.104","TCP","74","37662 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918568 TSecr=0 WS=128" "32833","15.342565","172.30.1.104","172.30.1.205","TCP","54","135 > 45024 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32834","15.342612","172.30.1.104","172.30.1.205","TCP","54","135 > 45024 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32835","15.342617","172.30.1.205","172.30.1.104","TCP","54","45024 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32836","15.342684","172.30.1.104","172.30.1.205","TCP","66","49671 > 37662 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32837","15.342693","172.30.1.205","172.30.1.104","TCP","54","37662 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32838","15.343067","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32839","15.343334","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32840","15.343343","172.30.1.205","172.30.1.104","TCP","54","37662 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32841","15.345248","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32842","15.345606","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32843","15.345612","172.30.1.205","172.30.1.104","TCP","54","37662 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32844","15.346965","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32845","15.349725","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32846","15.349735","172.30.1.205","172.30.1.104","TCP","54","37662 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32847","15.350693","172.30.1.205","172.30.1.104","TCP","74","45028 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918577 TSecr=0 WS=128" "32848","15.350997","172.30.1.104","172.30.1.205","TCP","66","135 > 45028 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32849","15.351008","172.30.1.205","172.30.1.104","TCP","54","45028 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32850","15.351358","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32851","15.351644","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32852","15.351653","172.30.1.205","172.30.1.104","TCP","54","45028 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32853","15.353890","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32854","15.354284","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32855","15.354291","172.30.1.205","172.30.1.104","TCP","54","45028 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32856","15.356119","172.30.1.205","172.30.1.104","TCP","54","45028 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32857","15.356249","172.30.1.205","172.30.1.104","TCP","74","37666 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918582 TSecr=0 WS=128" "32858","15.356409","172.30.1.104","172.30.1.205","TCP","54","135 > 45028 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32859","15.356443","172.30.1.104","172.30.1.205","TCP","54","135 > 45028 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32860","15.356449","172.30.1.205","172.30.1.104","TCP","54","45028 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32861","15.356519","172.30.1.104","172.30.1.205","TCP","66","49671 > 37666 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32862","15.356527","172.30.1.205","172.30.1.104","TCP","54","37666 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32863","15.356907","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32864","15.357222","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32865","15.357231","172.30.1.205","172.30.1.104","TCP","54","37666 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32866","15.359137","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32867","15.359506","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32868","15.359513","172.30.1.205","172.30.1.104","TCP","54","37666 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32869","15.360907","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32870","15.363583","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32871","15.363595","172.30.1.205","172.30.1.104","TCP","54","37666 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32872","15.364621","172.30.1.205","172.30.1.104","TCP","74","45032 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918591 TSecr=0 WS=128" "32873","15.364947","172.30.1.104","172.30.1.205","TCP","66","135 > 45032 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32874","15.364959","172.30.1.205","172.30.1.104","TCP","54","45032 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32875","15.365321","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32876","15.365611","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32877","15.365620","172.30.1.205","172.30.1.104","TCP","54","45032 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32878","15.367836","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32879","15.368236","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32880","15.368243","172.30.1.205","172.30.1.104","TCP","54","45032 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32881","15.370090","172.30.1.205","172.30.1.104","TCP","54","45032 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32882","15.370214","172.30.1.205","172.30.1.104","TCP","74","37670 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918596 TSecr=0 WS=128" "32883","15.370370","172.30.1.104","172.30.1.205","TCP","54","135 > 45032 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32884","15.370383","172.30.1.104","172.30.1.205","TCP","54","135 > 45032 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32885","15.370390","172.30.1.205","172.30.1.104","TCP","54","45032 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32886","15.370483","172.30.1.104","172.30.1.205","TCP","66","49671 > 37670 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32887","15.370491","172.30.1.205","172.30.1.104","TCP","54","37670 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32888","15.370849","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32889","15.371132","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32890","15.371141","172.30.1.205","172.30.1.104","TCP","54","37670 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32891","15.373058","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32892","15.373412","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32893","15.373418","172.30.1.205","172.30.1.104","TCP","54","37670 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32894","15.374778","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32895","15.377439","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32896","15.377448","172.30.1.205","172.30.1.104","TCP","54","37670 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32897","15.378414","172.30.1.205","172.30.1.104","TCP","74","45036 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918604 TSecr=0 WS=128" "32898","15.378715","172.30.1.104","172.30.1.205","TCP","66","135 > 45036 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32899","15.378726","172.30.1.205","172.30.1.104","TCP","54","45036 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32900","15.379080","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32901","15.379368","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32902","15.379379","172.30.1.205","172.30.1.104","TCP","54","45036 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32903","15.381621","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32904","15.382050","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32905","15.382056","172.30.1.205","172.30.1.104","TCP","54","45036 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32906","15.383866","172.30.1.205","172.30.1.104","TCP","54","45036 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32907","15.383984","172.30.1.205","172.30.1.104","TCP","74","37674 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918610 TSecr=0 WS=128" "32908","15.384127","172.30.1.104","172.30.1.205","TCP","54","135 > 45036 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32909","15.384138","172.30.1.104","172.30.1.205","TCP","54","135 > 45036 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32910","15.384144","172.30.1.205","172.30.1.104","TCP","54","45036 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32911","15.384275","172.30.1.104","172.30.1.205","TCP","66","49671 > 37674 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32912","15.384293","172.30.1.205","172.30.1.104","TCP","54","37674 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32913","15.384706","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32914","15.385048","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32915","15.385057","172.30.1.205","172.30.1.104","TCP","54","37674 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32916","15.386992","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32917","15.387374","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32918","15.387381","172.30.1.205","172.30.1.104","TCP","54","37674 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32919","15.388756","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32920","15.391494","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32921","15.391507","172.30.1.205","172.30.1.104","TCP","54","37674 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32922","15.392489","172.30.1.205","172.30.1.104","TCP","74","45040 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918618 TSecr=0 WS=128" "32923","15.392769","172.30.1.104","172.30.1.205","TCP","66","135 > 45040 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32924","15.392791","172.30.1.205","172.30.1.104","TCP","54","45040 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32925","15.393155","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32926","15.393426","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32927","15.393435","172.30.1.205","172.30.1.104","TCP","54","45040 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32928","15.395645","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32929","15.396020","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32930","15.396027","172.30.1.205","172.30.1.104","TCP","54","45040 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32931","15.397878","172.30.1.205","172.30.1.104","TCP","54","45040 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32932","15.397999","172.30.1.205","172.30.1.104","TCP","74","37678 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918624 TSecr=0 WS=128" "32933","15.398133","172.30.1.104","172.30.1.205","TCP","54","135 > 45040 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32934","15.398145","172.30.1.104","172.30.1.205","TCP","54","135 > 45040 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32935","15.398152","172.30.1.205","172.30.1.104","TCP","54","45040 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32936","15.398305","172.30.1.104","172.30.1.205","TCP","66","49671 > 37678 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32937","15.398314","172.30.1.205","172.30.1.104","TCP","54","37678 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32938","15.398664","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32939","15.399235","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32940","15.399243","172.30.1.205","172.30.1.104","TCP","54","37678 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32941","15.401152","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32942","15.401496","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32943","15.401503","172.30.1.205","172.30.1.104","TCP","54","37678 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32944","15.402864","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32945","15.405503","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32946","15.405512","172.30.1.205","172.30.1.104","TCP","54","37678 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32947","15.406507","172.30.1.205","172.30.1.104","TCP","74","45044 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918632 TSecr=0 WS=128" "32948","15.406809","172.30.1.104","172.30.1.205","TCP","66","135 > 45044 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32949","15.406820","172.30.1.205","172.30.1.104","TCP","54","45044 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32950","15.407168","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32951","15.407488","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32952","15.407497","172.30.1.205","172.30.1.104","TCP","54","45044 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32953","15.409749","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32954","15.410130","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32955","15.410137","172.30.1.205","172.30.1.104","TCP","54","45044 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32956","15.411946","172.30.1.205","172.30.1.104","TCP","54","45044 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32957","15.412061","172.30.1.205","172.30.1.104","TCP","74","37682 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918638 TSecr=0 WS=128" "32958","15.412231","172.30.1.104","172.30.1.205","TCP","54","135 > 45044 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32959","15.412308","172.30.1.104","172.30.1.205","TCP","54","135 > 45044 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32960","15.412314","172.30.1.205","172.30.1.104","TCP","54","45044 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32961","15.412339","172.30.1.104","172.30.1.205","TCP","66","49671 > 37682 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32962","15.412347","172.30.1.205","172.30.1.104","TCP","54","37682 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32963","15.412699","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32964","15.412989","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32965","15.412999","172.30.1.205","172.30.1.104","TCP","54","37682 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32966","15.414899","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32967","15.415245","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32968","15.415251","172.30.1.205","172.30.1.104","TCP","54","37682 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32969","15.416623","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32970","15.419334","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32971","15.419345","172.30.1.205","172.30.1.104","TCP","54","37682 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32972","15.420333","172.30.1.205","172.30.1.104","TCP","74","45048 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918646 TSecr=0 WS=128" "32973","15.420592","172.30.1.104","172.30.1.205","TCP","66","135 > 45048 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32974","15.420603","172.30.1.205","172.30.1.104","TCP","54","45048 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32975","15.420986","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "32976","15.421246","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32977","15.421255","172.30.1.205","172.30.1.104","TCP","54","45048 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32978","15.423442","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "32979","15.423808","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "32980","15.423815","172.30.1.205","172.30.1.104","TCP","54","45048 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "32981","15.425653","172.30.1.205","172.30.1.104","TCP","54","45048 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "32982","15.425768","172.30.1.205","172.30.1.104","TCP","74","37686 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918652 TSecr=0 WS=128" "32983","15.425893","172.30.1.104","172.30.1.205","TCP","54","135 > 45048 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32984","15.425932","172.30.1.104","172.30.1.205","TCP","54","135 > 45048 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "32985","15.425938","172.30.1.205","172.30.1.104","TCP","54","45048 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "32986","15.426028","172.30.1.104","172.30.1.205","TCP","66","49671 > 37686 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32987","15.426036","172.30.1.205","172.30.1.104","TCP","54","37686 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "32988","15.426399","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "32989","15.426714","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "32990","15.426722","172.30.1.205","172.30.1.104","TCP","54","37686 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "32991","15.428582","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "32992","15.428936","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "32993","15.428943","172.30.1.205","172.30.1.104","TCP","54","37686 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "32994","15.430310","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "32995","15.432866","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "32996","15.432875","172.30.1.205","172.30.1.104","TCP","54","37686 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "32997","15.433857","172.30.1.205","172.30.1.104","TCP","74","45052 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918660 TSecr=0 WS=128" "32998","15.434173","172.30.1.104","172.30.1.205","TCP","66","135 > 45052 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "32999","15.434184","172.30.1.205","172.30.1.104","TCP","54","45052 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33000","15.434533","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33001","15.434834","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33002","15.434843","172.30.1.205","172.30.1.104","TCP","54","45052 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33003","15.437057","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33004","15.437517","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33005","15.437524","172.30.1.205","172.30.1.104","TCP","54","45052 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33006","15.439375","172.30.1.205","172.30.1.104","TCP","54","45052 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33007","15.439492","172.30.1.205","172.30.1.104","TCP","74","37690 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918665 TSecr=0 WS=128" "33008","15.439635","172.30.1.104","172.30.1.205","TCP","54","135 > 45052 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33009","15.439647","172.30.1.104","172.30.1.205","TCP","54","135 > 45052 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33010","15.439653","172.30.1.205","172.30.1.104","TCP","54","45052 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33011","15.439760","172.30.1.104","172.30.1.205","TCP","66","49671 > 37690 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33012","15.439769","172.30.1.205","172.30.1.104","TCP","54","37690 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33013","15.440137","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33014","15.440404","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33015","15.440413","172.30.1.205","172.30.1.104","TCP","54","37690 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33016","15.442313","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33017","15.442711","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33018","15.442718","172.30.1.205","172.30.1.104","TCP","54","37690 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33019","15.444067","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33020","15.446848","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33021","15.446858","172.30.1.205","172.30.1.104","TCP","54","37690 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33022","15.447822","172.30.1.205","172.30.1.104","TCP","74","45056 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918674 TSecr=0 WS=128" "33023","15.448121","172.30.1.104","172.30.1.205","TCP","66","135 > 45056 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33024","15.448132","172.30.1.205","172.30.1.104","TCP","54","45056 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33025","15.448486","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33026","15.448770","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33027","15.448788","172.30.1.205","172.30.1.104","TCP","54","45056 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33028","15.450994","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33029","15.453774","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33030","15.453780","172.30.1.205","172.30.1.104","TCP","54","45056 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33031","15.455622","172.30.1.205","172.30.1.104","TCP","54","45056 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33032","15.455738","172.30.1.205","172.30.1.104","TCP","74","37694 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918682 TSecr=0 WS=128" "33033","15.455900","172.30.1.104","172.30.1.205","TCP","54","135 > 45056 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33034","15.455934","172.30.1.104","172.30.1.205","TCP","54","135 > 45056 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33035","15.455941","172.30.1.205","172.30.1.104","TCP","54","45056 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33036","15.456019","172.30.1.104","172.30.1.205","TCP","66","49671 > 37694 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33037","15.456027","172.30.1.205","172.30.1.104","TCP","54","37694 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33038","15.456381","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33039","15.456698","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33040","15.456707","172.30.1.205","172.30.1.104","TCP","54","37694 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33041","15.458603","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33042","15.458969","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33043","15.458976","172.30.1.205","172.30.1.104","TCP","54","37694 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33044","15.460333","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33045","15.463153","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33046","15.463164","172.30.1.205","172.30.1.104","TCP","54","37694 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33047","15.464161","172.30.1.205","172.30.1.104","TCP","74","45060 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918690 TSecr=0 WS=128" "33048","15.464524","172.30.1.104","172.30.1.205","TCP","66","135 > 45060 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33049","15.464535","172.30.1.205","172.30.1.104","TCP","54","45060 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33050","15.464922","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33051","15.465272","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33052","15.465281","172.30.1.205","172.30.1.104","TCP","54","45060 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33053","15.467485","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33054","15.467913","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33055","15.467920","172.30.1.205","172.30.1.104","TCP","54","45060 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33056","15.469783","172.30.1.205","172.30.1.104","TCP","54","45060 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33057","15.469900","172.30.1.205","172.30.1.104","TCP","74","37698 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918696 TSecr=0 WS=128" "33058","15.470127","172.30.1.104","172.30.1.205","TCP","54","135 > 45060 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33059","15.470137","172.30.1.104","172.30.1.205","TCP","54","135 > 45060 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33060","15.470144","172.30.1.205","172.30.1.104","TCP","54","45060 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33061","15.470248","172.30.1.104","172.30.1.205","TCP","66","49671 > 37698 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33062","15.470256","172.30.1.205","172.30.1.104","TCP","54","37698 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33063","15.470602","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33064","15.470898","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33065","15.470907","172.30.1.205","172.30.1.104","TCP","54","37698 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33066","15.472827","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33067","15.473222","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33068","15.473227","172.30.1.205","172.30.1.104","TCP","54","37698 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33069","15.474590","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33070","15.477435","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33071","15.477445","172.30.1.205","172.30.1.104","TCP","54","37698 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33072","15.478456","172.30.1.205","172.30.1.104","TCP","74","45064 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918704 TSecr=0 WS=128" "33073","15.478774","172.30.1.104","172.30.1.205","TCP","66","135 > 45064 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33074","15.478786","172.30.1.205","172.30.1.104","TCP","54","45064 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33075","15.479164","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33076","15.479462","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33077","15.479470","172.30.1.205","172.30.1.104","TCP","54","45064 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33078","15.481706","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33079","15.482103","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33080","15.482110","172.30.1.205","172.30.1.104","TCP","54","45064 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33081","15.482975","172.30.1.205","172.30.1.104","TCP","54","37658 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33082","15.483026","172.30.1.205","172.30.1.104","TCP","54","37662 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33083","15.483064","172.30.1.205","172.30.1.104","TCP","54","37666 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33084","15.483092","172.30.1.205","172.30.1.104","TCP","54","37670 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33085","15.483121","172.30.1.205","172.30.1.104","TCP","54","37674 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33086","15.483153","172.30.1.205","172.30.1.104","TCP","54","37678 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33087","15.483180","172.30.1.205","172.30.1.104","TCP","54","37682 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33088","15.483208","172.30.1.205","172.30.1.104","TCP","54","37686 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33089","15.483235","172.30.1.205","172.30.1.104","TCP","54","37690 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33090","15.483262","172.30.1.205","172.30.1.104","TCP","54","37694 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33091","15.483289","172.30.1.205","172.30.1.104","TCP","54","37698 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33092","15.483358","172.30.1.205","172.30.1.104","TCP","54","37654 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33093","15.483389","172.30.1.104","172.30.1.205","TCP","54","49671 > 37658 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33094","15.483417","172.30.1.104","172.30.1.205","TCP","54","49671 > 37662 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33095","15.483437","172.30.1.104","172.30.1.205","TCP","54","49671 > 37658 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33096","15.483445","172.30.1.205","172.30.1.104","TCP","54","37658 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33097","15.483457","172.30.1.104","172.30.1.205","TCP","54","49671 > 37666 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33098","15.483478","172.30.1.104","172.30.1.205","TCP","54","49671 > 37670 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33099","15.483500","172.30.1.104","172.30.1.205","TCP","54","49671 > 37674 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33100","15.483522","172.30.1.104","172.30.1.205","TCP","54","49671 > 37674 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33101","15.483527","172.30.1.205","172.30.1.104","TCP","54","37674 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33102","15.483540","172.30.1.104","172.30.1.205","TCP","54","49671 > 37678 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33103","15.483656","172.30.1.104","172.30.1.205","TCP","54","49671 > 37682 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33104","15.483687","172.30.1.104","172.30.1.205","TCP","54","49671 > 37670 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33105","15.483692","172.30.1.205","172.30.1.104","TCP","54","37670 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33106","15.483708","172.30.1.104","172.30.1.205","TCP","54","49671 > 37682 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33107","15.483711","172.30.1.205","172.30.1.104","TCP","54","37682 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33108","15.483732","172.30.1.104","172.30.1.205","TCP","54","49671 > 37678 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33109","15.483736","172.30.1.205","172.30.1.104","TCP","54","37678 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33110","15.483765","172.30.1.104","172.30.1.205","TCP","54","49671 > 37662 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33111","15.483769","172.30.1.205","172.30.1.104","TCP","54","37662 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33112","15.483795","172.30.1.104","172.30.1.205","TCP","54","49671 > 37666 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33113","15.483798","172.30.1.205","172.30.1.104","TCP","54","37666 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33114","15.483822","172.30.1.104","172.30.1.205","TCP","54","49671 > 37686 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33115","15.483853","172.30.1.104","172.30.1.205","TCP","54","49671 > 37690 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33116","15.483878","172.30.1.104","172.30.1.205","TCP","54","49671 > 37694 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33117","15.484045","172.30.1.104","172.30.1.205","TCP","54","49671 > 37686 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33118","15.484050","172.30.1.205","172.30.1.104","TCP","54","37686 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33119","15.484077","172.30.1.104","172.30.1.205","TCP","54","49671 > 37698 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33120","15.484097","172.30.1.104","172.30.1.205","TCP","54","49671 > 37698 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33121","15.484101","172.30.1.205","172.30.1.104","TCP","54","37698 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33122","15.484119","172.30.1.104","172.30.1.205","TCP","54","49671 > 37690 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33123","15.484123","172.30.1.205","172.30.1.104","TCP","54","37690 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33124","15.484144","172.30.1.104","172.30.1.205","TCP","54","49671 > 37694 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33125","15.484148","172.30.1.205","172.30.1.104","TCP","54","37694 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33126","15.484170","172.30.1.104","172.30.1.205","TCP","54","49671 > 37654 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33127","15.484262","172.30.1.104","172.30.1.205","TCP","54","49671 > 37654 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33128","15.484266","172.30.1.205","172.30.1.104","TCP","54","37654 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33129","15.485017","172.30.1.205","172.30.1.104","TCP","54","45064 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33130","15.485143","172.30.1.205","172.30.1.104","TCP","74","37702 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918711 TSecr=0 WS=128" "33131","15.485281","172.30.1.104","172.30.1.205","TCP","54","135 > 45064 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33132","15.485301","172.30.1.104","172.30.1.205","TCP","54","135 > 45064 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33133","15.485307","172.30.1.205","172.30.1.104","TCP","54","45064 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33134","15.485429","172.30.1.104","172.30.1.205","TCP","66","49671 > 37702 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33135","15.485437","172.30.1.205","172.30.1.104","TCP","54","37702 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33136","15.485792","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33137","15.486077","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33138","15.486086","172.30.1.205","172.30.1.104","TCP","54","37702 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33139","15.487995","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33140","15.488391","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33141","15.488397","172.30.1.205","172.30.1.104","TCP","54","37702 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33142","15.489802","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33143","15.492568","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33144","15.492577","172.30.1.205","172.30.1.104","TCP","54","37702 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33145","15.493609","172.30.1.205","172.30.1.104","TCP","74","45068 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918720 TSecr=0 WS=128" "33146","15.493926","172.30.1.104","172.30.1.205","TCP","66","135 > 45068 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33147","15.493938","172.30.1.205","172.30.1.104","TCP","54","45068 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33148","15.494298","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33149","15.494588","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33150","15.494597","172.30.1.205","172.30.1.104","TCP","54","45068 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33151","15.496821","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33152","15.497304","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33153","15.497311","172.30.1.205","172.30.1.104","TCP","54","45068 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33154","15.499131","172.30.1.205","172.30.1.104","TCP","54","45068 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33155","15.499247","172.30.1.205","172.30.1.104","TCP","74","37706 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918725 TSecr=0 WS=128" "33156","15.499401","172.30.1.104","172.30.1.205","TCP","54","135 > 45068 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33157","15.499423","172.30.1.104","172.30.1.205","TCP","54","135 > 45068 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33158","15.499430","172.30.1.205","172.30.1.104","TCP","54","45068 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33159","15.499671","172.30.1.104","172.30.1.205","TCP","66","49671 > 37706 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33160","15.499679","172.30.1.205","172.30.1.104","TCP","54","37706 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33161","15.500035","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33162","15.500334","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33163","15.500343","172.30.1.205","172.30.1.104","TCP","54","37706 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33164","15.502234","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33165","15.502609","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33166","15.502616","172.30.1.205","172.30.1.104","TCP","54","37706 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33167","15.503962","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33168","15.506754","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33169","15.506765","172.30.1.205","172.30.1.104","TCP","54","37706 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33170","15.507740","172.30.1.205","172.30.1.104","TCP","74","45072 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918734 TSecr=0 WS=128" "33171","15.508038","172.30.1.104","172.30.1.205","TCP","66","135 > 45072 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33172","15.508049","172.30.1.205","172.30.1.104","TCP","54","45072 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33173","15.508405","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33174","15.508713","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33175","15.508722","172.30.1.205","172.30.1.104","TCP","54","45072 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33176","15.510954","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33177","15.511366","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33178","15.511374","172.30.1.205","172.30.1.104","TCP","54","45072 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33179","15.513234","172.30.1.205","172.30.1.104","TCP","54","45072 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33180","15.513352","172.30.1.205","172.30.1.104","TCP","74","37710 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918739 TSecr=0 WS=128" "33181","15.513506","172.30.1.104","172.30.1.205","TCP","54","135 > 45072 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33182","15.513557","172.30.1.104","172.30.1.205","TCP","54","135 > 45072 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33183","15.513563","172.30.1.205","172.30.1.104","TCP","54","45072 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33184","15.513656","172.30.1.104","172.30.1.205","TCP","66","49671 > 37710 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33185","15.513664","172.30.1.205","172.30.1.104","TCP","54","37710 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33186","15.514007","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33187","15.514304","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33188","15.514313","172.30.1.205","172.30.1.104","TCP","54","37710 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33189","15.516213","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33190","15.516588","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33191","15.516594","172.30.1.205","172.30.1.104","TCP","54","37710 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33192","15.517979","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33193","15.520793","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33194","15.520803","172.30.1.205","172.30.1.104","TCP","54","37710 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33195","15.521799","172.30.1.205","172.30.1.104","TCP","74","45076 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918748 TSecr=0 WS=128" "33196","15.522169","172.30.1.104","172.30.1.205","TCP","66","135 > 45076 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33197","15.522182","172.30.1.205","172.30.1.104","TCP","54","45076 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33198","15.522549","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33199","15.522860","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33200","15.522868","172.30.1.205","172.30.1.104","TCP","54","45076 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33201","15.525122","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33202","15.525521","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33203","15.525528","172.30.1.205","172.30.1.104","TCP","54","45076 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33204","15.527363","172.30.1.205","172.30.1.104","TCP","54","45076 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33205","15.527488","172.30.1.205","172.30.1.104","TCP","74","37714 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918753 TSecr=0 WS=128" "33206","15.527644","172.30.1.104","172.30.1.205","TCP","54","135 > 45076 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33207","15.527664","172.30.1.104","172.30.1.205","TCP","54","135 > 45076 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33208","15.527670","172.30.1.205","172.30.1.104","TCP","54","45076 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33209","15.527782","172.30.1.104","172.30.1.205","TCP","66","49671 > 37714 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33210","15.527790","172.30.1.205","172.30.1.104","TCP","54","37714 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33211","15.528141","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33212","15.528439","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33213","15.528447","172.30.1.205","172.30.1.104","TCP","54","37714 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33214","15.530376","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33215","15.530752","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33216","15.530760","172.30.1.205","172.30.1.104","TCP","54","37714 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33217","15.532153","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33218","15.534950","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33219","15.534961","172.30.1.205","172.30.1.104","TCP","54","37714 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33220","15.535952","172.30.1.205","172.30.1.104","TCP","74","45080 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918762 TSecr=0 WS=128" "33221","15.536264","172.30.1.104","172.30.1.205","TCP","66","135 > 45080 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33222","15.536276","172.30.1.205","172.30.1.104","TCP","54","45080 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33223","15.536626","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33224","15.536915","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33225","15.536925","172.30.1.205","172.30.1.104","TCP","54","45080 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33226","15.539136","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33227","15.539605","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33228","15.539612","172.30.1.205","172.30.1.104","TCP","54","45080 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33229","15.541475","172.30.1.205","172.30.1.104","TCP","54","45080 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33230","15.541604","172.30.1.205","172.30.1.104","TCP","74","37718 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918768 TSecr=0 WS=128" "33231","15.541743","172.30.1.104","172.30.1.205","TCP","54","135 > 45080 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33232","15.541780","172.30.1.104","172.30.1.205","TCP","54","135 > 45080 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33233","15.541787","172.30.1.205","172.30.1.104","TCP","54","45080 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33234","15.541913","172.30.1.104","172.30.1.205","TCP","66","49671 > 37718 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33235","15.541922","172.30.1.205","172.30.1.104","TCP","54","37718 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33236","15.542266","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33237","15.542571","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33238","15.542580","172.30.1.205","172.30.1.104","TCP","54","37718 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33239","15.544464","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33240","15.544854","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33241","15.544861","172.30.1.205","172.30.1.104","TCP","54","37718 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33242","15.546250","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33243","15.548917","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33244","15.548927","172.30.1.205","172.30.1.104","TCP","54","37718 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33245","15.549912","172.30.1.205","172.30.1.104","TCP","74","45084 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918776 TSecr=0 WS=128" "33246","15.550216","172.30.1.104","172.30.1.205","TCP","66","135 > 45084 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33247","15.550227","172.30.1.205","172.30.1.104","TCP","54","45084 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33248","15.550577","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33249","15.550870","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33250","15.550880","172.30.1.205","172.30.1.104","TCP","54","45084 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33251","15.553113","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33252","15.553513","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33253","15.553520","172.30.1.205","172.30.1.104","TCP","54","45084 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33254","15.555347","172.30.1.205","172.30.1.104","TCP","54","45084 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33255","15.555463","172.30.1.205","172.30.1.104","TCP","74","37722 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918781 TSecr=0 WS=128" "33256","15.555665","172.30.1.104","172.30.1.205","TCP","54","135 > 45084 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33257","15.555702","172.30.1.104","172.30.1.205","TCP","54","135 > 45084 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33258","15.555708","172.30.1.205","172.30.1.104","TCP","54","45084 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33259","15.555732","172.30.1.104","172.30.1.205","TCP","66","49671 > 37722 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33260","15.555741","172.30.1.205","172.30.1.104","TCP","54","37722 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33261","15.556085","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33262","15.557587","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33263","15.557596","172.30.1.205","172.30.1.104","TCP","54","37722 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33264","15.559485","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33265","15.559862","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33266","15.559868","172.30.1.205","172.30.1.104","TCP","54","37722 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33267","15.561262","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33268","15.563928","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33269","15.563938","172.30.1.205","172.30.1.104","TCP","54","37722 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33270","15.564925","172.30.1.205","172.30.1.104","TCP","74","45088 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918791 TSecr=0 WS=128" "33271","15.565239","172.30.1.104","172.30.1.205","TCP","66","135 > 45088 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33272","15.565250","172.30.1.205","172.30.1.104","TCP","54","45088 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33273","15.565607","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33274","15.565928","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33275","15.565937","172.30.1.205","172.30.1.104","TCP","54","45088 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33276","15.568146","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33277","15.568554","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33278","15.568560","172.30.1.205","172.30.1.104","TCP","54","45088 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33279","15.570403","172.30.1.205","172.30.1.104","TCP","54","45088 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33280","15.570518","172.30.1.205","172.30.1.104","TCP","74","37726 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918796 TSecr=0 WS=128" "33281","15.570670","172.30.1.104","172.30.1.205","TCP","54","135 > 45088 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33282","15.570682","172.30.1.104","172.30.1.205","TCP","54","135 > 45088 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33283","15.570688","172.30.1.205","172.30.1.104","TCP","54","45088 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33284","15.570812","172.30.1.104","172.30.1.205","TCP","66","49671 > 37726 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33285","15.570821","172.30.1.205","172.30.1.104","TCP","54","37726 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33286","15.571175","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33287","15.571471","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33288","15.571479","172.30.1.205","172.30.1.104","TCP","54","37726 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33289","15.573402","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33290","15.573772","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33291","15.573778","172.30.1.205","172.30.1.104","TCP","54","37726 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33292","15.575139","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33293","15.577866","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33294","15.577875","172.30.1.205","172.30.1.104","TCP","54","37726 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33295","15.578839","172.30.1.205","172.30.1.104","TCP","74","45092 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918805 TSecr=0 WS=128" "33296","15.579123","172.30.1.104","172.30.1.205","TCP","66","135 > 45092 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33297","15.579134","172.30.1.205","172.30.1.104","TCP","54","45092 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33298","15.579484","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33299","15.579791","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33300","15.579800","172.30.1.205","172.30.1.104","TCP","54","45092 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33301","15.582027","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33302","15.582440","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33303","15.582447","172.30.1.205","172.30.1.104","TCP","54","45092 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33304","15.584258","172.30.1.205","172.30.1.104","TCP","54","45092 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33305","15.584369","172.30.1.205","172.30.1.104","TCP","74","37730 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918810 TSecr=0 WS=128" "33306","15.584539","172.30.1.104","172.30.1.205","TCP","54","135 > 45092 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33307","15.584581","172.30.1.104","172.30.1.205","TCP","54","135 > 45092 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33308","15.584587","172.30.1.205","172.30.1.104","TCP","54","45092 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33309","15.584669","172.30.1.104","172.30.1.205","TCP","66","49671 > 37730 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33310","15.584678","172.30.1.205","172.30.1.104","TCP","54","37730 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33311","15.585053","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33312","15.585356","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33313","15.585365","172.30.1.205","172.30.1.104","TCP","54","37730 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33314","15.587255","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33315","15.587630","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33316","15.587637","172.30.1.205","172.30.1.104","TCP","54","37730 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33317","15.589021","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33318","15.591827","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33319","15.591837","172.30.1.205","172.30.1.104","TCP","54","37730 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33320","15.592771","172.30.1.205","172.30.1.104","TCP","74","45096 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918819 TSecr=0 WS=128" "33321","15.593071","172.30.1.104","172.30.1.205","TCP","66","135 > 45096 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33322","15.593081","172.30.1.205","172.30.1.104","TCP","54","45096 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33323","15.593439","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33324","15.593762","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33325","15.593771","172.30.1.205","172.30.1.104","TCP","54","45096 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33326","15.596002","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33327","15.596407","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33328","15.596414","172.30.1.205","172.30.1.104","TCP","54","45096 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33329","15.598247","172.30.1.205","172.30.1.104","TCP","54","45096 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33330","15.598357","172.30.1.205","172.30.1.104","TCP","74","37734 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918824 TSecr=0 WS=128" "33331","15.598522","172.30.1.104","172.30.1.205","TCP","54","135 > 45096 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33332","15.598566","172.30.1.104","172.30.1.205","TCP","54","135 > 45096 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33333","15.598572","172.30.1.205","172.30.1.104","TCP","54","45096 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33334","15.598646","172.30.1.104","172.30.1.205","TCP","66","49671 > 37734 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33335","15.598654","172.30.1.205","172.30.1.104","TCP","54","37734 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33336","15.599003","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33337","15.599283","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33338","15.599290","172.30.1.205","172.30.1.104","TCP","54","37734 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33339","15.601174","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33340","15.601545","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33341","15.601551","172.30.1.205","172.30.1.104","TCP","54","37734 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33342","15.602896","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33343","15.605558","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33344","15.605569","172.30.1.205","172.30.1.104","TCP","54","37734 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33345","15.606528","172.30.1.205","172.30.1.104","TCP","74","45100 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918832 TSecr=0 WS=128" "33346","15.606815","172.30.1.104","172.30.1.205","TCP","66","135 > 45100 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33347","15.606825","172.30.1.205","172.30.1.104","TCP","54","45100 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33348","15.607174","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33349","15.607513","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33350","15.607522","172.30.1.205","172.30.1.104","TCP","54","45100 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33351","15.609740","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33352","15.610138","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33353","15.610145","172.30.1.205","172.30.1.104","TCP","54","45100 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33354","15.611958","172.30.1.205","172.30.1.104","TCP","54","45100 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33355","15.612070","172.30.1.205","172.30.1.104","TCP","74","37738 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918838 TSecr=0 WS=128" "33356","15.612219","172.30.1.104","172.30.1.205","TCP","54","135 > 45100 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33357","15.612234","172.30.1.104","172.30.1.205","TCP","54","135 > 45100 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33358","15.612239","172.30.1.205","172.30.1.104","TCP","54","45100 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33359","15.612353","172.30.1.104","172.30.1.205","TCP","66","49671 > 37738 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33360","15.612362","172.30.1.205","172.30.1.104","TCP","54","37738 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33361","15.612707","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33362","15.612985","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33363","15.612991","172.30.1.205","172.30.1.104","TCP","54","37738 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33364","15.614875","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33365","15.615259","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33366","15.615266","172.30.1.205","172.30.1.104","TCP","54","37738 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33367","15.616614","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33368","15.619332","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33369","15.619341","172.30.1.205","172.30.1.104","TCP","54","37738 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33370","15.620282","172.30.1.205","172.30.1.104","TCP","74","45104 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918846 TSecr=0 WS=128" "33371","15.620602","172.30.1.104","172.30.1.205","TCP","66","135 > 45104 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33372","15.620612","172.30.1.205","172.30.1.104","TCP","54","45104 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33373","15.620995","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33374","15.621343","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33375","15.621352","172.30.1.205","172.30.1.104","TCP","54","45104 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33376","15.623552","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33377","15.623958","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33378","15.623964","172.30.1.205","172.30.1.104","TCP","54","45104 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33379","15.625808","172.30.1.205","172.30.1.104","TCP","54","45104 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33380","15.625918","172.30.1.205","172.30.1.104","TCP","74","37742 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918852 TSecr=0 WS=128" "33381","15.626087","172.30.1.104","172.30.1.205","TCP","54","135 > 45104 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33382","15.626108","172.30.1.104","172.30.1.205","TCP","54","135 > 45104 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33383","15.626114","172.30.1.205","172.30.1.104","TCP","54","45104 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33384","15.626254","172.30.1.104","172.30.1.205","TCP","66","49671 > 37742 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33385","15.626263","172.30.1.205","172.30.1.104","TCP","54","37742 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33386","15.626618","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33387","15.626907","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33388","15.626916","172.30.1.205","172.30.1.104","TCP","54","37742 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33389","15.628836","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33390","15.629240","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33391","15.629246","172.30.1.205","172.30.1.104","TCP","54","37742 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33392","15.630592","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33393","15.633321","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33394","15.633331","172.30.1.205","172.30.1.104","TCP","54","37742 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33395","15.634276","172.30.1.205","172.30.1.104","TCP","74","45108 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918860 TSecr=0 WS=128" "33396","15.634632","172.30.1.104","172.30.1.205","TCP","66","135 > 45108 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33397","15.634642","172.30.1.205","172.30.1.104","TCP","54","45108 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33398","15.634994","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33399","15.635274","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33400","15.635282","172.30.1.205","172.30.1.104","TCP","54","45108 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33401","15.637501","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33402","15.637882","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33403","15.637888","172.30.1.205","172.30.1.104","TCP","54","45108 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33404","15.639710","172.30.1.205","172.30.1.104","TCP","54","45108 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33405","15.639822","172.30.1.205","172.30.1.104","TCP","74","37746 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918866 TSecr=0 WS=128" "33406","15.640077","172.30.1.104","172.30.1.205","TCP","54","135 > 45108 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33407","15.640092","172.30.1.104","172.30.1.205","TCP","54","135 > 45108 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33408","15.640100","172.30.1.205","172.30.1.104","TCP","54","45108 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33409","15.640111","172.30.1.104","172.30.1.205","TCP","66","49671 > 37746 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33410","15.640127","172.30.1.205","172.30.1.104","TCP","54","37746 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33411","15.640542","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33412","15.640856","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33413","15.640865","172.30.1.205","172.30.1.104","TCP","54","37746 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33414","15.642780","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33415","15.643196","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33416","15.643202","172.30.1.205","172.30.1.104","TCP","54","37746 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33417","15.644555","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33418","15.647242","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33419","15.647251","172.30.1.205","172.30.1.104","TCP","54","37746 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33420","15.648210","172.30.1.205","172.30.1.104","TCP","74","45112 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918874 TSecr=0 WS=128" "33421","15.648497","172.30.1.104","172.30.1.205","TCP","66","135 > 45112 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33422","15.648508","172.30.1.205","172.30.1.104","TCP","54","45112 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33423","15.648877","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33424","15.649183","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33425","15.649200","172.30.1.205","172.30.1.104","TCP","54","45112 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33426","15.651543","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33427","15.651936","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33428","15.651942","172.30.1.205","172.30.1.104","TCP","54","45112 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33429","15.652801","172.30.1.205","172.30.1.104","TCP","54","37706 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33430","15.652848","172.30.1.205","172.30.1.104","TCP","54","37710 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33431","15.652885","172.30.1.205","172.30.1.104","TCP","54","37714 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33432","15.652918","172.30.1.205","172.30.1.104","TCP","54","37718 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33433","15.652946","172.30.1.205","172.30.1.104","TCP","54","37722 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33434","15.652977","172.30.1.205","172.30.1.104","TCP","54","37726 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33435","15.653003","172.30.1.205","172.30.1.104","TCP","54","37730 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33436","15.653024","172.30.1.205","172.30.1.104","TCP","54","37734 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33437","15.653042","172.30.1.104","172.30.1.205","TCP","54","49671 > 37706 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33438","15.653074","172.30.1.205","172.30.1.104","TCP","54","37738 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33439","15.653108","172.30.1.205","172.30.1.104","TCP","54","37742 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33440","15.653138","172.30.1.205","172.30.1.104","TCP","54","37746 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33441","15.653179","172.30.1.104","172.30.1.205","TCP","54","49671 > 37710 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33442","15.653200","172.30.1.104","172.30.1.205","TCP","54","49671 > 37706 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33443","15.653206","172.30.1.205","172.30.1.104","TCP","54","37706 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33444","15.653220","172.30.1.104","172.30.1.205","TCP","54","49671 > 37710 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33445","15.653222","172.30.1.205","172.30.1.104","TCP","54","37710 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33446","15.653240","172.30.1.104","172.30.1.205","TCP","54","49671 > 37714 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33447","15.653256","172.30.1.205","172.30.1.104","TCP","54","37702 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33448","15.653262","172.30.1.104","172.30.1.205","TCP","54","49671 > 37718 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33449","15.653374","172.30.1.104","172.30.1.205","TCP","54","49671 > 37722 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33450","15.653392","172.30.1.104","172.30.1.205","TCP","54","49671 > 37726 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33451","15.653412","172.30.1.104","172.30.1.205","TCP","54","49671 > 37714 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33452","15.653417","172.30.1.205","172.30.1.104","TCP","54","37714 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33453","15.653433","172.30.1.104","172.30.1.205","TCP","54","49671 > 37726 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33454","15.653436","172.30.1.205","172.30.1.104","TCP","54","37726 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33455","15.653456","172.30.1.104","172.30.1.205","TCP","54","49671 > 37718 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33456","15.653459","172.30.1.205","172.30.1.104","TCP","54","37718 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33457","15.653476","172.30.1.104","172.30.1.205","TCP","54","49671 > 37722 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33458","15.653479","172.30.1.205","172.30.1.104","TCP","54","37722 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33459","15.653497","172.30.1.104","172.30.1.205","TCP","54","49671 > 37730 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33460","15.653517","172.30.1.104","172.30.1.205","TCP","54","49671 > 37734 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33461","15.653539","172.30.1.104","172.30.1.205","TCP","54","49671 > 37738 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33462","15.653647","172.30.1.104","172.30.1.205","TCP","54","49671 > 37730 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33463","15.653652","172.30.1.205","172.30.1.104","TCP","54","37730 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33464","15.653666","172.30.1.104","172.30.1.205","TCP","54","49671 > 37742 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33465","15.653690","172.30.1.104","172.30.1.205","TCP","54","49671 > 37742 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33466","15.653693","172.30.1.205","172.30.1.104","TCP","54","37742 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33467","15.653711","172.30.1.104","172.30.1.205","TCP","54","49671 > 37734 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33468","15.653714","172.30.1.205","172.30.1.104","TCP","54","37734 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33469","15.653730","172.30.1.104","172.30.1.205","TCP","54","49671 > 37738 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33470","15.653733","172.30.1.205","172.30.1.104","TCP","54","37738 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33471","15.653754","172.30.1.104","172.30.1.205","TCP","54","49671 > 37746 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33472","15.653860","172.30.1.104","172.30.1.205","TCP","54","49671 > 37702 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33473","15.653881","172.30.1.104","172.30.1.205","TCP","54","49671 > 37746 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33474","15.653885","172.30.1.205","172.30.1.104","TCP","54","37746 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33475","15.653902","172.30.1.104","172.30.1.205","TCP","54","49671 > 37702 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33476","15.653905","172.30.1.205","172.30.1.104","TCP","54","37702 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33477","15.654747","172.30.1.205","172.30.1.104","TCP","54","45112 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33478","15.654859","172.30.1.205","172.30.1.104","TCP","74","37750 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918881 TSecr=0 WS=128" "33479","15.655045","172.30.1.104","172.30.1.205","TCP","54","135 > 45112 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33480","15.655058","172.30.1.104","172.30.1.205","TCP","54","135 > 45112 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33481","15.655063","172.30.1.205","172.30.1.104","TCP","54","45112 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33482","15.655140","172.30.1.104","172.30.1.205","TCP","66","49671 > 37750 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33483","15.655148","172.30.1.205","172.30.1.104","TCP","54","37750 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33484","15.655514","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33485","15.656390","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33486","15.656401","172.30.1.205","172.30.1.104","TCP","54","37750 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33487","15.658321","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33488","15.658703","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33489","15.658709","172.30.1.205","172.30.1.104","TCP","54","37750 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33490","15.660061","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33491","15.662775","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33492","15.662785","172.30.1.205","172.30.1.104","TCP","54","37750 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33493","15.663723","172.30.1.205","172.30.1.104","TCP","74","45116 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918890 TSecr=0 WS=128" "33494","15.664014","172.30.1.104","172.30.1.205","TCP","66","135 > 45116 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33495","15.664024","172.30.1.205","172.30.1.104","TCP","54","45116 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33496","15.664376","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33497","15.664689","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33498","15.664697","172.30.1.205","172.30.1.104","TCP","54","45116 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33499","15.666904","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33500","15.667310","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33501","15.667316","172.30.1.205","172.30.1.104","TCP","54","45116 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33502","15.669151","172.30.1.205","172.30.1.104","TCP","54","45116 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33503","15.669259","172.30.1.205","172.30.1.104","TCP","74","37754 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918895 TSecr=0 WS=128" "33504","15.669410","172.30.1.104","172.30.1.205","TCP","54","135 > 45116 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33505","15.669420","172.30.1.104","172.30.1.205","TCP","54","135 > 45116 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33506","15.669425","172.30.1.205","172.30.1.104","TCP","54","45116 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33507","15.669544","172.30.1.104","172.30.1.205","TCP","66","49671 > 37754 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33508","15.669552","172.30.1.205","172.30.1.104","TCP","54","37754 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33509","15.669891","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33510","15.670196","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33511","15.670205","172.30.1.205","172.30.1.104","TCP","54","37754 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33512","15.672061","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33513","15.672459","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33514","15.672475","172.30.1.205","172.30.1.104","TCP","54","37754 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33515","15.673841","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33516","15.676519","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33517","15.676528","172.30.1.205","172.30.1.104","TCP","54","37754 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33518","15.677477","172.30.1.205","172.30.1.104","TCP","74","45120 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918903 TSecr=0 WS=128" "33519","15.677777","172.30.1.104","172.30.1.205","TCP","66","135 > 45120 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33520","15.677788","172.30.1.205","172.30.1.104","TCP","54","45120 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33521","15.678131","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33522","15.678409","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33523","15.678417","172.30.1.205","172.30.1.104","TCP","54","45120 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33524","15.680602","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33525","15.680991","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33526","15.680998","172.30.1.205","172.30.1.104","TCP","54","45120 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33527","15.682818","172.30.1.205","172.30.1.104","TCP","54","45120 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33528","15.682928","172.30.1.205","172.30.1.104","TCP","74","37758 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918909 TSecr=0 WS=128" "33529","15.683105","172.30.1.104","172.30.1.205","TCP","54","135 > 45120 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33530","15.683129","172.30.1.104","172.30.1.205","TCP","54","135 > 45120 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33531","15.683135","172.30.1.205","172.30.1.104","TCP","54","45120 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33532","15.683223","172.30.1.104","172.30.1.205","TCP","66","49671 > 37758 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33533","15.683231","172.30.1.205","172.30.1.104","TCP","54","37758 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33534","15.683574","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33535","15.683871","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33536","15.683879","172.30.1.205","172.30.1.104","TCP","54","37758 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33537","15.685792","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33538","15.686146","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33539","15.686153","172.30.1.205","172.30.1.104","TCP","54","37758 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33540","15.687493","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33541","15.690228","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33542","15.690239","172.30.1.205","172.30.1.104","TCP","54","37758 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33543","15.691205","172.30.1.205","172.30.1.104","TCP","74","45124 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918917 TSecr=0 WS=128" "33544","15.691535","172.30.1.104","172.30.1.205","TCP","66","135 > 45124 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33545","15.691546","172.30.1.205","172.30.1.104","TCP","54","45124 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33546","15.691896","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33547","15.692191","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33548","15.692200","172.30.1.205","172.30.1.104","TCP","54","45124 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33549","15.694407","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33550","15.695128","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33551","15.695135","172.30.1.205","172.30.1.104","TCP","54","45124 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33552","15.696978","172.30.1.205","172.30.1.104","TCP","54","45124 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33553","15.697087","172.30.1.205","172.30.1.104","TCP","74","37762 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918923 TSecr=0 WS=128" "33554","15.697238","172.30.1.104","172.30.1.205","TCP","54","135 > 45124 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33555","15.697247","172.30.1.104","172.30.1.205","TCP","54","135 > 45124 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33556","15.697253","172.30.1.205","172.30.1.104","TCP","54","45124 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33557","15.697339","172.30.1.104","172.30.1.205","TCP","66","49671 > 37762 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33558","15.697348","172.30.1.205","172.30.1.104","TCP","54","37762 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33559","15.697696","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33560","15.697976","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33561","15.697984","172.30.1.205","172.30.1.104","TCP","54","37762 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33562","15.699848","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33563","15.700227","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33564","15.700234","172.30.1.205","172.30.1.104","TCP","54","37762 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33565","15.701613","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33566","15.704392","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33567","15.704401","172.30.1.205","172.30.1.104","TCP","54","37762 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33568","15.705362","172.30.1.205","172.30.1.104","TCP","74","45128 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918931 TSecr=0 WS=128" "33569","15.705669","172.30.1.104","172.30.1.205","TCP","66","135 > 45128 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33570","15.705679","172.30.1.205","172.30.1.104","TCP","54","45128 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33571","15.706033","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33572","15.706331","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33573","15.706340","172.30.1.205","172.30.1.104","TCP","54","45128 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33574","15.708511","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33575","15.708880","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33576","15.708887","172.30.1.205","172.30.1.104","TCP","54","45128 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33577","15.710716","172.30.1.205","172.30.1.104","TCP","54","45128 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33578","15.710836","172.30.1.205","172.30.1.104","TCP","74","37766 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918937 TSecr=0 WS=128" "33579","15.711009","172.30.1.104","172.30.1.205","TCP","54","135 > 45128 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33580","15.711022","172.30.1.104","172.30.1.205","TCP","54","135 > 45128 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33581","15.711028","172.30.1.205","172.30.1.104","TCP","54","45128 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33582","15.711106","172.30.1.104","172.30.1.205","TCP","66","49671 > 37766 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33583","15.711114","172.30.1.205","172.30.1.104","TCP","54","37766 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33584","15.711456","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33585","15.712344","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33586","15.712351","172.30.1.205","172.30.1.104","TCP","54","37766 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33587","15.714237","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33588","15.714651","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33589","15.714657","172.30.1.205","172.30.1.104","TCP","54","37766 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33590","15.716005","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33591","15.718787","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33592","15.718796","172.30.1.205","172.30.1.104","TCP","54","37766 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33593","15.719738","172.30.1.205","172.30.1.104","TCP","74","45132 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918946 TSecr=0 WS=128" "33594","15.720063","172.30.1.104","172.30.1.205","TCP","66","135 > 45132 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33595","15.720073","172.30.1.205","172.30.1.104","TCP","54","45132 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33596","15.720420","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33597","15.720704","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33598","15.720713","172.30.1.205","172.30.1.104","TCP","54","45132 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33599","15.722900","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33600","15.723277","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33601","15.723283","172.30.1.205","172.30.1.104","TCP","54","45132 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33602","15.725117","172.30.1.205","172.30.1.104","TCP","54","45132 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33603","15.725231","172.30.1.205","172.30.1.104","TCP","74","37770 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918951 TSecr=0 WS=128" "33604","15.725417","172.30.1.104","172.30.1.205","TCP","54","135 > 45132 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33605","15.725442","172.30.1.104","172.30.1.205","TCP","54","135 > 45132 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33606","15.725449","172.30.1.205","172.30.1.104","TCP","54","45132 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33607","15.725561","172.30.1.104","172.30.1.205","TCP","66","49671 > 37770 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33608","15.725570","172.30.1.205","172.30.1.104","TCP","54","37770 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33609","15.725912","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33610","15.726200","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33611","15.726209","172.30.1.205","172.30.1.104","TCP","54","37770 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33612","15.728082","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33613","15.728452","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33614","15.728458","172.30.1.205","172.30.1.104","TCP","54","37770 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33615","15.729833","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33616","15.732822","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33617","15.732832","172.30.1.205","172.30.1.104","TCP","54","37770 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33618","15.733803","172.30.1.205","172.30.1.104","TCP","74","45136 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918960 TSecr=0 WS=128" "33619","15.734101","172.30.1.104","172.30.1.205","TCP","66","135 > 45136 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33620","15.734111","172.30.1.205","172.30.1.104","TCP","54","45136 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33621","15.734458","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33622","15.734726","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33623","15.734735","172.30.1.205","172.30.1.104","TCP","54","45136 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33624","15.736940","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33625","15.737352","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33626","15.737358","172.30.1.205","172.30.1.104","TCP","54","45136 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33627","15.739168","172.30.1.205","172.30.1.104","TCP","54","45136 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33628","15.739286","172.30.1.205","172.30.1.104","TCP","74","37774 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918965 TSecr=0 WS=128" "33629","15.739436","172.30.1.104","172.30.1.205","TCP","54","135 > 45136 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33630","15.739448","172.30.1.104","172.30.1.205","TCP","54","135 > 45136 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33631","15.739454","172.30.1.205","172.30.1.104","TCP","54","45136 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33632","15.739581","172.30.1.104","172.30.1.205","TCP","66","49671 > 37774 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33633","15.739590","172.30.1.205","172.30.1.104","TCP","54","37774 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33634","15.739929","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33635","15.740216","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33636","15.740224","172.30.1.205","172.30.1.104","TCP","54","37774 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33637","15.742121","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33638","15.742481","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33639","15.742486","172.30.1.205","172.30.1.104","TCP","54","37774 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33640","15.743832","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33641","15.746758","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33642","15.746769","172.30.1.205","172.30.1.104","TCP","54","37774 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33643","15.747727","172.30.1.205","172.30.1.104","TCP","74","45140 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918974 TSecr=0 WS=128" "33644","15.748017","172.30.1.104","172.30.1.205","TCP","66","135 > 45140 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33645","15.748027","172.30.1.205","172.30.1.104","TCP","54","45140 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33646","15.748370","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33647","15.748656","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33648","15.748664","172.30.1.205","172.30.1.104","TCP","54","45140 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33649","15.750858","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33650","15.751266","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33651","15.751276","172.30.1.205","172.30.1.104","TCP","54","45140 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33652","15.753189","172.30.1.205","172.30.1.104","TCP","54","45140 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33653","15.753313","172.30.1.205","172.30.1.104","TCP","74","37778 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918979 TSecr=0 WS=128" "33654","15.753459","172.30.1.104","172.30.1.205","TCP","54","135 > 45140 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33655","15.753543","172.30.1.104","172.30.1.205","TCP","54","135 > 45140 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33656","15.753549","172.30.1.205","172.30.1.104","TCP","54","45140 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33657","15.753622","172.30.1.104","172.30.1.205","TCP","66","49671 > 37778 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33658","15.753636","172.30.1.205","172.30.1.104","TCP","54","37778 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33659","15.754002","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33660","15.754290","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33661","15.754299","172.30.1.205","172.30.1.104","TCP","54","37778 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33662","15.756170","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33663","15.756528","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33664","15.756535","172.30.1.205","172.30.1.104","TCP","54","37778 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33665","15.757943","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33666","15.760714","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33667","15.760723","172.30.1.205","172.30.1.104","TCP","54","37778 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33668","15.761699","172.30.1.205","172.30.1.104","TCP","74","45144 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918988 TSecr=0 WS=128" "33669","15.761997","172.30.1.104","172.30.1.205","TCP","66","135 > 45144 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33670","15.762008","172.30.1.205","172.30.1.104","TCP","54","45144 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33671","15.762352","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33672","15.762648","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33673","15.762657","172.30.1.205","172.30.1.104","TCP","54","45144 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33674","15.764855","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33675","15.765294","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33676","15.765300","172.30.1.205","172.30.1.104","TCP","54","45144 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33677","15.767113","172.30.1.205","172.30.1.104","TCP","54","45144 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33678","15.767224","172.30.1.205","172.30.1.104","TCP","74","37782 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499918993 TSecr=0 WS=128" "33679","15.767419","172.30.1.104","172.30.1.205","TCP","54","135 > 45144 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33680","15.767431","172.30.1.104","172.30.1.205","TCP","54","135 > 45144 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33681","15.767436","172.30.1.205","172.30.1.104","TCP","54","45144 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33682","15.767525","172.30.1.104","172.30.1.205","TCP","66","49671 > 37782 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33683","15.767533","172.30.1.205","172.30.1.104","TCP","54","37782 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33684","15.767881","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33685","15.768181","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33686","15.768191","172.30.1.205","172.30.1.104","TCP","54","37782 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33687","15.770075","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33688","15.770441","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33689","15.770448","172.30.1.205","172.30.1.104","TCP","54","37782 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33690","15.771812","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33691","15.774540","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33692","15.774551","172.30.1.205","172.30.1.104","TCP","54","37782 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33693","15.775508","172.30.1.205","172.30.1.104","TCP","74","45148 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919001 TSecr=0 WS=128" "33694","15.775807","172.30.1.104","172.30.1.205","TCP","66","135 > 45148 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33695","15.775818","172.30.1.205","172.30.1.104","TCP","54","45148 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33696","15.776170","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33697","15.776483","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33698","15.776492","172.30.1.205","172.30.1.104","TCP","54","45148 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33699","15.778693","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33700","15.779120","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33701","15.779127","172.30.1.205","172.30.1.104","TCP","54","45148 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33702","15.780979","172.30.1.205","172.30.1.104","TCP","54","45148 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33703","15.781090","172.30.1.205","172.30.1.104","TCP","74","37786 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919007 TSecr=0 WS=128" "33704","15.781267","172.30.1.104","172.30.1.205","TCP","54","135 > 45148 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33705","15.781286","172.30.1.104","172.30.1.205","TCP","54","135 > 45148 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33706","15.781291","172.30.1.205","172.30.1.104","TCP","54","45148 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33707","15.781363","172.30.1.104","172.30.1.205","TCP","66","49671 > 37786 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33708","15.781371","172.30.1.205","172.30.1.104","TCP","54","37786 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33709","15.781715","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33710","15.782002","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33711","15.782011","172.30.1.205","172.30.1.104","TCP","54","37786 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33712","15.783903","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33713","15.784288","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33714","15.784295","172.30.1.205","172.30.1.104","TCP","54","37786 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33715","15.785696","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33716","15.788535","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33717","15.788545","172.30.1.205","172.30.1.104","TCP","54","37786 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33718","15.789547","172.30.1.205","172.30.1.104","TCP","74","45152 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919015 TSecr=0 WS=128" "33719","15.789859","172.30.1.104","172.30.1.205","TCP","66","135 > 45152 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33720","15.789871","172.30.1.205","172.30.1.104","TCP","54","45152 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33721","15.790222","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33722","15.790526","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33723","15.790535","172.30.1.205","172.30.1.104","TCP","54","45152 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33724","15.792736","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33725","15.793260","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33726","15.793267","172.30.1.205","172.30.1.104","TCP","54","45152 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33727","15.795100","172.30.1.205","172.30.1.104","TCP","54","45152 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33728","15.795224","172.30.1.205","172.30.1.104","TCP","74","37790 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919021 TSecr=0 WS=128" "33729","15.795380","172.30.1.104","172.30.1.205","TCP","54","135 > 45152 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33730","15.795407","172.30.1.104","172.30.1.205","TCP","54","135 > 45152 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33731","15.795415","172.30.1.205","172.30.1.104","TCP","54","45152 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33732","15.795525","172.30.1.104","172.30.1.205","TCP","66","49671 > 37790 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33733","15.795533","172.30.1.205","172.30.1.104","TCP","54","37790 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33734","15.795883","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33735","15.797149","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33736","15.797157","172.30.1.205","172.30.1.104","TCP","54","37790 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33737","15.799050","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33738","15.799433","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33739","15.799439","172.30.1.205","172.30.1.104","TCP","54","37790 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33740","15.800811","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33741","15.803590","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33742","15.803599","172.30.1.205","172.30.1.104","TCP","54","37790 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33743","15.804564","172.30.1.205","172.30.1.104","TCP","74","45156 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919030 TSecr=0 WS=128" "33744","15.804869","172.30.1.104","172.30.1.205","TCP","66","135 > 45156 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33745","15.804880","172.30.1.205","172.30.1.104","TCP","54","45156 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33746","15.805243","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33747","15.805538","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33748","15.805553","172.30.1.205","172.30.1.104","TCP","54","45156 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33749","15.807851","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33750","15.808258","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33751","15.808265","172.30.1.205","172.30.1.104","TCP","54","45156 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33752","15.810118","172.30.1.205","172.30.1.104","TCP","54","45156 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33753","15.810245","172.30.1.205","172.30.1.104","TCP","74","37794 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919036 TSecr=0 WS=128" "33754","15.810399","172.30.1.104","172.30.1.205","TCP","54","135 > 45156 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33755","15.810412","172.30.1.104","172.30.1.205","TCP","54","135 > 45156 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33756","15.810419","172.30.1.205","172.30.1.104","TCP","54","45156 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33757","15.810507","172.30.1.104","172.30.1.205","TCP","66","49671 > 37794 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33758","15.810516","172.30.1.205","172.30.1.104","TCP","54","37794 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33759","15.810866","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33760","15.811159","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33761","15.811168","172.30.1.205","172.30.1.104","TCP","54","37794 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33762","15.813091","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33763","15.813494","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33764","15.813502","172.30.1.205","172.30.1.104","TCP","54","37794 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33765","15.814874","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33766","15.817735","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33767","15.817750","172.30.1.205","172.30.1.104","TCP","54","37794 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33768","15.818823","172.30.1.205","172.30.1.104","TCP","74","45160 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919045 TSecr=0 WS=128" "33769","15.819153","172.30.1.104","172.30.1.205","TCP","66","135 > 45160 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33770","15.819165","172.30.1.205","172.30.1.104","TCP","54","45160 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33771","15.819540","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33772","15.819829","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33773","15.819840","172.30.1.205","172.30.1.104","TCP","54","45160 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33774","15.822122","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33775","15.822533","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33776","15.822540","172.30.1.205","172.30.1.104","TCP","54","45160 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33777","15.823407","172.30.1.205","172.30.1.104","TCP","54","37754 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33778","15.823456","172.30.1.205","172.30.1.104","TCP","54","37758 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33779","15.823494","172.30.1.205","172.30.1.104","TCP","54","37762 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33780","15.823527","172.30.1.205","172.30.1.104","TCP","54","37766 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33781","15.823555","172.30.1.205","172.30.1.104","TCP","54","37770 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33782","15.823588","172.30.1.205","172.30.1.104","TCP","54","37774 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33783","15.823614","172.30.1.205","172.30.1.104","TCP","54","37778 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33784","15.823641","172.30.1.205","172.30.1.104","TCP","54","37782 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33785","15.823667","172.30.1.205","172.30.1.104","TCP","54","37786 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33786","15.823689","172.30.1.205","172.30.1.104","TCP","54","37790 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33787","15.823714","172.30.1.104","172.30.1.205","TCP","54","49671 > 37754 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33788","15.823729","172.30.1.205","172.30.1.104","TCP","54","37794 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33789","15.823738","172.30.1.104","172.30.1.205","TCP","54","49671 > 37758 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33790","15.823762","172.30.1.104","172.30.1.205","TCP","54","49671 > 37762 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33791","15.823824","172.30.1.205","172.30.1.104","TCP","54","37750 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "33792","15.823917","172.30.1.104","172.30.1.205","TCP","54","49671 > 37754 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33793","15.823926","172.30.1.205","172.30.1.104","TCP","54","37754 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33794","15.823940","172.30.1.104","172.30.1.205","TCP","54","49671 > 37766 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33795","15.823964","172.30.1.104","172.30.1.205","TCP","54","49671 > 37766 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33796","15.823968","172.30.1.205","172.30.1.104","TCP","54","37766 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33797","15.823984","172.30.1.104","172.30.1.205","TCP","54","49671 > 37758 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33798","15.823986","172.30.1.205","172.30.1.104","TCP","54","37758 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33799","15.824004","172.30.1.104","172.30.1.205","TCP","54","49671 > 37762 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33800","15.824006","172.30.1.205","172.30.1.104","TCP","54","37762 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33801","15.824024","172.30.1.104","172.30.1.205","TCP","54","49671 > 37770 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33802","15.824046","172.30.1.104","172.30.1.205","TCP","54","49671 > 37774 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33803","15.824153","172.30.1.104","172.30.1.205","TCP","54","49671 > 37778 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33804","15.824171","172.30.1.104","172.30.1.205","TCP","54","49671 > 37782 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33805","15.824198","172.30.1.104","172.30.1.205","TCP","54","49671 > 37770 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33806","15.824203","172.30.1.205","172.30.1.104","TCP","54","37770 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33807","15.824224","172.30.1.104","172.30.1.205","TCP","54","49671 > 37782 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33808","15.824227","172.30.1.205","172.30.1.104","TCP","54","37782 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33809","15.824249","172.30.1.104","172.30.1.205","TCP","54","49671 > 37774 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33810","15.824252","172.30.1.205","172.30.1.104","TCP","54","37774 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33811","15.824266","172.30.1.104","172.30.1.205","TCP","54","49671 > 37778 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33812","15.824268","172.30.1.205","172.30.1.104","TCP","54","37778 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33813","15.824285","172.30.1.104","172.30.1.205","TCP","54","49671 > 37786 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33814","15.824308","172.30.1.104","172.30.1.205","TCP","54","49671 > 37790 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33815","15.824414","172.30.1.104","172.30.1.205","TCP","54","49671 > 37794 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33816","15.824435","172.30.1.104","172.30.1.205","TCP","54","49671 > 37750 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33817","15.824452","172.30.1.104","172.30.1.205","TCP","54","49671 > 37786 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33818","15.824457","172.30.1.205","172.30.1.104","TCP","54","37786 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33819","15.824472","172.30.1.104","172.30.1.205","TCP","54","49671 > 37750 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33820","15.824475","172.30.1.205","172.30.1.104","TCP","54","37750 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33821","15.824495","172.30.1.104","172.30.1.205","TCP","54","49671 > 37790 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33822","15.824497","172.30.1.205","172.30.1.104","TCP","54","37790 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33823","15.824515","172.30.1.104","172.30.1.205","TCP","54","49671 > 37794 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "33824","15.824517","172.30.1.205","172.30.1.104","TCP","54","37794 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "33825","15.825397","172.30.1.205","172.30.1.104","TCP","54","45160 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33826","15.825523","172.30.1.205","172.30.1.104","TCP","74","37798 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919051 TSecr=0 WS=128" "33827","15.825653","172.30.1.104","172.30.1.205","TCP","54","135 > 45160 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33828","15.825667","172.30.1.104","172.30.1.205","TCP","54","135 > 45160 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33829","15.825672","172.30.1.205","172.30.1.104","TCP","54","45160 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33830","15.825790","172.30.1.104","172.30.1.205","TCP","66","49671 > 37798 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33831","15.825798","172.30.1.205","172.30.1.104","TCP","54","37798 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33832","15.826150","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33833","15.826437","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33834","15.826445","172.30.1.205","172.30.1.104","TCP","54","37798 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33835","15.828345","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33836","15.828720","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33837","15.828726","172.30.1.205","172.30.1.104","TCP","54","37798 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33838","15.830113","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33839","15.832806","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33840","15.832817","172.30.1.205","172.30.1.104","TCP","54","37798 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33841","15.833794","172.30.1.205","172.30.1.104","TCP","74","45164 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919060 TSecr=0 WS=128" "33842","15.834085","172.30.1.104","172.30.1.205","TCP","66","135 > 45164 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33843","15.834096","172.30.1.205","172.30.1.104","TCP","54","45164 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33844","15.834453","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33845","15.834735","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33846","15.834746","172.30.1.205","172.30.1.104","TCP","54","45164 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33847","15.836954","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33848","15.837350","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33849","15.837357","172.30.1.205","172.30.1.104","TCP","54","45164 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33850","15.839157","172.30.1.205","172.30.1.104","TCP","54","45164 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33851","15.839273","172.30.1.205","172.30.1.104","TCP","74","37802 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919065 TSecr=0 WS=128" "33852","15.839440","172.30.1.104","172.30.1.205","TCP","54","135 > 45164 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33853","15.839453","172.30.1.104","172.30.1.205","TCP","54","135 > 45164 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33854","15.839460","172.30.1.205","172.30.1.104","TCP","54","45164 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33855","15.839561","172.30.1.104","172.30.1.205","TCP","66","49671 > 37802 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33856","15.839570","172.30.1.205","172.30.1.104","TCP","54","37802 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33857","15.839910","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33858","15.840199","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33859","15.840208","172.30.1.205","172.30.1.104","TCP","54","37802 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33860","15.842145","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33861","15.842522","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33862","15.842531","172.30.1.205","172.30.1.104","TCP","54","37802 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33863","15.843969","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33864","15.846774","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33865","15.846787","172.30.1.205","172.30.1.104","TCP","54","37802 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33866","15.847852","172.30.1.205","172.30.1.104","TCP","74","45168 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919074 TSecr=0 WS=128" "33867","15.848176","172.30.1.104","172.30.1.205","TCP","66","135 > 45168 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33868","15.848190","172.30.1.205","172.30.1.104","TCP","54","45168 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33869","15.848555","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33870","15.848836","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33871","15.848846","172.30.1.205","172.30.1.104","TCP","54","45168 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33872","15.851123","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33873","15.851518","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33874","15.851526","172.30.1.205","172.30.1.104","TCP","54","45168 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33875","15.853394","172.30.1.205","172.30.1.104","TCP","54","45168 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33876","15.853553","172.30.1.205","172.30.1.104","TCP","74","37806 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919079 TSecr=0 WS=128" "33877","15.853656","172.30.1.104","172.30.1.205","TCP","54","135 > 45168 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33878","15.853670","172.30.1.104","172.30.1.205","TCP","54","135 > 45168 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33879","15.853678","172.30.1.205","172.30.1.104","TCP","54","45168 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33880","15.853847","172.30.1.104","172.30.1.205","TCP","66","49671 > 37806 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33881","15.853855","172.30.1.205","172.30.1.104","TCP","54","37806 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33882","15.854203","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33883","15.854498","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33884","15.854507","172.30.1.205","172.30.1.104","TCP","54","37806 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33885","15.856399","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33886","15.856800","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33887","15.856807","172.30.1.205","172.30.1.104","TCP","54","37806 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33888","15.858185","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33889","15.860956","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33890","15.860966","172.30.1.205","172.30.1.104","TCP","54","37806 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33891","15.861999","172.30.1.205","172.30.1.104","TCP","74","45172 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919088 TSecr=0 WS=128" "33892","15.862316","172.30.1.104","172.30.1.205","TCP","66","135 > 45172 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33893","15.862328","172.30.1.205","172.30.1.104","TCP","54","45172 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33894","15.862680","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33895","15.862972","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33896","15.862981","172.30.1.205","172.30.1.104","TCP","54","45172 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33897","15.865247","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33898","15.865638","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33899","15.865645","172.30.1.205","172.30.1.104","TCP","54","45172 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33900","15.867472","172.30.1.205","172.30.1.104","TCP","54","45172 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33901","15.867612","172.30.1.205","172.30.1.104","TCP","74","37810 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919094 TSecr=0 WS=128" "33902","15.867744","172.30.1.104","172.30.1.205","TCP","54","135 > 45172 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33903","15.867757","172.30.1.104","172.30.1.205","TCP","54","135 > 45172 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33904","15.867765","172.30.1.205","172.30.1.104","TCP","54","45172 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33905","15.867903","172.30.1.104","172.30.1.205","TCP","66","49671 > 37810 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33906","15.867911","172.30.1.205","172.30.1.104","TCP","54","37810 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33907","15.868277","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33908","15.868559","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33909","15.868568","172.30.1.205","172.30.1.104","TCP","54","37810 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33910","15.870475","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33911","15.870852","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33912","15.870860","172.30.1.205","172.30.1.104","TCP","54","37810 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33913","15.872296","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33914","15.875018","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33915","15.875032","172.30.1.205","172.30.1.104","TCP","54","37810 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33916","15.876118","172.30.1.205","172.30.1.104","TCP","74","45176 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919102 TSecr=0 WS=128" "33917","15.876431","172.30.1.104","172.30.1.205","TCP","66","135 > 45176 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33918","15.876444","172.30.1.205","172.30.1.104","TCP","54","45176 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33919","15.876833","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33920","15.877120","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33921","15.877132","172.30.1.205","172.30.1.104","TCP","54","45176 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33922","15.879379","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33923","15.879757","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33924","15.879765","172.30.1.205","172.30.1.104","TCP","54","45176 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33925","15.881638","172.30.1.205","172.30.1.104","TCP","54","45176 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33926","15.881754","172.30.1.205","172.30.1.104","TCP","74","37814 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919108 TSecr=0 WS=128" "33927","15.881889","172.30.1.104","172.30.1.205","TCP","54","135 > 45176 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33928","15.881935","172.30.1.104","172.30.1.205","TCP","54","135 > 45176 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33929","15.881942","172.30.1.205","172.30.1.104","TCP","54","45176 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33930","15.882053","172.30.1.104","172.30.1.205","TCP","66","49671 > 37814 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33931","15.882061","172.30.1.205","172.30.1.104","TCP","54","37814 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33932","15.882408","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33933","15.882677","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33934","15.882686","172.30.1.205","172.30.1.104","TCP","54","37814 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33935","15.884573","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33936","15.884963","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33937","15.884973","172.30.1.205","172.30.1.104","TCP","54","37814 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33938","15.886425","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33939","15.889271","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33940","15.889283","172.30.1.205","172.30.1.104","TCP","54","37814 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33941","15.890338","172.30.1.205","172.30.1.104","TCP","74","45180 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919116 TSecr=0 WS=128" "33942","15.890630","172.30.1.104","172.30.1.205","TCP","66","135 > 45180 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33943","15.890643","172.30.1.205","172.30.1.104","TCP","54","45180 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33944","15.891012","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33945","15.891309","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33946","15.891318","172.30.1.205","172.30.1.104","TCP","54","45180 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33947","15.893614","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33948","15.894018","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33949","15.894024","172.30.1.205","172.30.1.104","TCP","54","45180 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33950","15.895863","172.30.1.205","172.30.1.104","TCP","54","45180 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33951","15.895981","172.30.1.205","172.30.1.104","TCP","74","37818 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919122 TSecr=0 WS=128" "33952","15.896134","172.30.1.104","172.30.1.205","TCP","54","135 > 45180 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33953","15.896178","172.30.1.104","172.30.1.205","TCP","54","135 > 45180 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33954","15.896186","172.30.1.205","172.30.1.104","TCP","54","45180 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33955","15.896259","172.30.1.104","172.30.1.205","TCP","66","49671 > 37818 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33956","15.896268","172.30.1.205","172.30.1.104","TCP","54","37818 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33957","15.896616","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33958","15.896897","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33959","15.896906","172.30.1.205","172.30.1.104","TCP","54","37818 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33960","15.898820","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33961","15.899182","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33962","15.899188","172.30.1.205","172.30.1.104","TCP","54","37818 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33963","15.900558","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33964","15.903412","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33965","15.903421","172.30.1.205","172.30.1.104","TCP","54","37818 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33966","15.904396","172.30.1.205","172.30.1.104","TCP","74","45184 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919130 TSecr=0 WS=128" "33967","15.904678","172.30.1.104","172.30.1.205","TCP","66","135 > 45184 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33968","15.904689","172.30.1.205","172.30.1.104","TCP","54","45184 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33969","15.905069","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33970","15.905370","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33971","15.905379","172.30.1.205","172.30.1.104","TCP","54","45184 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33972","15.907584","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33973","15.908004","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33974","15.908011","172.30.1.205","172.30.1.104","TCP","54","45184 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "33975","15.909860","172.30.1.205","172.30.1.104","TCP","54","45184 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "33976","15.909976","172.30.1.205","172.30.1.104","TCP","74","37822 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919136 TSecr=0 WS=128" "33977","15.910159","172.30.1.104","172.30.1.205","TCP","54","135 > 45184 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33978","15.910174","172.30.1.104","172.30.1.205","TCP","54","135 > 45184 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "33979","15.910183","172.30.1.205","172.30.1.104","TCP","54","45184 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "33980","15.910289","172.30.1.104","172.30.1.205","TCP","66","49671 > 37822 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33981","15.910301","172.30.1.205","172.30.1.104","TCP","54","37822 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33982","15.910693","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "33983","15.911036","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33984","15.911043","172.30.1.205","172.30.1.104","TCP","54","37822 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33985","15.912981","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "33986","15.913380","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "33987","15.913387","172.30.1.205","172.30.1.104","TCP","54","37822 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "33988","15.914765","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "33989","15.917524","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "33990","15.917533","172.30.1.205","172.30.1.104","TCP","54","37822 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "33991","15.918512","172.30.1.205","172.30.1.104","TCP","74","45188 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919144 TSecr=0 WS=128" "33992","15.918854","172.30.1.104","172.30.1.205","TCP","66","135 > 45188 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "33993","15.918865","172.30.1.205","172.30.1.104","TCP","54","45188 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "33994","15.919219","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "33995","15.919592","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "33996","15.919605","172.30.1.205","172.30.1.104","TCP","54","45188 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "33997","15.921927","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "33998","15.922350","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "33999","15.922357","172.30.1.205","172.30.1.104","TCP","54","45188 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34000","15.924185","172.30.1.205","172.30.1.104","TCP","54","45188 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34001","15.924306","172.30.1.205","172.30.1.104","TCP","74","37826 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919150 TSecr=0 WS=128" "34002","15.924471","172.30.1.104","172.30.1.205","TCP","54","135 > 45188 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34003","15.924538","172.30.1.104","172.30.1.205","TCP","54","135 > 45188 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34004","15.924544","172.30.1.205","172.30.1.104","TCP","54","45188 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34005","15.924581","172.30.1.104","172.30.1.205","TCP","66","49671 > 37826 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34006","15.924590","172.30.1.205","172.30.1.104","TCP","54","37826 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34007","15.924965","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34008","15.925288","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34009","15.925297","172.30.1.205","172.30.1.104","TCP","54","37826 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34010","15.927189","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34011","15.927601","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34012","15.927607","172.30.1.205","172.30.1.104","TCP","54","37826 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34013","15.928995","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34014","15.931842","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34015","15.931856","172.30.1.205","172.30.1.104","TCP","54","37826 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34016","15.932905","172.30.1.205","172.30.1.104","TCP","74","45192 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919159 TSecr=0 WS=128" "34017","15.933232","172.30.1.104","172.30.1.205","TCP","66","135 > 45192 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34018","15.933245","172.30.1.205","172.30.1.104","TCP","54","45192 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34019","15.933619","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34020","15.934089","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34021","15.934098","172.30.1.205","172.30.1.104","TCP","54","45192 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34022","15.936315","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34023","15.936771","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34024","15.936778","172.30.1.205","172.30.1.104","TCP","54","45192 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34025","15.938597","172.30.1.205","172.30.1.104","TCP","54","45192 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34026","15.938713","172.30.1.205","172.30.1.104","TCP","74","37830 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919165 TSecr=0 WS=128" "34027","15.938879","172.30.1.104","172.30.1.205","TCP","54","135 > 45192 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34028","15.938916","172.30.1.104","172.30.1.205","TCP","54","135 > 45192 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34029","15.938923","172.30.1.205","172.30.1.104","TCP","54","45192 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34030","15.939019","172.30.1.104","172.30.1.205","TCP","66","49671 > 37830 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34031","15.939028","172.30.1.205","172.30.1.104","TCP","54","37830 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34032","15.939373","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34033","15.939699","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34034","15.939707","172.30.1.205","172.30.1.104","TCP","54","37830 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34035","15.941643","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34036","15.942065","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34037","15.942071","172.30.1.205","172.30.1.104","TCP","54","37830 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34038","15.943416","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34039","15.946301","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34040","15.946322","172.30.1.205","172.30.1.104","TCP","54","37830 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34041","15.947464","172.30.1.205","172.30.1.104","TCP","74","45196 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919173 TSecr=0 WS=128" "34042","15.947830","172.30.1.104","172.30.1.205","TCP","66","135 > 45196 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34043","15.947840","172.30.1.205","172.30.1.104","TCP","54","45196 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34044","15.948193","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34045","15.948513","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34046","15.948522","172.30.1.205","172.30.1.104","TCP","54","45196 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34047","15.950751","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34048","15.951180","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34049","15.951187","172.30.1.205","172.30.1.104","TCP","54","45196 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34050","15.953070","172.30.1.205","172.30.1.104","TCP","54","45196 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34051","15.953178","172.30.1.205","172.30.1.104","TCP","74","37834 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919179 TSecr=0 WS=128" "34052","15.953366","172.30.1.104","172.30.1.205","TCP","54","135 > 45196 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34053","15.953393","172.30.1.104","172.30.1.205","TCP","54","135 > 45196 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34054","15.953399","172.30.1.205","172.30.1.104","TCP","54","45196 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34055","15.953501","172.30.1.104","172.30.1.205","TCP","66","49671 > 37834 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34056","15.953509","172.30.1.205","172.30.1.104","TCP","54","37834 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34057","15.953869","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34058","15.954202","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34059","15.954210","172.30.1.205","172.30.1.104","TCP","54","37834 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34060","15.956066","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34061","15.956463","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34062","15.956470","172.30.1.205","172.30.1.104","TCP","54","37834 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34063","15.957835","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34064","15.960641","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34065","15.960653","172.30.1.205","172.30.1.104","TCP","54","37834 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34066","15.961624","172.30.1.205","172.30.1.104","TCP","74","45200 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919188 TSecr=0 WS=128" "34067","15.962045","172.30.1.104","172.30.1.205","TCP","66","135 > 45200 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34068","15.962055","172.30.1.205","172.30.1.104","TCP","54","45200 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34069","15.962405","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34070","15.962730","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34071","15.962741","172.30.1.205","172.30.1.104","TCP","54","45200 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34072","15.964950","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34073","15.965384","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34074","15.965391","172.30.1.205","172.30.1.104","TCP","54","45200 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34075","15.967205","172.30.1.205","172.30.1.104","TCP","54","45200 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34076","15.967328","172.30.1.205","172.30.1.104","TCP","74","37838 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919193 TSecr=0 WS=128" "34077","15.967566","172.30.1.104","172.30.1.205","TCP","54","135 > 45200 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34078","15.967575","172.30.1.104","172.30.1.205","TCP","54","135 > 45200 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34079","15.967580","172.30.1.205","172.30.1.104","TCP","54","45200 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34080","15.967669","172.30.1.104","172.30.1.205","TCP","66","49671 > 37838 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34081","15.967677","172.30.1.205","172.30.1.104","TCP","54","37838 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34082","15.968027","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34083","15.968351","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34084","15.968360","172.30.1.205","172.30.1.104","TCP","54","37838 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34085","15.970301","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34086","15.970735","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34087","15.970745","172.30.1.205","172.30.1.104","TCP","54","37838 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34088","15.972378","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34089","15.975303","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34090","15.975312","172.30.1.205","172.30.1.104","TCP","54","37838 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34091","15.976252","172.30.1.205","172.30.1.104","TCP","74","45204 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919202 TSecr=0 WS=128" "34092","15.976627","172.30.1.104","172.30.1.205","TCP","66","135 > 45204 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34093","15.976638","172.30.1.205","172.30.1.104","TCP","54","45204 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34094","15.977013","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34095","15.977354","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34096","15.977362","172.30.1.205","172.30.1.104","TCP","54","45204 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34097","15.979537","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34098","15.980038","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34099","15.980045","172.30.1.205","172.30.1.104","TCP","54","45204 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34100","15.981870","172.30.1.205","172.30.1.104","TCP","54","45204 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34101","15.981980","172.30.1.205","172.30.1.104","TCP","74","37842 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919208 TSecr=0 WS=128" "34102","15.982159","172.30.1.104","172.30.1.205","TCP","54","135 > 45204 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34103","15.982218","172.30.1.104","172.30.1.205","TCP","54","135 > 45204 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34104","15.982224","172.30.1.205","172.30.1.104","TCP","54","45204 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34105","15.982332","172.30.1.104","172.30.1.205","TCP","66","49671 > 37842 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34106","15.982340","172.30.1.205","172.30.1.104","TCP","54","37842 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34107","15.982686","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34108","15.983011","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34109","15.983018","172.30.1.205","172.30.1.104","TCP","54","37842 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34110","15.984950","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34111","15.985379","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34112","15.985385","172.30.1.205","172.30.1.104","TCP","54","37842 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34113","15.986760","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34114","15.989678","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34115","15.989687","172.30.1.205","172.30.1.104","TCP","54","37842 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34116","15.990667","172.30.1.205","172.30.1.104","TCP","74","45208 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919217 TSecr=0 WS=128" "34117","15.990989","172.30.1.104","172.30.1.205","TCP","66","135 > 45208 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34118","15.991000","172.30.1.205","172.30.1.104","TCP","54","45208 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34119","15.991353","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34120","15.991707","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34121","15.991715","172.30.1.205","172.30.1.104","TCP","54","45208 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34122","15.993939","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34123","15.994380","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34124","15.994387","172.30.1.205","172.30.1.104","TCP","54","45208 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34125","15.995238","172.30.1.205","172.30.1.104","TCP","54","37802 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34126","15.995287","172.30.1.205","172.30.1.104","TCP","54","37806 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34127","15.995314","172.30.1.205","172.30.1.104","TCP","54","37810 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34128","15.995343","172.30.1.205","172.30.1.104","TCP","54","37814 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34129","15.995366","172.30.1.205","172.30.1.104","TCP","54","37818 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34130","15.995394","172.30.1.205","172.30.1.104","TCP","54","37822 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34131","15.995420","172.30.1.205","172.30.1.104","TCP","54","37826 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34132","15.995447","172.30.1.205","172.30.1.104","TCP","54","37830 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34133","15.995472","172.30.1.205","172.30.1.104","TCP","54","37834 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34134","15.995494","172.30.1.205","172.30.1.104","TCP","54","37838 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34135","15.995515","172.30.1.205","172.30.1.104","TCP","54","37842 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34136","15.995583","172.30.1.205","172.30.1.104","TCP","54","37798 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34137","15.995594","172.30.1.104","172.30.1.205","TCP","54","49671 > 37802 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34138","15.995623","172.30.1.104","172.30.1.205","TCP","54","49671 > 37806 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34139","15.995840","172.30.1.104","172.30.1.205","TCP","54","49671 > 37810 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34140","15.995867","172.30.1.104","172.30.1.205","TCP","54","49671 > 37802 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34141","15.995875","172.30.1.205","172.30.1.104","TCP","54","37802 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34142","15.995912","172.30.1.104","172.30.1.205","TCP","54","49671 > 37806 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34143","15.995916","172.30.1.205","172.30.1.104","TCP","54","37806 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34144","15.995942","172.30.1.104","172.30.1.205","TCP","54","49671 > 37810 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34145","15.995945","172.30.1.205","172.30.1.104","TCP","54","37810 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34146","15.995969","172.30.1.104","172.30.1.205","TCP","54","49671 > 37814 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34147","15.995998","172.30.1.104","172.30.1.205","TCP","54","49671 > 37818 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34148","15.996088","172.30.1.104","172.30.1.205","TCP","54","49671 > 37822 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34149","15.996117","172.30.1.104","172.30.1.205","TCP","54","49671 > 37814 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34150","15.996122","172.30.1.205","172.30.1.104","TCP","54","37814 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34151","15.996148","172.30.1.104","172.30.1.205","TCP","54","49671 > 37818 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34152","15.996151","172.30.1.205","172.30.1.104","TCP","54","37818 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34153","15.996178","172.30.1.104","172.30.1.205","TCP","54","49671 > 37822 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34154","15.996181","172.30.1.205","172.30.1.104","TCP","54","37822 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34155","15.996210","172.30.1.104","172.30.1.205","TCP","54","49671 > 37826 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34156","15.996243","172.30.1.104","172.30.1.205","TCP","54","49671 > 37830 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34157","15.996270","172.30.1.104","172.30.1.205","TCP","54","49671 > 37834 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34158","15.996306","172.30.1.104","172.30.1.205","TCP","54","49671 > 37826 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34159","15.996311","172.30.1.205","172.30.1.104","TCP","54","37826 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34160","15.996344","172.30.1.104","172.30.1.205","TCP","54","49671 > 37838 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34161","15.996374","172.30.1.104","172.30.1.205","TCP","54","49671 > 37842 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34162","15.996404","172.30.1.104","172.30.1.205","TCP","54","49671 > 37842 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34163","15.996407","172.30.1.205","172.30.1.104","TCP","54","37842 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34164","15.996460","172.30.1.104","172.30.1.205","TCP","54","49671 > 37798 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34165","15.996488","172.30.1.104","172.30.1.205","TCP","54","49671 > 37838 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34166","15.996492","172.30.1.205","172.30.1.104","TCP","54","37838 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34167","15.996515","172.30.1.104","172.30.1.205","TCP","54","49671 > 37798 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34168","15.996518","172.30.1.205","172.30.1.104","TCP","54","37798 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34169","15.996544","172.30.1.104","172.30.1.205","TCP","54","49671 > 37830 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34170","15.996546","172.30.1.205","172.30.1.104","TCP","54","37830 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34171","15.996572","172.30.1.104","172.30.1.205","TCP","54","49671 > 37834 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34172","15.996574","172.30.1.205","172.30.1.104","TCP","54","37834 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34173","15.997235","172.30.1.205","172.30.1.104","TCP","54","45208 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34174","15.997348","172.30.1.205","172.30.1.104","TCP","74","37846 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919223 TSecr=0 WS=128" "34175","15.997573","172.30.1.104","172.30.1.205","TCP","54","135 > 45208 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34176","15.997581","172.30.1.104","172.30.1.205","TCP","54","135 > 45208 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34177","15.997586","172.30.1.205","172.30.1.104","TCP","54","45208 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34178","15.997683","172.30.1.104","172.30.1.205","TCP","66","49671 > 37846 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34179","15.997693","172.30.1.205","172.30.1.104","TCP","54","37846 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34180","15.998053","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34181","15.998378","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34182","15.998385","172.30.1.205","172.30.1.104","TCP","54","37846 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34183","16.000257","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34184","16.000648","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34185","16.000655","172.30.1.205","172.30.1.104","TCP","54","37846 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34186","16.002040","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34187","16.005649","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34188","16.005660","172.30.1.205","172.30.1.104","TCP","54","37846 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34189","16.006668","172.30.1.205","172.30.1.104","TCP","74","45212 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919233 TSecr=0 WS=128" "34190","16.007001","172.30.1.104","172.30.1.205","TCP","66","135 > 45212 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34191","16.007013","172.30.1.205","172.30.1.104","TCP","54","45212 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34192","16.007369","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34193","16.007741","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34194","16.007749","172.30.1.205","172.30.1.104","TCP","54","45212 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34195","16.010010","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34196","16.010526","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34197","16.010535","172.30.1.205","172.30.1.104","TCP","54","45212 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34198","16.012448","172.30.1.205","172.30.1.104","TCP","54","45212 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34199","16.012625","172.30.1.205","172.30.1.104","TCP","74","37850 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919239 TSecr=0 WS=128" "34200","16.012729","172.30.1.104","172.30.1.205","TCP","54","135 > 45212 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34201","16.012932","172.30.1.104","172.30.1.205","TCP","66","49671 > 37850 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34202","16.012943","172.30.1.205","172.30.1.104","TCP","54","37850 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34203","16.013311","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34204","16.015195","172.30.1.104","172.30.1.205","TCP","54","135 > 45212 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34205","16.015207","172.30.1.205","172.30.1.104","TCP","54","45212 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34206","16.015353","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34207","16.015364","172.30.1.205","172.30.1.104","TCP","54","37850 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34208","16.017369","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34209","16.017784","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34210","16.017791","172.30.1.205","172.30.1.104","TCP","54","37850 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34211","16.019171","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34212","16.022076","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34213","16.022087","172.30.1.205","172.30.1.104","TCP","54","37850 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34214","16.023130","172.30.1.205","172.30.1.104","TCP","74","45216 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919249 TSecr=0 WS=128" "34215","16.023460","172.30.1.104","172.30.1.205","TCP","66","135 > 45216 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34216","16.023473","172.30.1.205","172.30.1.104","TCP","54","45216 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34217","16.023832","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34218","16.024145","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34219","16.024154","172.30.1.205","172.30.1.104","TCP","54","45216 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34220","16.026401","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34221","16.026895","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34222","16.026901","172.30.1.205","172.30.1.104","TCP","54","45216 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34223","16.028724","172.30.1.205","172.30.1.104","TCP","54","45216 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34224","16.028880","172.30.1.205","172.30.1.104","TCP","74","37854 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919255 TSecr=0 WS=128" "34225","16.029066","172.30.1.104","172.30.1.205","TCP","54","135 > 45216 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34226","16.029077","172.30.1.104","172.30.1.205","TCP","54","135 > 45216 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34227","16.029084","172.30.1.205","172.30.1.104","TCP","54","45216 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34228","16.029186","172.30.1.104","172.30.1.205","TCP","66","49671 > 37854 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34229","16.029195","172.30.1.205","172.30.1.104","TCP","54","37854 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34230","16.029544","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34231","16.029856","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34232","16.029866","172.30.1.205","172.30.1.104","TCP","54","37854 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34233","16.031743","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34234","16.032161","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34235","16.032167","172.30.1.205","172.30.1.104","TCP","54","37854 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34236","16.033568","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34237","16.036458","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34238","16.036467","172.30.1.205","172.30.1.104","TCP","54","37854 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34239","16.037462","172.30.1.205","172.30.1.104","TCP","74","45220 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919263 TSecr=0 WS=128" "34240","16.041143","172.30.1.104","172.30.1.205","TCP","66","135 > 45220 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34241","16.041157","172.30.1.205","172.30.1.104","TCP","54","45220 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34242","16.041533","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34243","16.041870","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34244","16.041879","172.30.1.205","172.30.1.104","TCP","54","45220 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34245","16.044100","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34246","16.044547","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34247","16.044553","172.30.1.205","172.30.1.104","TCP","54","45220 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34248","16.046388","172.30.1.205","172.30.1.104","TCP","54","45220 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34249","16.046519","172.30.1.205","172.30.1.104","TCP","74","37858 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919272 TSecr=0 WS=128" "34250","16.046733","172.30.1.104","172.30.1.205","TCP","54","135 > 45220 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34251","16.046741","172.30.1.104","172.30.1.205","TCP","54","135 > 45220 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34252","16.046748","172.30.1.205","172.30.1.104","TCP","54","45220 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34253","16.046865","172.30.1.104","172.30.1.205","TCP","66","49671 > 37858 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34254","16.046874","172.30.1.205","172.30.1.104","TCP","54","37858 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34255","16.047219","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34256","16.048160","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34257","16.048169","172.30.1.205","172.30.1.104","TCP","54","37858 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34258","16.050068","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34259","16.050483","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34260","16.050489","172.30.1.205","172.30.1.104","TCP","54","37858 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34261","16.051839","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34262","16.057500","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34263","16.057513","172.30.1.205","172.30.1.104","TCP","54","37858 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34264","16.058580","172.30.1.205","172.30.1.104","TCP","74","45224 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919285 TSecr=0 WS=128" "34265","16.058915","172.30.1.104","172.30.1.205","TCP","66","135 > 45224 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34266","16.058927","172.30.1.205","172.30.1.104","TCP","54","45224 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34267","16.059289","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34268","16.059590","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34269","16.059600","172.30.1.205","172.30.1.104","TCP","54","45224 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34270","16.061831","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34271","16.062288","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34272","16.062295","172.30.1.205","172.30.1.104","TCP","54","45224 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34273","16.064131","172.30.1.205","172.30.1.104","TCP","54","45224 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34274","16.064246","172.30.1.205","172.30.1.104","TCP","74","37862 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919290 TSecr=0 WS=128" "34275","16.064467","172.30.1.104","172.30.1.205","TCP","54","135 > 45224 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34276","16.064477","172.30.1.104","172.30.1.205","TCP","54","135 > 45224 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34277","16.064484","172.30.1.205","172.30.1.104","TCP","54","45224 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34278","16.064602","172.30.1.104","172.30.1.205","TCP","66","49671 > 37862 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34279","16.064610","172.30.1.205","172.30.1.104","TCP","54","37862 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34280","16.064991","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34281","16.065330","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34282","16.065351","172.30.1.205","172.30.1.104","TCP","54","37862 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34283","16.067482","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34284","16.067923","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34285","16.067931","172.30.1.205","172.30.1.104","TCP","54","37862 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34286","16.069361","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34287","16.072273","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34288","16.072284","172.30.1.205","172.30.1.104","TCP","54","37862 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34289","16.073279","172.30.1.205","172.30.1.104","TCP","74","45228 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919299 TSecr=0 WS=128" "34290","16.073671","172.30.1.104","172.30.1.205","TCP","66","135 > 45228 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34291","16.073682","172.30.1.205","172.30.1.104","TCP","54","45228 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34292","16.074038","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34293","16.074358","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34294","16.074368","172.30.1.205","172.30.1.104","TCP","54","45228 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34295","16.076571","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34296","16.077022","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34297","16.077030","172.30.1.205","172.30.1.104","TCP","54","45228 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34298","16.078889","172.30.1.205","172.30.1.104","TCP","54","45228 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34299","16.079006","172.30.1.205","172.30.1.104","TCP","74","37866 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919305 TSecr=0 WS=128" "34300","16.079202","172.30.1.104","172.30.1.205","TCP","54","135 > 45228 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34301","16.079255","172.30.1.104","172.30.1.205","TCP","54","135 > 45228 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34302","16.079260","172.30.1.205","172.30.1.104","TCP","54","45228 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34303","16.079380","172.30.1.104","172.30.1.205","TCP","66","49671 > 37866 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34304","16.079391","172.30.1.205","172.30.1.104","TCP","54","37866 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34305","16.079755","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34306","16.080064","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34307","16.080073","172.30.1.205","172.30.1.104","TCP","54","37866 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34308","16.081985","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34309","16.082395","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34310","16.082402","172.30.1.205","172.30.1.104","TCP","54","37866 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34311","16.083797","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34312","16.086749","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34313","16.086758","172.30.1.205","172.30.1.104","TCP","54","37866 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34314","16.087729","172.30.1.205","172.30.1.104","TCP","74","45232 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919314 TSecr=0 WS=128" "34315","16.088050","172.30.1.104","172.30.1.205","TCP","66","135 > 45232 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34316","16.088062","172.30.1.205","172.30.1.104","TCP","54","45232 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34317","16.088423","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34318","16.088740","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34319","16.088749","172.30.1.205","172.30.1.104","TCP","54","45232 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34320","16.090986","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34321","16.091420","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34322","16.091427","172.30.1.205","172.30.1.104","TCP","54","45232 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34323","16.093286","172.30.1.205","172.30.1.104","TCP","54","45232 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34324","16.093416","172.30.1.205","172.30.1.104","TCP","74","37870 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919319 TSecr=0 WS=128" "34325","16.093663","172.30.1.104","172.30.1.205","TCP","54","135 > 45232 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34326","16.093673","172.30.1.104","172.30.1.205","TCP","54","135 > 45232 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34327","16.093680","172.30.1.205","172.30.1.104","TCP","54","45232 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34328","16.093768","172.30.1.104","172.30.1.205","TCP","66","49671 > 37870 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34329","16.093777","172.30.1.205","172.30.1.104","TCP","54","37870 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34330","16.094126","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34331","16.094455","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34332","16.094464","172.30.1.205","172.30.1.104","TCP","54","37870 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34333","16.096376","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34334","16.096784","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34335","16.096791","172.30.1.205","172.30.1.104","TCP","54","37870 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34336","16.098184","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34337","16.101107","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34338","16.101118","172.30.1.205","172.30.1.104","TCP","54","37870 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34339","16.102140","172.30.1.205","172.30.1.104","TCP","74","45236 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919328 TSecr=0 WS=128" "34340","16.102524","172.30.1.104","172.30.1.205","TCP","66","135 > 45236 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34341","16.102536","172.30.1.205","172.30.1.104","TCP","54","45236 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34342","16.102898","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34343","16.103259","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34344","16.103268","172.30.1.205","172.30.1.104","TCP","54","45236 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34345","16.105526","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34346","16.105975","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34347","16.105982","172.30.1.205","172.30.1.104","TCP","54","45236 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34348","16.107809","172.30.1.205","172.30.1.104","TCP","54","45236 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34349","16.107925","172.30.1.205","172.30.1.104","TCP","74","37874 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919334 TSecr=0 WS=128" "34350","16.108124","172.30.1.104","172.30.1.205","TCP","54","135 > 45236 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34351","16.108134","172.30.1.104","172.30.1.205","TCP","54","135 > 45236 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34352","16.108141","172.30.1.205","172.30.1.104","TCP","54","45236 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34353","16.108242","172.30.1.104","172.30.1.205","TCP","66","49671 > 37874 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34354","16.108251","172.30.1.205","172.30.1.104","TCP","54","37874 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34355","16.108594","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34356","16.109000","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34357","16.109007","172.30.1.205","172.30.1.104","TCP","54","37874 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34358","16.110891","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34359","16.111282","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34360","16.111288","172.30.1.205","172.30.1.104","TCP","54","37874 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34361","16.112655","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34362","16.115483","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34363","16.115493","172.30.1.205","172.30.1.104","TCP","54","37874 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34364","16.116463","172.30.1.205","172.30.1.104","TCP","74","45240 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919342 TSecr=0 WS=128" "34365","16.116802","172.30.1.104","172.30.1.205","TCP","66","135 > 45240 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34366","16.116814","172.30.1.205","172.30.1.104","TCP","54","45240 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34367","16.117175","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34368","16.117532","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34369","16.117541","172.30.1.205","172.30.1.104","TCP","54","45240 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34370","16.119762","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34371","16.120172","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34372","16.120179","172.30.1.205","172.30.1.104","TCP","54","45240 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34373","16.122041","172.30.1.205","172.30.1.104","TCP","54","45240 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34374","16.122190","172.30.1.205","172.30.1.104","TCP","74","37878 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919348 TSecr=0 WS=128" "34375","16.122368","172.30.1.104","172.30.1.205","TCP","54","135 > 45240 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34376","16.122382","172.30.1.104","172.30.1.205","TCP","54","135 > 45240 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34377","16.122390","172.30.1.205","172.30.1.104","TCP","54","45240 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34378","16.122500","172.30.1.104","172.30.1.205","TCP","66","49671 > 37878 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34379","16.122509","172.30.1.205","172.30.1.104","TCP","54","37878 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34380","16.122864","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34381","16.123186","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34382","16.123196","172.30.1.205","172.30.1.104","TCP","54","37878 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34383","16.125145","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34384","16.125540","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34385","16.125547","172.30.1.205","172.30.1.104","TCP","54","37878 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34386","16.126916","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34387","16.129712","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34388","16.129722","172.30.1.205","172.30.1.104","TCP","54","37878 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34389","16.130715","172.30.1.205","172.30.1.104","TCP","74","45244 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919357 TSecr=0 WS=128" "34390","16.131063","172.30.1.104","172.30.1.205","TCP","66","135 > 45244 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34391","16.131075","172.30.1.205","172.30.1.104","TCP","54","45244 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34392","16.131426","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34393","16.131743","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34394","16.131752","172.30.1.205","172.30.1.104","TCP","54","45244 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34395","16.133996","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34396","16.134513","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34397","16.134521","172.30.1.205","172.30.1.104","TCP","54","45244 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34398","16.136371","172.30.1.205","172.30.1.104","TCP","54","45244 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34399","16.136488","172.30.1.205","172.30.1.104","TCP","74","37882 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919362 TSecr=0 WS=128" "34400","16.136710","172.30.1.104","172.30.1.205","TCP","54","135 > 45244 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34401","16.136720","172.30.1.104","172.30.1.205","TCP","54","135 > 45244 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34402","16.136727","172.30.1.205","172.30.1.104","TCP","54","45244 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34403","16.136841","172.30.1.104","172.30.1.205","TCP","66","49671 > 37882 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34404","16.136851","172.30.1.205","172.30.1.104","TCP","54","37882 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34405","16.137205","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34406","16.137576","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34407","16.137587","172.30.1.205","172.30.1.104","TCP","54","37882 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34408","16.139475","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34409","16.139903","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34410","16.139910","172.30.1.205","172.30.1.104","TCP","54","37882 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34411","16.141298","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34412","16.144188","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34413","16.144199","172.30.1.205","172.30.1.104","TCP","54","37882 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34414","16.145188","172.30.1.205","172.30.1.104","TCP","74","45248 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919371 TSecr=0 WS=128" "34415","16.145510","172.30.1.104","172.30.1.205","TCP","66","135 > 45248 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34416","16.145521","172.30.1.205","172.30.1.104","TCP","54","45248 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34417","16.145881","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34418","16.146231","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34419","16.146240","172.30.1.205","172.30.1.104","TCP","54","45248 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34420","16.148446","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34421","16.148909","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34422","16.148915","172.30.1.205","172.30.1.104","TCP","54","45248 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34423","16.150732","172.30.1.205","172.30.1.104","TCP","54","45248 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34424","16.150844","172.30.1.205","172.30.1.104","TCP","74","37886 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919377 TSecr=0 WS=128" "34425","16.151063","172.30.1.104","172.30.1.205","TCP","54","135 > 45248 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34426","16.151091","172.30.1.104","172.30.1.205","TCP","54","135 > 45248 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34427","16.151097","172.30.1.205","172.30.1.104","TCP","54","45248 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34428","16.151182","172.30.1.104","172.30.1.205","TCP","66","49671 > 37886 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34429","16.151190","172.30.1.205","172.30.1.104","TCP","54","37886 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34430","16.151541","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34431","16.151894","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34432","16.151901","172.30.1.205","172.30.1.104","TCP","54","37886 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34433","16.153816","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34434","16.154252","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34435","16.154258","172.30.1.205","172.30.1.104","TCP","54","37886 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34436","16.155605","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34437","16.158384","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34438","16.158393","172.30.1.205","172.30.1.104","TCP","54","37886 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34439","16.159342","172.30.1.205","172.30.1.104","TCP","74","45252 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919385 TSecr=0 WS=128" "34440","16.159681","172.30.1.104","172.30.1.205","TCP","66","135 > 45252 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34441","16.159691","172.30.1.205","172.30.1.104","TCP","54","45252 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34442","16.160047","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34443","16.160382","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34444","16.160392","172.30.1.205","172.30.1.104","TCP","54","45252 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34445","16.162620","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34446","16.163056","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34447","16.163063","172.30.1.205","172.30.1.104","TCP","54","45252 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34448","16.164895","172.30.1.205","172.30.1.104","TCP","54","45252 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34449","16.165016","172.30.1.205","172.30.1.104","TCP","74","37890 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919391 TSecr=0 WS=128" "34450","16.165206","172.30.1.104","172.30.1.205","TCP","54","135 > 45252 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34451","16.165234","172.30.1.104","172.30.1.205","TCP","54","135 > 45252 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34452","16.165240","172.30.1.205","172.30.1.104","TCP","54","45252 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34453","16.165361","172.30.1.104","172.30.1.205","TCP","66","49671 > 37890 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34454","16.165370","172.30.1.205","172.30.1.104","TCP","54","37890 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34455","16.165716","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34456","16.166042","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34457","16.166051","172.30.1.205","172.30.1.104","TCP","54","37890 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34458","16.167935","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34459","16.168383","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34460","16.168390","172.30.1.205","172.30.1.104","TCP","54","37890 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34461","16.169767","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34462","16.172624","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34463","16.172634","172.30.1.205","172.30.1.104","TCP","54","37890 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34464","16.173626","172.30.1.205","172.30.1.104","TCP","74","45256 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919400 TSecr=0 WS=128" "34465","16.173943","172.30.1.104","172.30.1.205","TCP","66","135 > 45256 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34466","16.173961","172.30.1.205","172.30.1.104","TCP","54","45256 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34467","16.174322","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34468","16.174664","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34469","16.174673","172.30.1.205","172.30.1.104","TCP","54","45256 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34470","16.176882","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34471","16.177303","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34472","16.177310","172.30.1.205","172.30.1.104","TCP","54","45256 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34473","16.178164","172.30.1.205","172.30.1.104","TCP","54","37850 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34474","16.178215","172.30.1.205","172.30.1.104","TCP","54","37854 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34475","16.178248","172.30.1.205","172.30.1.104","TCP","54","37858 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34476","16.178276","172.30.1.205","172.30.1.104","TCP","54","37862 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34477","16.178304","172.30.1.205","172.30.1.104","TCP","54","37866 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34478","16.178332","172.30.1.205","172.30.1.104","TCP","54","37870 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34479","16.178359","172.30.1.205","172.30.1.104","TCP","54","37874 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34480","16.178382","172.30.1.205","172.30.1.104","TCP","54","37878 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34481","16.178409","172.30.1.205","172.30.1.104","TCP","54","37882 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34482","16.178435","172.30.1.205","172.30.1.104","TCP","54","37886 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34483","16.178456","172.30.1.205","172.30.1.104","TCP","54","37890 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34484","16.178534","172.30.1.205","172.30.1.104","TCP","54","37846 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34485","16.178592","172.30.1.104","172.30.1.205","TCP","54","49671 > 37850 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34486","16.178622","172.30.1.104","172.30.1.205","TCP","54","49671 > 37854 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34487","16.178649","172.30.1.104","172.30.1.205","TCP","54","49671 > 37850 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34488","16.178656","172.30.1.205","172.30.1.104","TCP","54","37850 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34489","16.178677","172.30.1.104","172.30.1.205","TCP","54","49671 > 37862 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34490","16.178706","172.30.1.104","172.30.1.205","TCP","54","49671 > 37858 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34491","16.178851","172.30.1.104","172.30.1.205","TCP","54","49671 > 37866 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34492","16.178879","172.30.1.104","172.30.1.205","TCP","54","49671 > 37862 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34493","16.178884","172.30.1.205","172.30.1.104","TCP","54","37862 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34494","16.178913","172.30.1.104","172.30.1.205","TCP","54","49671 > 37866 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34495","16.178918","172.30.1.205","172.30.1.104","TCP","54","37866 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34496","16.178941","172.30.1.104","172.30.1.205","TCP","54","49671 > 37854 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34497","16.178944","172.30.1.205","172.30.1.104","TCP","54","37854 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34498","16.178971","172.30.1.104","172.30.1.205","TCP","54","49671 > 37858 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34499","16.178975","172.30.1.205","172.30.1.104","TCP","54","37858 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34500","16.179000","172.30.1.104","172.30.1.205","TCP","54","49671 > 37870 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34501","16.179029","172.30.1.104","172.30.1.205","TCP","54","49671 > 37874 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34502","16.179122","172.30.1.104","172.30.1.205","TCP","54","49671 > 37870 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34503","16.179127","172.30.1.205","172.30.1.104","TCP","54","37870 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34504","16.179129","172.30.1.104","172.30.1.205","TCP","54","49671 > 37878 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34505","16.179136","172.30.1.104","172.30.1.205","TCP","54","49671 > 37874 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34506","16.179139","172.30.1.205","172.30.1.104","TCP","54","37874 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34507","16.179162","172.30.1.104","172.30.1.205","TCP","54","49671 > 37882 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34508","16.179196","172.30.1.104","172.30.1.205","TCP","54","49671 > 37878 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34509","16.179199","172.30.1.205","172.30.1.104","TCP","54","37878 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34510","16.179224","172.30.1.104","172.30.1.205","TCP","54","49671 > 37886 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34511","16.179253","172.30.1.104","172.30.1.205","TCP","54","49671 > 37882 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34512","16.179257","172.30.1.205","172.30.1.104","TCP","54","37882 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34513","16.179292","172.30.1.104","172.30.1.205","TCP","54","49671 > 37890 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34514","16.179322","172.30.1.104","172.30.1.205","TCP","54","49671 > 37886 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34515","16.179326","172.30.1.205","172.30.1.104","TCP","54","37886 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34516","16.179352","172.30.1.104","172.30.1.205","TCP","54","49671 > 37890 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34517","16.179356","172.30.1.205","172.30.1.104","TCP","54","37890 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34518","16.179381","172.30.1.104","172.30.1.205","TCP","54","49671 > 37846 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34519","16.179411","172.30.1.104","172.30.1.205","TCP","54","49671 > 37846 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34520","16.179415","172.30.1.205","172.30.1.104","TCP","54","37846 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34521","16.180190","172.30.1.205","172.30.1.104","TCP","54","45256 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34522","16.180303","172.30.1.205","172.30.1.104","TCP","74","37894 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919406 TSecr=0 WS=128" "34523","16.180476","172.30.1.104","172.30.1.205","TCP","54","135 > 45256 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34524","16.180506","172.30.1.104","172.30.1.205","TCP","54","135 > 45256 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34525","16.180512","172.30.1.205","172.30.1.104","TCP","54","45256 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34526","16.180609","172.30.1.104","172.30.1.205","TCP","66","49671 > 37894 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34527","16.180618","172.30.1.205","172.30.1.104","TCP","54","37894 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34528","16.181016","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34529","16.181331","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34530","16.181340","172.30.1.205","172.30.1.104","TCP","54","37894 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34531","16.183224","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34532","16.183641","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34533","16.183648","172.30.1.205","172.30.1.104","TCP","54","37894 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34534","16.185061","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34535","16.187839","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34536","16.187849","172.30.1.205","172.30.1.104","TCP","54","37894 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34537","16.188816","172.30.1.205","172.30.1.104","TCP","74","45260 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919415 TSecr=0 WS=128" "34538","16.189157","172.30.1.104","172.30.1.205","TCP","66","135 > 45260 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34539","16.189168","172.30.1.205","172.30.1.104","TCP","54","45260 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34540","16.189527","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34541","16.189837","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34542","16.189846","172.30.1.205","172.30.1.104","TCP","54","45260 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34543","16.192026","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34544","16.192495","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34545","16.192502","172.30.1.205","172.30.1.104","TCP","54","45260 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34546","16.194336","172.30.1.205","172.30.1.104","TCP","54","45260 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34547","16.194446","172.30.1.205","172.30.1.104","TCP","74","37898 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919420 TSecr=0 WS=128" "34548","16.194628","172.30.1.104","172.30.1.205","TCP","54","135 > 45260 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34549","16.194663","172.30.1.104","172.30.1.205","TCP","54","135 > 45260 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34550","16.194669","172.30.1.205","172.30.1.104","TCP","54","45260 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34551","16.194768","172.30.1.104","172.30.1.205","TCP","66","49671 > 37898 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34552","16.194776","172.30.1.205","172.30.1.104","TCP","54","37898 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34553","16.195120","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34554","16.195435","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34555","16.195444","172.30.1.205","172.30.1.104","TCP","54","37898 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34556","16.197337","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34557","16.197762","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34558","16.197768","172.30.1.205","172.30.1.104","TCP","54","37898 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34559","16.199122","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34560","16.202078","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34561","16.202087","172.30.1.205","172.30.1.104","TCP","54","37898 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34562","16.203037","172.30.1.205","172.30.1.104","TCP","74","45264 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919429 TSecr=0 WS=128" "34563","16.203364","172.30.1.104","172.30.1.205","TCP","66","135 > 45264 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34564","16.203375","172.30.1.205","172.30.1.104","TCP","54","45264 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34565","16.203725","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34566","16.204051","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34567","16.204059","172.30.1.205","172.30.1.104","TCP","54","45264 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34568","16.206276","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34569","16.206719","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34570","16.206726","172.30.1.205","172.30.1.104","TCP","54","45264 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34571","16.208522","172.30.1.205","172.30.1.104","TCP","54","45264 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34572","16.208636","172.30.1.205","172.30.1.104","TCP","74","37902 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919435 TSecr=0 WS=128" "34573","16.208817","172.30.1.104","172.30.1.205","TCP","54","135 > 45264 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34574","16.208839","172.30.1.104","172.30.1.205","TCP","54","135 > 45264 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34575","16.208845","172.30.1.205","172.30.1.104","TCP","54","45264 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34576","16.208954","172.30.1.104","172.30.1.205","TCP","66","49671 > 37902 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34577","16.208962","172.30.1.205","172.30.1.104","TCP","54","37902 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34578","16.209321","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34579","16.209653","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34580","16.209662","172.30.1.205","172.30.1.104","TCP","54","37902 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34581","16.211524","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34582","16.211943","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34583","16.211949","172.30.1.205","172.30.1.104","TCP","54","37902 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34584","16.213336","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34585","16.216517","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34586","16.216525","172.30.1.205","172.30.1.104","TCP","54","37902 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34587","16.217492","172.30.1.205","172.30.1.104","TCP","74","45268 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919443 TSecr=0 WS=128" "34588","16.217823","172.30.1.104","172.30.1.205","TCP","66","135 > 45268 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34589","16.217834","172.30.1.205","172.30.1.104","TCP","54","45268 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34590","16.218191","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34591","16.218525","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34592","16.218534","172.30.1.205","172.30.1.104","TCP","54","45268 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34593","16.220736","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34594","16.221179","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34595","16.221186","172.30.1.205","172.30.1.104","TCP","54","45268 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34596","16.223014","172.30.1.205","172.30.1.104","TCP","54","45268 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34597","16.223132","172.30.1.205","172.30.1.104","TCP","74","37906 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919449 TSecr=0 WS=128" "34598","16.223375","172.30.1.104","172.30.1.205","TCP","54","135 > 45268 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34599","16.223401","172.30.1.104","172.30.1.205","TCP","54","135 > 45268 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34600","16.223407","172.30.1.205","172.30.1.104","TCP","54","45268 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34601","16.223450","172.30.1.104","172.30.1.205","TCP","66","49671 > 37906 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34602","16.223459","172.30.1.205","172.30.1.104","TCP","54","37906 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34603","16.223805","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34604","16.224154","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34605","16.224163","172.30.1.205","172.30.1.104","TCP","54","37906 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34606","16.226086","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34607","16.226534","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34608","16.226541","172.30.1.205","172.30.1.104","TCP","54","37906 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34609","16.227894","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34610","16.231439","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34611","16.231449","172.30.1.205","172.30.1.104","TCP","54","37906 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34612","16.232415","172.30.1.205","172.30.1.104","TCP","74","45272 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919458 TSecr=0 WS=128" "34613","16.232784","172.30.1.104","172.30.1.205","TCP","66","135 > 45272 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34614","16.232794","172.30.1.205","172.30.1.104","TCP","54","45272 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34615","16.233144","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34616","16.233472","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34617","16.233481","172.30.1.205","172.30.1.104","TCP","54","45272 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34618","16.235683","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34619","16.236144","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34620","16.236150","172.30.1.205","172.30.1.104","TCP","54","45272 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34621","16.237983","172.30.1.205","172.30.1.104","TCP","54","45272 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34622","16.238097","172.30.1.205","172.30.1.104","TCP","74","37910 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919464 TSecr=0 WS=128" "34623","16.238310","172.30.1.104","172.30.1.205","TCP","54","135 > 45272 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34624","16.238383","172.30.1.104","172.30.1.205","TCP","66","49671 > 37910 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34625","16.238398","172.30.1.205","172.30.1.104","TCP","54","37910 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34626","16.238425","172.30.1.104","172.30.1.205","TCP","54","135 > 45272 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34627","16.238430","172.30.1.205","172.30.1.104","TCP","54","45272 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34628","16.238791","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34629","16.239101","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34630","16.239110","172.30.1.205","172.30.1.104","TCP","54","37910 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34631","16.241008","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34632","16.241408","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34633","16.241415","172.30.1.205","172.30.1.104","TCP","54","37910 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34634","16.242778","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34635","16.245671","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34636","16.245681","172.30.1.205","172.30.1.104","TCP","54","37910 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34637","16.246634","172.30.1.205","172.30.1.104","TCP","74","45276 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919473 TSecr=0 WS=128" "34638","16.246947","172.30.1.104","172.30.1.205","TCP","66","135 > 45276 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34639","16.246958","172.30.1.205","172.30.1.104","TCP","54","45276 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34640","16.247308","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34641","16.247625","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34642","16.247634","172.30.1.205","172.30.1.104","TCP","54","45276 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34643","16.249871","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34644","16.251812","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34645","16.251818","172.30.1.205","172.30.1.104","TCP","54","45276 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34646","16.253666","172.30.1.205","172.30.1.104","TCP","54","45276 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34647","16.253779","172.30.1.205","172.30.1.104","TCP","74","37914 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919480 TSecr=0 WS=128" "34648","16.253943","172.30.1.104","172.30.1.205","TCP","54","135 > 45276 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34649","16.254008","172.30.1.104","172.30.1.205","TCP","54","135 > 45276 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34650","16.254014","172.30.1.205","172.30.1.104","TCP","54","45276 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34651","16.254108","172.30.1.104","172.30.1.205","TCP","66","49671 > 37914 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34652","16.254116","172.30.1.205","172.30.1.104","TCP","54","37914 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34653","16.254473","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34654","16.254774","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34655","16.254784","172.30.1.205","172.30.1.104","TCP","54","37914 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34656","16.256677","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34657","16.257718","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34658","16.257725","172.30.1.205","172.30.1.104","TCP","54","37914 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34659","16.259109","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34660","16.262154","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34661","16.262164","172.30.1.205","172.30.1.104","TCP","54","37914 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34662","16.263169","172.30.1.205","172.30.1.104","TCP","74","45280 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919489 TSecr=0 WS=128" "34663","16.263521","172.30.1.104","172.30.1.205","TCP","66","135 > 45280 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34664","16.263544","172.30.1.205","172.30.1.104","TCP","54","45280 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34665","16.263914","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34666","16.264245","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34667","16.264253","172.30.1.205","172.30.1.104","TCP","54","45280 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34668","16.266520","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34669","16.266996","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34670","16.267003","172.30.1.205","172.30.1.104","TCP","54","45280 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34671","16.268840","172.30.1.205","172.30.1.104","TCP","54","45280 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34672","16.268950","172.30.1.205","172.30.1.104","TCP","74","37918 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919495 TSecr=0 WS=128" "34673","16.269134","172.30.1.104","172.30.1.205","TCP","54","135 > 45280 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34674","16.269162","172.30.1.104","172.30.1.205","TCP","54","135 > 45280 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34675","16.269168","172.30.1.205","172.30.1.104","TCP","54","45280 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34676","16.269260","172.30.1.104","172.30.1.205","TCP","66","49671 > 37918 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34677","16.269268","172.30.1.205","172.30.1.104","TCP","54","37918 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34678","16.269617","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34679","16.269915","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34680","16.269922","172.30.1.205","172.30.1.104","TCP","54","37918 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34681","16.271814","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34682","16.272216","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34683","16.272222","172.30.1.205","172.30.1.104","TCP","54","37918 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34684","16.273655","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34685","16.276572","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34686","16.276582","172.30.1.205","172.30.1.104","TCP","54","37918 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34687","16.277580","172.30.1.205","172.30.1.104","TCP","74","45284 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919504 TSecr=0 WS=128" "34688","16.277919","172.30.1.104","172.30.1.205","TCP","66","135 > 45284 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34689","16.277929","172.30.1.205","172.30.1.104","TCP","54","45284 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34690","16.278281","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34691","16.278607","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34692","16.278616","172.30.1.205","172.30.1.104","TCP","54","45284 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34693","16.280826","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34694","16.281248","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34695","16.281254","172.30.1.205","172.30.1.104","TCP","54","45284 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34696","16.283063","172.30.1.205","172.30.1.104","TCP","54","45284 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34697","16.283174","172.30.1.205","172.30.1.104","TCP","74","37922 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919509 TSecr=0 WS=128" "34698","16.283352","172.30.1.104","172.30.1.205","TCP","54","135 > 45284 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34699","16.283376","172.30.1.104","172.30.1.205","TCP","54","135 > 45284 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34700","16.283382","172.30.1.205","172.30.1.104","TCP","54","45284 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34701","16.283472","172.30.1.104","172.30.1.205","TCP","66","49671 > 37922 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34702","16.283480","172.30.1.205","172.30.1.104","TCP","54","37922 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34703","16.283825","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34704","16.284665","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34705","16.284673","172.30.1.205","172.30.1.104","TCP","54","37922 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34706","16.286565","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34707","16.286965","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34708","16.286972","172.30.1.205","172.30.1.104","TCP","54","37922 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34709","16.288337","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34710","16.291266","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34711","16.291277","172.30.1.205","172.30.1.104","TCP","54","37922 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34712","16.292242","172.30.1.205","172.30.1.104","TCP","74","45288 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919518 TSecr=0 WS=128" "34713","16.292587","172.30.1.104","172.30.1.205","TCP","66","135 > 45288 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34714","16.292598","172.30.1.205","172.30.1.104","TCP","54","45288 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34715","16.292978","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34716","16.293343","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34717","16.293352","172.30.1.205","172.30.1.104","TCP","54","45288 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34718","16.295546","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34719","16.295989","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34720","16.295995","172.30.1.205","172.30.1.104","TCP","54","45288 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34721","16.297830","172.30.1.205","172.30.1.104","TCP","54","45288 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34722","16.297941","172.30.1.205","172.30.1.104","TCP","74","37926 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919524 TSecr=0 WS=128" "34723","16.298125","172.30.1.104","172.30.1.205","TCP","54","135 > 45288 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34724","16.298151","172.30.1.104","172.30.1.205","TCP","54","135 > 45288 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34725","16.298157","172.30.1.205","172.30.1.104","TCP","54","45288 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34726","16.298252","172.30.1.104","172.30.1.205","TCP","66","49671 > 37926 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34727","16.298260","172.30.1.205","172.30.1.104","TCP","54","37926 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34728","16.298608","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34729","16.298944","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34730","16.298953","172.30.1.205","172.30.1.104","TCP","54","37926 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34731","16.300834","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34732","16.301264","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34733","16.301270","172.30.1.205","172.30.1.104","TCP","54","37926 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34734","16.302614","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34735","16.305462","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34736","16.305472","172.30.1.205","172.30.1.104","TCP","54","37926 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34737","16.306420","172.30.1.205","172.30.1.104","TCP","74","45292 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919532 TSecr=0 WS=128" "34738","16.306774","172.30.1.104","172.30.1.205","TCP","66","135 > 45292 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34739","16.306784","172.30.1.205","172.30.1.104","TCP","54","45292 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34740","16.307134","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34741","16.307519","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34742","16.307527","172.30.1.205","172.30.1.104","TCP","54","45292 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34743","16.309749","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34744","16.310147","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34745","16.310154","172.30.1.205","172.30.1.104","TCP","54","45292 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34746","16.311987","172.30.1.205","172.30.1.104","TCP","54","45292 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34747","16.312100","172.30.1.205","172.30.1.104","TCP","74","37930 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919538 TSecr=0 WS=128" "34748","16.312256","172.30.1.104","172.30.1.205","TCP","54","135 > 45292 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34749","16.312524","172.30.1.104","172.30.1.205","TCP","66","49671 > 37930 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34750","16.312533","172.30.1.205","172.30.1.104","TCP","54","37930 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34751","16.312909","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34752","16.314019","172.30.1.104","172.30.1.205","TCP","54","135 > 45292 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34753","16.314032","172.30.1.205","172.30.1.104","TCP","54","45292 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34754","16.314147","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34755","16.314156","172.30.1.205","172.30.1.104","TCP","54","37930 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34756","16.316021","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34757","16.316415","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34758","16.316420","172.30.1.205","172.30.1.104","TCP","54","37930 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34759","16.317805","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34760","16.320583","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34761","16.320593","172.30.1.205","172.30.1.104","TCP","54","37930 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34762","16.321565","172.30.1.205","172.30.1.104","TCP","74","45296 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919547 TSecr=0 WS=128" "34763","16.321890","172.30.1.104","172.30.1.205","TCP","66","135 > 45296 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34764","16.321901","172.30.1.205","172.30.1.104","TCP","54","45296 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34765","16.322258","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34766","16.322585","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34767","16.322593","172.30.1.205","172.30.1.104","TCP","54","45296 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34768","16.324807","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34769","16.325224","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34770","16.325231","172.30.1.205","172.30.1.104","TCP","54","45296 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34771","16.327041","172.30.1.205","172.30.1.104","TCP","54","45296 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34772","16.327154","172.30.1.205","172.30.1.104","TCP","74","37934 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919553 TSecr=0 WS=128" "34773","16.327333","172.30.1.104","172.30.1.205","TCP","54","135 > 45296 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34774","16.327401","172.30.1.104","172.30.1.205","TCP","54","135 > 45296 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34775","16.327407","172.30.1.205","172.30.1.104","TCP","54","45296 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34776","16.327499","172.30.1.104","172.30.1.205","TCP","66","49671 > 37934 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34777","16.327507","172.30.1.205","172.30.1.104","TCP","54","37934 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34778","16.327857","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34779","16.328155","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34780","16.328162","172.30.1.205","172.30.1.104","TCP","54","37934 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34781","16.330078","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34782","16.330432","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34783","16.330439","172.30.1.205","172.30.1.104","TCP","54","37934 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34784","16.331795","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34785","16.334596","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34786","16.334608","172.30.1.205","172.30.1.104","TCP","54","37934 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34787","16.335571","172.30.1.205","172.30.1.104","TCP","74","45300 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919561 TSecr=0 WS=128" "34788","16.335898","172.30.1.104","172.30.1.205","TCP","66","135 > 45300 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34789","16.335909","172.30.1.205","172.30.1.104","TCP","54","45300 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34790","16.336261","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34791","16.336559","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34792","16.336568","172.30.1.205","172.30.1.104","TCP","54","45300 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34793","16.338789","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34794","16.339230","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34795","16.339237","172.30.1.205","172.30.1.104","TCP","54","45300 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34796","16.341082","172.30.1.205","172.30.1.104","TCP","54","45300 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34797","16.341195","172.30.1.205","172.30.1.104","TCP","74","37938 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919567 TSecr=0 WS=128" "34798","16.341379","172.30.1.104","172.30.1.205","TCP","54","135 > 45300 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34799","16.341394","172.30.1.104","172.30.1.205","TCP","54","135 > 45300 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34800","16.341400","172.30.1.205","172.30.1.104","TCP","54","45300 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34801","16.341488","172.30.1.104","172.30.1.205","TCP","66","49671 > 37938 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34802","16.341497","172.30.1.205","172.30.1.104","TCP","54","37938 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34803","16.341842","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34804","16.342179","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34805","16.342188","172.30.1.205","172.30.1.104","TCP","54","37938 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34806","16.344104","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34807","16.344484","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34808","16.344490","172.30.1.205","172.30.1.104","TCP","54","37938 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34809","16.345889","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34810","16.348701","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34811","16.348710","172.30.1.205","172.30.1.104","TCP","54","37938 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34812","16.349679","172.30.1.205","172.30.1.104","TCP","74","45304 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919576 TSecr=0 WS=128" "34813","16.349976","172.30.1.104","172.30.1.205","TCP","66","135 > 45304 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34814","16.349987","172.30.1.205","172.30.1.104","TCP","54","45304 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34815","16.350358","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34816","16.350641","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34817","16.350650","172.30.1.205","172.30.1.104","TCP","54","45304 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34818","16.352874","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34819","16.353269","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34820","16.353276","172.30.1.205","172.30.1.104","TCP","54","45304 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34821","16.354127","172.30.1.205","172.30.1.104","TCP","54","37898 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34822","16.354177","172.30.1.205","172.30.1.104","TCP","54","37902 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34823","16.354209","172.30.1.205","172.30.1.104","TCP","54","37906 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34824","16.354238","172.30.1.205","172.30.1.104","TCP","54","37910 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34825","16.354266","172.30.1.205","172.30.1.104","TCP","54","37914 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34826","16.354291","172.30.1.205","172.30.1.104","TCP","54","37918 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34827","16.354318","172.30.1.205","172.30.1.104","TCP","54","37922 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34828","16.354346","172.30.1.205","172.30.1.104","TCP","54","37926 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34829","16.354369","172.30.1.205","172.30.1.104","TCP","54","37930 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34830","16.354396","172.30.1.205","172.30.1.104","TCP","54","37934 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34831","16.354423","172.30.1.205","172.30.1.104","TCP","54","37938 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34832","16.354501","172.30.1.205","172.30.1.104","TCP","54","37894 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "34833","16.354734","172.30.1.104","172.30.1.205","TCP","54","49671 > 37898 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34834","16.354756","172.30.1.104","172.30.1.205","TCP","54","49671 > 37902 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34835","16.354783","172.30.1.104","172.30.1.205","TCP","54","49671 > 37906 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34836","16.354807","172.30.1.104","172.30.1.205","TCP","54","49671 > 37898 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34837","16.354814","172.30.1.205","172.30.1.104","TCP","54","37898 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34838","16.354833","172.30.1.104","172.30.1.205","TCP","54","49671 > 37902 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34839","16.354837","172.30.1.205","172.30.1.104","TCP","54","37902 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34840","16.354864","172.30.1.104","172.30.1.205","TCP","54","49671 > 37906 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34841","16.354868","172.30.1.205","172.30.1.104","TCP","54","37906 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34842","16.354996","172.30.1.104","172.30.1.205","TCP","54","49671 > 37910 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34843","16.355015","172.30.1.104","172.30.1.205","TCP","54","49671 > 37914 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34844","16.355047","172.30.1.104","172.30.1.205","TCP","54","49671 > 37918 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34845","16.355074","172.30.1.104","172.30.1.205","TCP","54","49671 > 37922 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34846","16.355101","172.30.1.104","172.30.1.205","TCP","54","49671 > 37926 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34847","16.355125","172.30.1.104","172.30.1.205","TCP","54","49671 > 37930 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34848","16.355152","172.30.1.104","172.30.1.205","TCP","54","49671 > 37934 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34849","16.355199","172.30.1.104","172.30.1.205","TCP","54","49671 > 37894 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34850","16.355230","172.30.1.104","172.30.1.205","TCP","54","49671 > 37894 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34851","16.355235","172.30.1.205","172.30.1.104","TCP","54","37894 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34852","16.355258","172.30.1.104","172.30.1.205","TCP","54","49671 > 37938 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34853","16.355285","172.30.1.104","172.30.1.205","TCP","54","49671 > 37938 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34854","16.355289","172.30.1.205","172.30.1.104","TCP","54","37938 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34855","16.355312","172.30.1.104","172.30.1.205","TCP","54","49671 > 37934 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34856","16.355315","172.30.1.205","172.30.1.104","TCP","54","37934 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34857","16.355340","172.30.1.104","172.30.1.205","TCP","54","49671 > 37930 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34858","16.355344","172.30.1.205","172.30.1.104","TCP","54","37930 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34859","16.355370","172.30.1.104","172.30.1.205","TCP","54","49671 > 37926 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34860","16.355373","172.30.1.205","172.30.1.104","TCP","54","37926 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34861","16.355397","172.30.1.104","172.30.1.205","TCP","54","49671 > 37922 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34862","16.355400","172.30.1.205","172.30.1.104","TCP","54","37922 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34863","16.355423","172.30.1.104","172.30.1.205","TCP","54","49671 > 37910 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34864","16.355426","172.30.1.205","172.30.1.104","TCP","54","37910 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34865","16.355449","172.30.1.104","172.30.1.205","TCP","54","49671 > 37914 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34866","16.355453","172.30.1.205","172.30.1.104","TCP","54","37914 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34867","16.355478","172.30.1.104","172.30.1.205","TCP","54","49671 > 37918 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "34868","16.355481","172.30.1.205","172.30.1.104","TCP","54","37918 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "34869","16.356109","172.30.1.205","172.30.1.104","TCP","54","45304 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34870","16.356220","172.30.1.205","172.30.1.104","TCP","74","37942 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919582 TSecr=0 WS=128" "34871","16.356395","172.30.1.104","172.30.1.205","TCP","54","135 > 45304 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34872","16.356427","172.30.1.104","172.30.1.205","TCP","54","135 > 45304 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34873","16.356432","172.30.1.205","172.30.1.104","TCP","54","45304 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34874","16.356572","172.30.1.104","172.30.1.205","TCP","66","49671 > 37942 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34875","16.356580","172.30.1.205","172.30.1.104","TCP","54","37942 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34876","16.356963","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34877","16.357282","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34878","16.357289","172.30.1.205","172.30.1.104","TCP","54","37942 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34879","16.359164","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34880","16.359555","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34881","16.359562","172.30.1.205","172.30.1.104","TCP","54","37942 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34882","16.360955","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34883","16.363807","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34884","16.363818","172.30.1.205","172.30.1.104","TCP","54","37942 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34885","16.364794","172.30.1.205","172.30.1.104","TCP","74","45308 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919591 TSecr=0 WS=128" "34886","16.365170","172.30.1.104","172.30.1.205","TCP","66","135 > 45308 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34887","16.365183","172.30.1.205","172.30.1.104","TCP","54","45308 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34888","16.365556","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34889","16.365897","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34890","16.365907","172.30.1.205","172.30.1.104","TCP","54","45308 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34891","16.368093","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34892","16.368552","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34893","16.368559","172.30.1.205","172.30.1.104","TCP","54","45308 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34894","16.370395","172.30.1.205","172.30.1.104","TCP","54","45308 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34895","16.370513","172.30.1.205","172.30.1.104","TCP","74","37946 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919596 TSecr=0 WS=128" "34896","16.370697","172.30.1.104","172.30.1.205","TCP","54","135 > 45308 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34897","16.370741","172.30.1.104","172.30.1.205","TCP","54","135 > 45308 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34898","16.370747","172.30.1.205","172.30.1.104","TCP","54","45308 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34899","16.370845","172.30.1.104","172.30.1.205","TCP","66","49671 > 37946 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34900","16.370853","172.30.1.205","172.30.1.104","TCP","54","37946 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34901","16.371202","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34902","16.371577","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34903","16.371586","172.30.1.205","172.30.1.104","TCP","54","37946 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34904","16.373502","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34905","16.373912","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34906","16.373919","172.30.1.205","172.30.1.104","TCP","54","37946 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34907","16.375280","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34908","16.378146","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34909","16.378156","172.30.1.205","172.30.1.104","TCP","54","37946 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34910","16.379132","172.30.1.205","172.30.1.104","TCP","74","45312 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919605 TSecr=0 WS=128" "34911","16.379498","172.30.1.104","172.30.1.205","TCP","66","135 > 45312 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34912","16.379509","172.30.1.205","172.30.1.104","TCP","54","45312 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34913","16.379863","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34914","16.380221","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34915","16.380230","172.30.1.205","172.30.1.104","TCP","54","45312 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34916","16.382470","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34917","16.382940","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34918","16.382947","172.30.1.205","172.30.1.104","TCP","54","45312 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34919","16.384762","172.30.1.205","172.30.1.104","TCP","54","45312 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34920","16.384898","172.30.1.205","172.30.1.104","TCP","74","37950 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919611 TSecr=0 WS=128" "34921","16.385070","172.30.1.104","172.30.1.205","TCP","54","135 > 45312 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34922","16.385108","172.30.1.104","172.30.1.205","TCP","54","135 > 45312 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34923","16.385114","172.30.1.205","172.30.1.104","TCP","54","45312 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34924","16.385233","172.30.1.104","172.30.1.205","TCP","66","49671 > 37950 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34925","16.385241","172.30.1.205","172.30.1.104","TCP","54","37950 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34926","16.385588","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34927","16.385912","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34928","16.385920","172.30.1.205","172.30.1.104","TCP","54","37950 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34929","16.387806","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34930","16.388213","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34931","16.388220","172.30.1.205","172.30.1.104","TCP","54","37950 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34932","16.389607","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34933","16.392533","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34934","16.392543","172.30.1.205","172.30.1.104","TCP","54","37950 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34935","16.393511","172.30.1.205","172.30.1.104","TCP","74","45316 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919619 TSecr=0 WS=128" "34936","16.393892","172.30.1.104","172.30.1.205","TCP","66","135 > 45316 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34937","16.393902","172.30.1.205","172.30.1.104","TCP","54","45316 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34938","16.394257","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34939","16.394584","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34940","16.394593","172.30.1.205","172.30.1.104","TCP","54","45316 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34941","16.396797","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34942","16.397260","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34943","16.397267","172.30.1.205","172.30.1.104","TCP","54","45316 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34944","16.399088","172.30.1.205","172.30.1.104","TCP","54","45316 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34945","16.399199","172.30.1.205","172.30.1.104","TCP","74","37954 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919625 TSecr=0 WS=128" "34946","16.399430","172.30.1.104","172.30.1.205","TCP","54","135 > 45316 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34947","16.399460","172.30.1.104","172.30.1.205","TCP","54","135 > 45316 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34948","16.399465","172.30.1.205","172.30.1.104","TCP","54","45316 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34949","16.399566","172.30.1.104","172.30.1.205","TCP","66","49671 > 37954 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34950","16.399574","172.30.1.205","172.30.1.104","TCP","54","37954 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34951","16.399930","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34952","16.400264","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34953","16.400273","172.30.1.205","172.30.1.104","TCP","54","37954 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34954","16.402184","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34955","16.402688","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34956","16.402695","172.30.1.205","172.30.1.104","TCP","54","37954 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34957","16.404059","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34958","16.406944","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34959","16.406954","172.30.1.205","172.30.1.104","TCP","54","37954 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34960","16.407911","172.30.1.205","172.30.1.104","TCP","74","45320 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919634 TSecr=0 WS=128" "34961","16.408293","172.30.1.104","172.30.1.205","TCP","66","135 > 45320 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34962","16.408304","172.30.1.205","172.30.1.104","TCP","54","45320 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34963","16.408654","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34964","16.409019","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34965","16.409028","172.30.1.205","172.30.1.104","TCP","54","45320 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34966","16.411235","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34967","16.411672","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34968","16.411678","172.30.1.205","172.30.1.104","TCP","54","45320 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34969","16.413531","172.30.1.205","172.30.1.104","TCP","54","45320 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34970","16.413646","172.30.1.205","172.30.1.104","TCP","74","37958 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919640 TSecr=0 WS=128" "34971","16.413831","172.30.1.104","172.30.1.205","TCP","54","135 > 45320 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34972","16.413881","172.30.1.104","172.30.1.205","TCP","54","135 > 45320 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34973","16.413886","172.30.1.205","172.30.1.104","TCP","54","45320 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34974","16.413991","172.30.1.104","172.30.1.205","TCP","66","49671 > 37958 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34975","16.414000","172.30.1.205","172.30.1.104","TCP","54","37958 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34976","16.414345","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "34977","16.414686","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34978","16.414694","172.30.1.205","172.30.1.104","TCP","54","37958 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34979","16.416586","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "34980","16.417034","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "34981","16.417041","172.30.1.205","172.30.1.104","TCP","54","37958 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "34982","16.418412","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "34983","16.421419","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "34984","16.421429","172.30.1.205","172.30.1.104","TCP","54","37958 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "34985","16.422383","172.30.1.205","172.30.1.104","TCP","74","45324 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919648 TSecr=0 WS=128" "34986","16.422735","172.30.1.104","172.30.1.205","TCP","66","135 > 45324 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "34987","16.422745","172.30.1.205","172.30.1.104","TCP","54","45324 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "34988","16.423096","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "34989","16.423432","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "34990","16.423441","172.30.1.205","172.30.1.104","TCP","54","45324 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "34991","16.425663","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "34992","16.426132","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "34993","16.426139","172.30.1.205","172.30.1.104","TCP","54","45324 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "34994","16.427989","172.30.1.205","172.30.1.104","TCP","54","45324 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "34995","16.428100","172.30.1.205","172.30.1.104","TCP","74","37962 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919654 TSecr=0 WS=128" "34996","16.428315","172.30.1.104","172.30.1.205","TCP","54","135 > 45324 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34997","16.428390","172.30.1.104","172.30.1.205","TCP","54","135 > 45324 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "34998","16.428396","172.30.1.205","172.30.1.104","TCP","54","45324 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "34999","16.428500","172.30.1.104","172.30.1.205","TCP","66","49671 > 37962 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35000","16.428509","172.30.1.205","172.30.1.104","TCP","54","37962 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35001","16.428886","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35002","16.430318","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35003","16.430325","172.30.1.205","172.30.1.104","TCP","54","37962 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35004","16.432203","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35005","16.432629","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35006","16.432635","172.30.1.205","172.30.1.104","TCP","54","37962 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35007","16.434021","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35008","16.437023","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35009","16.437033","172.30.1.205","172.30.1.104","TCP","54","37962 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35010","16.437999","172.30.1.205","172.30.1.104","TCP","74","45328 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919664 TSecr=0 WS=128" "35011","16.438350","172.30.1.104","172.30.1.205","TCP","66","135 > 45328 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35012","16.438362","172.30.1.205","172.30.1.104","TCP","54","45328 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35013","16.438717","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35014","16.439058","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35015","16.439067","172.30.1.205","172.30.1.104","TCP","54","45328 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35016","16.441305","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35017","16.441761","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35018","16.441768","172.30.1.205","172.30.1.104","TCP","54","45328 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35019","16.443622","172.30.1.205","172.30.1.104","TCP","54","45328 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35020","16.443738","172.30.1.205","172.30.1.104","TCP","74","37966 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919670 TSecr=0 WS=128" "35021","16.443951","172.30.1.104","172.30.1.205","TCP","54","135 > 45328 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35022","16.443977","172.30.1.104","172.30.1.205","TCP","54","135 > 45328 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35023","16.443983","172.30.1.205","172.30.1.104","TCP","54","45328 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35024","16.444075","172.30.1.104","172.30.1.205","TCP","66","49671 > 37966 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35025","16.444083","172.30.1.205","172.30.1.104","TCP","54","37966 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35026","16.444448","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35027","16.445449","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35028","16.445458","172.30.1.205","172.30.1.104","TCP","54","37966 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35029","16.447351","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35030","16.447789","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35031","16.447796","172.30.1.205","172.30.1.104","TCP","54","37966 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35032","16.449197","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35033","16.452172","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35034","16.452182","172.30.1.205","172.30.1.104","TCP","54","37966 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35035","16.453161","172.30.1.205","172.30.1.104","TCP","74","45332 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919679 TSecr=0 WS=128" "35036","16.453519","172.30.1.104","172.30.1.205","TCP","66","135 > 45332 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35037","16.453530","172.30.1.205","172.30.1.104","TCP","54","45332 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35038","16.453886","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35039","16.454214","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35040","16.454223","172.30.1.205","172.30.1.104","TCP","54","45332 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35041","16.456410","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35042","16.456881","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35043","16.456888","172.30.1.205","172.30.1.104","TCP","54","45332 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35044","16.458702","172.30.1.205","172.30.1.104","TCP","54","45332 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35045","16.458822","172.30.1.205","172.30.1.104","TCP","74","37970 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919685 TSecr=0 WS=128" "35046","16.459031","172.30.1.104","172.30.1.205","TCP","54","135 > 45332 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35047","16.459073","172.30.1.104","172.30.1.205","TCP","54","135 > 45332 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35048","16.459079","172.30.1.205","172.30.1.104","TCP","54","45332 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35049","16.459168","172.30.1.104","172.30.1.205","TCP","66","49671 > 37970 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35050","16.459177","172.30.1.205","172.30.1.104","TCP","54","37970 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35051","16.459523","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35052","16.459842","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35053","16.459849","172.30.1.205","172.30.1.104","TCP","54","37970 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35054","16.461756","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35055","16.462228","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35056","16.462234","172.30.1.205","172.30.1.104","TCP","54","37970 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35057","16.463612","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35058","16.466654","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35059","16.466664","172.30.1.205","172.30.1.104","TCP","54","37970 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35060","16.467689","172.30.1.205","172.30.1.104","TCP","74","45336 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919694 TSecr=0 WS=128" "35061","16.468114","172.30.1.104","172.30.1.205","TCP","66","135 > 45336 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35062","16.468126","172.30.1.205","172.30.1.104","TCP","54","45336 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35063","16.468478","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35064","16.468831","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35065","16.468845","172.30.1.205","172.30.1.104","TCP","54","45336 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35066","16.471157","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35067","16.471665","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35068","16.471673","172.30.1.205","172.30.1.104","TCP","54","45336 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35069","16.473536","172.30.1.205","172.30.1.104","TCP","54","45336 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35070","16.473665","172.30.1.205","172.30.1.104","TCP","74","37974 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919700 TSecr=0 WS=128" "35071","16.473879","172.30.1.104","172.30.1.205","TCP","54","135 > 45336 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35072","16.473903","172.30.1.104","172.30.1.205","TCP","54","135 > 45336 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35073","16.473910","172.30.1.205","172.30.1.104","TCP","54","45336 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35074","16.474009","172.30.1.104","172.30.1.205","TCP","66","49671 > 37974 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35075","16.474017","172.30.1.205","172.30.1.104","TCP","54","37974 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35076","16.474361","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35077","16.474696","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35078","16.474706","172.30.1.205","172.30.1.104","TCP","54","37974 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35079","16.476579","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35080","16.476992","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35081","16.476998","172.30.1.205","172.30.1.104","TCP","54","37974 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35082","16.478351","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35083","16.483407","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35084","16.483417","172.30.1.205","172.30.1.104","TCP","54","37974 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35085","16.484384","172.30.1.205","172.30.1.104","TCP","74","45340 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919710 TSecr=0 WS=128" "35086","16.484754","172.30.1.104","172.30.1.205","TCP","66","135 > 45340 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35087","16.484767","172.30.1.205","172.30.1.104","TCP","54","45340 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35088","16.485130","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35089","16.485467","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35090","16.485476","172.30.1.205","172.30.1.104","TCP","54","45340 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35091","16.487661","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35092","16.488122","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35093","16.488128","172.30.1.205","172.30.1.104","TCP","54","45340 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35094","16.489963","172.30.1.205","172.30.1.104","TCP","54","45340 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35095","16.490097","172.30.1.205","172.30.1.104","TCP","74","37978 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919716 TSecr=0 WS=128" "35096","16.490312","172.30.1.104","172.30.1.205","TCP","54","135 > 45340 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35097","16.490332","172.30.1.104","172.30.1.205","TCP","54","135 > 45340 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35098","16.490345","172.30.1.205","172.30.1.104","TCP","54","45340 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35099","16.490451","172.30.1.104","172.30.1.205","TCP","66","49671 > 37978 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35100","16.490462","172.30.1.205","172.30.1.104","TCP","54","37978 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35101","16.490892","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35102","16.491228","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35103","16.491238","172.30.1.205","172.30.1.104","TCP","54","37978 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35104","16.493169","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35105","16.493583","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35106","16.493590","172.30.1.205","172.30.1.104","TCP","54","37978 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35107","16.494955","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35108","16.498999","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35109","16.499010","172.30.1.205","172.30.1.104","TCP","54","37978 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35110","16.500055","172.30.1.205","172.30.1.104","TCP","74","45344 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919726 TSecr=0 WS=128" "35111","16.500434","172.30.1.104","172.30.1.205","TCP","66","135 > 45344 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35112","16.500449","172.30.1.205","172.30.1.104","TCP","54","45344 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35113","16.500845","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35114","16.501176","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35115","16.501185","172.30.1.205","172.30.1.104","TCP","54","45344 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35116","16.503409","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35117","16.503855","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35118","16.503862","172.30.1.205","172.30.1.104","TCP","54","45344 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35119","16.505699","172.30.1.205","172.30.1.104","TCP","54","45344 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35120","16.505831","172.30.1.205","172.30.1.104","TCP","74","37982 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919732 TSecr=0 WS=128" "35121","16.506020","172.30.1.104","172.30.1.205","TCP","54","135 > 45344 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35122","16.506051","172.30.1.104","172.30.1.205","TCP","54","135 > 45344 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35123","16.506059","172.30.1.205","172.30.1.104","TCP","54","45344 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35124","16.506168","172.30.1.104","172.30.1.205","TCP","66","49671 > 37982 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35125","16.506177","172.30.1.205","172.30.1.104","TCP","54","37982 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35126","16.506528","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35127","16.506862","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35128","16.506871","172.30.1.205","172.30.1.104","TCP","54","37982 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35129","16.508764","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35130","16.509259","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35131","16.509265","172.30.1.205","172.30.1.104","TCP","54","37982 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35132","16.510635","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35133","16.513714","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35134","16.513725","172.30.1.205","172.30.1.104","TCP","54","37982 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35135","16.514733","172.30.1.205","172.30.1.104","TCP","74","45348 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919741 TSecr=0 WS=128" "35136","16.515098","172.30.1.104","172.30.1.205","TCP","66","135 > 45348 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35137","16.515109","172.30.1.205","172.30.1.104","TCP","54","45348 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35138","16.515458","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35139","16.515807","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35140","16.515816","172.30.1.205","172.30.1.104","TCP","54","45348 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35141","16.518064","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35142","16.518521","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35143","16.518529","172.30.1.205","172.30.1.104","TCP","54","45348 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35144","16.520363","172.30.1.205","172.30.1.104","TCP","54","45348 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35145","16.520490","172.30.1.205","172.30.1.104","TCP","74","37986 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919746 TSecr=0 WS=128" "35146","16.520689","172.30.1.104","172.30.1.205","TCP","54","135 > 45348 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35147","16.520789","172.30.1.104","172.30.1.205","TCP","54","135 > 45348 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35148","16.520796","172.30.1.205","172.30.1.104","TCP","54","45348 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35149","16.520890","172.30.1.104","172.30.1.205","TCP","66","49671 > 37986 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35150","16.520898","172.30.1.205","172.30.1.104","TCP","54","37986 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35151","16.521246","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35152","16.521584","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35153","16.521592","172.30.1.205","172.30.1.104","TCP","54","37986 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35154","16.523470","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35155","16.523884","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35156","16.523890","172.30.1.205","172.30.1.104","TCP","54","37986 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35157","16.525270","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35158","16.528258","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35159","16.528267","172.30.1.205","172.30.1.104","TCP","54","37986 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35160","16.529249","172.30.1.205","172.30.1.104","TCP","74","45352 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919755 TSecr=0 WS=128" "35161","16.529582","172.30.1.104","172.30.1.205","TCP","66","135 > 45352 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35162","16.529593","172.30.1.205","172.30.1.104","TCP","54","45352 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35163","16.529939","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35164","16.530287","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35165","16.530296","172.30.1.205","172.30.1.104","TCP","54","45352 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35166","16.532470","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35167","16.532952","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35168","16.532958","172.30.1.205","172.30.1.104","TCP","54","45352 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35169","16.533813","172.30.1.205","172.30.1.104","TCP","54","37946 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35170","16.533864","172.30.1.205","172.30.1.104","TCP","54","37950 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35171","16.533891","172.30.1.205","172.30.1.104","TCP","54","37954 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35172","16.533921","172.30.1.205","172.30.1.104","TCP","54","37958 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35173","16.533948","172.30.1.205","172.30.1.104","TCP","54","37962 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35174","16.533976","172.30.1.205","172.30.1.104","TCP","54","37966 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35175","16.533998","172.30.1.205","172.30.1.104","TCP","54","37970 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35176","16.534025","172.30.1.205","172.30.1.104","TCP","54","37974 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35177","16.534052","172.30.1.205","172.30.1.104","TCP","54","37978 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35178","16.534077","172.30.1.205","172.30.1.104","TCP","54","37982 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35179","16.534098","172.30.1.205","172.30.1.104","TCP","54","37986 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35180","16.534171","172.30.1.205","172.30.1.104","TCP","54","37942 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35181","16.534206","172.30.1.104","172.30.1.205","TCP","54","49671 > 37946 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35182","16.534536","172.30.1.104","172.30.1.205","TCP","54","49671 > 37950 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35183","16.534565","172.30.1.104","172.30.1.205","TCP","54","49671 > 37946 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35184","16.534571","172.30.1.205","172.30.1.104","TCP","54","37946 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35185","16.534603","172.30.1.104","172.30.1.205","TCP","54","49671 > 37950 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35186","16.534606","172.30.1.205","172.30.1.104","TCP","54","37950 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35187","16.534633","172.30.1.104","172.30.1.205","TCP","54","49671 > 37954 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35188","16.534664","172.30.1.104","172.30.1.205","TCP","54","49671 > 37958 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35189","16.534695","172.30.1.104","172.30.1.205","TCP","54","49671 > 37954 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35190","16.534699","172.30.1.205","172.30.1.104","TCP","54","37954 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35191","16.534723","172.30.1.104","172.30.1.205","TCP","54","49671 > 37962 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35192","16.534754","172.30.1.104","172.30.1.205","TCP","54","49671 > 37958 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35193","16.534758","172.30.1.205","172.30.1.104","TCP","54","37958 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35194","16.534783","172.30.1.104","172.30.1.205","TCP","54","49671 > 37966 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35195","16.534816","172.30.1.104","172.30.1.205","TCP","54","49671 > 37970 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35196","16.534849","172.30.1.104","172.30.1.205","TCP","54","49671 > 37970 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35197","16.534852","172.30.1.205","172.30.1.104","TCP","54","37970 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35198","16.534879","172.30.1.104","172.30.1.205","TCP","54","49671 > 37974 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35199","16.534930","172.30.1.104","172.30.1.205","TCP","54","49671 > 37974 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35200","16.534934","172.30.1.205","172.30.1.104","TCP","54","37974 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35201","16.534936","172.30.1.104","172.30.1.205","TCP","54","49671 > 37978 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35202","16.534967","172.30.1.104","172.30.1.205","TCP","54","49671 > 37978 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35203","16.534971","172.30.1.205","172.30.1.104","TCP","54","37978 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35204","16.534998","172.30.1.104","172.30.1.205","TCP","54","49671 > 37982 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35205","16.535031","172.30.1.104","172.30.1.205","TCP","54","49671 > 37986 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35206","16.535068","172.30.1.104","172.30.1.205","TCP","54","49671 > 37982 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35207","16.535073","172.30.1.205","172.30.1.104","TCP","54","37982 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35208","16.535100","172.30.1.104","172.30.1.205","TCP","54","49671 > 37986 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35209","16.535104","172.30.1.205","172.30.1.104","TCP","54","37986 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35210","16.535127","172.30.1.104","172.30.1.205","TCP","54","49671 > 37942 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35211","16.535159","172.30.1.104","172.30.1.205","TCP","54","49671 > 37942 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35212","16.535163","172.30.1.205","172.30.1.104","TCP","54","37942 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35213","16.535189","172.30.1.104","172.30.1.205","TCP","54","49671 > 37962 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35214","16.535192","172.30.1.205","172.30.1.104","TCP","54","37962 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35215","16.535215","172.30.1.104","172.30.1.205","TCP","54","49671 > 37966 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35216","16.535218","172.30.1.205","172.30.1.104","TCP","54","37966 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35217","16.535780","172.30.1.205","172.30.1.104","TCP","54","45352 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35218","16.535899","172.30.1.205","172.30.1.104","TCP","74","37990 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919762 TSecr=0 WS=128" "35219","16.536065","172.30.1.104","172.30.1.205","TCP","54","135 > 45352 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35220","16.536103","172.30.1.104","172.30.1.205","TCP","54","135 > 45352 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35221","16.536108","172.30.1.205","172.30.1.104","TCP","54","45352 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35222","16.536203","172.30.1.104","172.30.1.205","TCP","66","49671 > 37990 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35223","16.536211","172.30.1.205","172.30.1.104","TCP","54","37990 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35224","16.536559","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35225","16.536901","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35226","16.536910","172.30.1.205","172.30.1.104","TCP","54","37990 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35227","16.538785","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35228","16.539234","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35229","16.539240","172.30.1.205","172.30.1.104","TCP","54","37990 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35230","16.540583","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35231","16.543671","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35232","16.543685","172.30.1.205","172.30.1.104","TCP","54","37990 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35233","16.544629","172.30.1.205","172.30.1.104","TCP","74","45356 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919771 TSecr=0 WS=128" "35234","16.544985","172.30.1.104","172.30.1.205","TCP","66","135 > 45356 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35235","16.544996","172.30.1.205","172.30.1.104","TCP","54","45356 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35236","16.545359","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35237","16.545690","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35238","16.545699","172.30.1.205","172.30.1.104","TCP","54","45356 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35239","16.547857","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35240","16.548319","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35241","16.548326","172.30.1.205","172.30.1.104","TCP","54","45356 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35242","16.550137","172.30.1.205","172.30.1.104","TCP","54","45356 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35243","16.550247","172.30.1.205","172.30.1.104","TCP","74","37994 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919776 TSecr=0 WS=128" "35244","16.550450","172.30.1.104","172.30.1.205","TCP","54","135 > 45356 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35245","16.550478","172.30.1.104","172.30.1.205","TCP","54","135 > 45356 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35246","16.550484","172.30.1.205","172.30.1.104","TCP","54","45356 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35247","16.550577","172.30.1.104","172.30.1.205","TCP","66","49671 > 37994 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35248","16.550585","172.30.1.205","172.30.1.104","TCP","54","37994 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35249","16.550923","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35250","16.551267","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35251","16.551276","172.30.1.205","172.30.1.104","TCP","54","37994 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35252","16.553169","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35253","16.553623","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35254","16.553629","172.30.1.205","172.30.1.104","TCP","54","37994 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35255","16.554967","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35256","16.557994","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35257","16.558010","172.30.1.205","172.30.1.104","TCP","54","37994 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35258","16.558985","172.30.1.205","172.30.1.104","TCP","74","45360 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919785 TSecr=0 WS=128" "35259","16.559372","172.30.1.104","172.30.1.205","TCP","66","135 > 45360 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35260","16.559383","172.30.1.205","172.30.1.104","TCP","54","45360 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35261","16.559728","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35262","16.560100","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35263","16.560108","172.30.1.205","172.30.1.104","TCP","54","45360 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35264","16.562333","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35265","16.562837","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35266","16.562843","172.30.1.205","172.30.1.104","TCP","54","45360 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35267","16.564671","172.30.1.205","172.30.1.104","TCP","54","45360 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35268","16.564801","172.30.1.205","172.30.1.104","TCP","74","37998 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919791 TSecr=0 WS=128" "35269","16.564975","172.30.1.104","172.30.1.205","TCP","54","135 > 45360 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35270","16.565003","172.30.1.104","172.30.1.205","TCP","54","135 > 45360 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35271","16.565008","172.30.1.205","172.30.1.104","TCP","54","45360 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35272","16.565105","172.30.1.104","172.30.1.205","TCP","66","49671 > 37998 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35273","16.565113","172.30.1.205","172.30.1.104","TCP","54","37998 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35274","16.565461","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35275","16.565818","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35276","16.565827","172.30.1.205","172.30.1.104","TCP","54","37998 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35277","16.567691","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35278","16.568107","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35279","16.568113","172.30.1.205","172.30.1.104","TCP","54","37998 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35280","16.569504","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35281","16.572494","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35282","16.572503","172.30.1.205","172.30.1.104","TCP","54","37998 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35283","16.573471","172.30.1.205","172.30.1.104","TCP","74","45364 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919799 TSecr=0 WS=128" "35284","16.573843","172.30.1.104","172.30.1.205","TCP","66","135 > 45364 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35285","16.573854","172.30.1.205","172.30.1.104","TCP","54","45364 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35286","16.574207","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35287","16.574540","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35288","16.574549","172.30.1.205","172.30.1.104","TCP","54","45364 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35289","16.576731","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35290","16.577272","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35291","16.577279","172.30.1.205","172.30.1.104","TCP","54","45364 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35292","16.579087","172.30.1.205","172.30.1.104","TCP","54","45364 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35293","16.579197","172.30.1.205","172.30.1.104","TCP","74","38002 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919805 TSecr=0 WS=128" "35294","16.579440","172.30.1.104","172.30.1.205","TCP","54","135 > 45364 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35295","16.579472","172.30.1.104","172.30.1.205","TCP","54","135 > 45364 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35296","16.579477","172.30.1.205","172.30.1.104","TCP","54","45364 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35297","16.579582","172.30.1.104","172.30.1.205","TCP","66","49671 > 38002 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35298","16.579590","172.30.1.205","172.30.1.104","TCP","54","38002 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35299","16.579960","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35300","16.580341","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35301","16.580353","172.30.1.205","172.30.1.104","TCP","54","38002 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35302","16.582244","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35303","16.582688","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35304","16.582694","172.30.1.205","172.30.1.104","TCP","54","38002 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35305","16.584043","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35306","16.586968","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35307","16.586981","172.30.1.205","172.30.1.104","TCP","54","38002 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35308","16.588008","172.30.1.205","172.30.1.104","TCP","74","45368 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919814 TSecr=0 WS=128" "35309","16.588408","172.30.1.104","172.30.1.205","TCP","66","135 > 45368 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35310","16.588422","172.30.1.205","172.30.1.104","TCP","54","45368 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35311","16.588818","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35312","16.589204","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35313","16.589214","172.30.1.205","172.30.1.104","TCP","54","45368 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35314","16.591399","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35315","16.593444","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35316","16.593450","172.30.1.205","172.30.1.104","TCP","54","45368 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35317","16.595348","172.30.1.205","172.30.1.104","TCP","54","45368 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35318","16.595460","172.30.1.205","172.30.1.104","TCP","74","38006 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919821 TSecr=0 WS=128" "35319","16.595699","172.30.1.104","172.30.1.205","TCP","54","135 > 45368 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35320","16.595727","172.30.1.104","172.30.1.205","TCP","54","135 > 45368 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35321","16.595733","172.30.1.205","172.30.1.104","TCP","54","45368 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35322","16.595781","172.30.1.104","172.30.1.205","TCP","66","49671 > 38006 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35323","16.595789","172.30.1.205","172.30.1.104","TCP","54","38006 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35324","16.596141","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35325","16.596480","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35326","16.596489","172.30.1.205","172.30.1.104","TCP","54","38006 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35327","16.598390","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35328","16.598819","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35329","16.598826","172.30.1.205","172.30.1.104","TCP","54","38006 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35330","16.600187","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35331","16.603194","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35332","16.603208","172.30.1.205","172.30.1.104","TCP","54","38006 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35333","16.604223","172.30.1.205","172.30.1.104","TCP","74","45372 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919830 TSecr=0 WS=128" "35334","16.604620","172.30.1.104","172.30.1.205","TCP","66","135 > 45372 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35335","16.604633","172.30.1.205","172.30.1.104","TCP","54","45372 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35336","16.605032","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35337","16.605396","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35338","16.605405","172.30.1.205","172.30.1.104","TCP","54","45372 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35339","16.607616","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35340","16.608070","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35341","16.608076","172.30.1.205","172.30.1.104","TCP","54","45372 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35342","16.609947","172.30.1.205","172.30.1.104","TCP","54","45372 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35343","16.610061","172.30.1.205","172.30.1.104","TCP","74","38010 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919836 TSecr=0 WS=128" "35344","16.610280","172.30.1.104","172.30.1.205","TCP","54","135 > 45372 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35345","16.610311","172.30.1.104","172.30.1.205","TCP","54","135 > 45372 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35346","16.610317","172.30.1.205","172.30.1.104","TCP","54","45372 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35347","16.610429","172.30.1.104","172.30.1.205","TCP","66","49671 > 38010 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35348","16.610437","172.30.1.205","172.30.1.104","TCP","54","38010 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35349","16.610796","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35350","16.611153","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35351","16.611163","172.30.1.205","172.30.1.104","TCP","54","38010 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35352","16.613093","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35353","16.613502","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35354","16.613509","172.30.1.205","172.30.1.104","TCP","54","38010 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35355","16.614893","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35356","16.617820","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35357","16.617830","172.30.1.205","172.30.1.104","TCP","54","38010 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35358","16.618784","172.30.1.205","172.30.1.104","TCP","74","45376 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919845 TSecr=0 WS=128" "35359","16.619129","172.30.1.104","172.30.1.205","TCP","66","135 > 45376 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35360","16.619139","172.30.1.205","172.30.1.104","TCP","54","45376 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35361","16.619488","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35362","16.619841","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35363","16.619858","172.30.1.205","172.30.1.104","TCP","54","45376 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35364","16.622089","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35365","16.622521","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35366","16.622528","172.30.1.205","172.30.1.104","TCP","54","45376 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35367","16.624352","172.30.1.205","172.30.1.104","TCP","54","45376 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35368","16.624474","172.30.1.205","172.30.1.104","TCP","74","38014 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919850 TSecr=0 WS=128" "35369","16.624665","172.30.1.104","172.30.1.205","TCP","54","135 > 45376 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35370","16.624688","172.30.1.104","172.30.1.205","TCP","54","135 > 45376 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35371","16.624693","172.30.1.205","172.30.1.104","TCP","54","45376 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35372","16.624812","172.30.1.104","172.30.1.205","TCP","66","49671 > 38014 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35373","16.624821","172.30.1.205","172.30.1.104","TCP","54","38014 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35374","16.625187","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35375","16.625551","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35376","16.625560","172.30.1.205","172.30.1.104","TCP","54","38014 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35377","16.627464","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35378","16.627911","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35379","16.627918","172.30.1.205","172.30.1.104","TCP","54","38014 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35380","16.629333","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35381","16.632225","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35382","16.632235","172.30.1.205","172.30.1.104","TCP","54","38014 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35383","16.633221","172.30.1.205","172.30.1.104","TCP","74","45380 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919859 TSecr=0 WS=128" "35384","16.633562","172.30.1.104","172.30.1.205","TCP","66","135 > 45380 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35385","16.633573","172.30.1.205","172.30.1.104","TCP","54","45380 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35386","16.633929","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35387","16.634292","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35388","16.634301","172.30.1.205","172.30.1.104","TCP","54","45380 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35389","16.636544","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35390","16.637146","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35391","16.637153","172.30.1.205","172.30.1.104","TCP","54","45380 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35392","16.638968","172.30.1.205","172.30.1.104","TCP","54","45380 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35393","16.639085","172.30.1.205","172.30.1.104","TCP","74","38018 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919865 TSecr=0 WS=128" "35394","16.639275","172.30.1.104","172.30.1.205","TCP","54","135 > 45380 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35395","16.639300","172.30.1.104","172.30.1.205","TCP","54","135 > 45380 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35396","16.639307","172.30.1.205","172.30.1.104","TCP","54","45380 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35397","16.639393","172.30.1.104","172.30.1.205","TCP","66","49671 > 38018 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35398","16.639402","172.30.1.205","172.30.1.104","TCP","54","38018 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35399","16.639749","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35400","16.640100","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35401","16.640107","172.30.1.205","172.30.1.104","TCP","54","38018 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35402","16.642010","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35403","16.642448","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35404","16.642455","172.30.1.205","172.30.1.104","TCP","54","38018 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35405","16.643818","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35406","16.646817","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35407","16.646827","172.30.1.205","172.30.1.104","TCP","54","38018 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35408","16.647781","172.30.1.205","172.30.1.104","TCP","74","45384 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919874 TSecr=0 WS=128" "35409","16.648214","172.30.1.104","172.30.1.205","TCP","66","135 > 45384 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35410","16.648225","172.30.1.205","172.30.1.104","TCP","54","45384 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35411","16.648576","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35412","16.648956","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35413","16.648966","172.30.1.205","172.30.1.104","TCP","54","45384 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35414","16.651161","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35415","16.651665","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35416","16.651672","172.30.1.205","172.30.1.104","TCP","54","45384 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35417","16.653535","172.30.1.205","172.30.1.104","TCP","54","45384 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35418","16.653658","172.30.1.205","172.30.1.104","TCP","74","38022 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919880 TSecr=0 WS=128" "35419","16.653855","172.30.1.104","172.30.1.205","TCP","54","135 > 45384 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35420","16.653883","172.30.1.104","172.30.1.205","TCP","54","135 > 45384 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35421","16.653888","172.30.1.205","172.30.1.104","TCP","54","45384 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35422","16.653977","172.30.1.104","172.30.1.205","TCP","66","49671 > 38022 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35423","16.653986","172.30.1.205","172.30.1.104","TCP","54","38022 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35424","16.654333","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35425","16.654675","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35426","16.654684","172.30.1.205","172.30.1.104","TCP","54","38022 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35427","16.656600","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35428","16.657116","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35429","16.657123","172.30.1.205","172.30.1.104","TCP","54","38022 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35430","16.658478","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35431","16.661534","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35432","16.661544","172.30.1.205","172.30.1.104","TCP","54","38022 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35433","16.662493","172.30.1.205","172.30.1.104","TCP","74","45388 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919888 TSecr=0 WS=128" "35434","16.662915","172.30.1.104","172.30.1.205","TCP","66","135 > 45388 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35435","16.662926","172.30.1.205","172.30.1.104","TCP","54","45388 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35436","16.663276","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35437","16.663683","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35438","16.663692","172.30.1.205","172.30.1.104","TCP","54","45388 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35439","16.665911","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35440","16.666401","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35441","16.666407","172.30.1.205","172.30.1.104","TCP","54","45388 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35442","16.668232","172.30.1.205","172.30.1.104","TCP","54","45388 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35443","16.668344","172.30.1.205","172.30.1.104","TCP","74","38026 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919894 TSecr=0 WS=128" "35444","16.668534","172.30.1.104","172.30.1.205","TCP","54","135 > 45388 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35445","16.668571","172.30.1.104","172.30.1.205","TCP","54","135 > 45388 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35446","16.668576","172.30.1.205","172.30.1.104","TCP","54","45388 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35447","16.668677","172.30.1.104","172.30.1.205","TCP","66","49671 > 38026 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35448","16.668685","172.30.1.205","172.30.1.104","TCP","54","38026 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35449","16.669063","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35450","16.669400","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35451","16.669409","172.30.1.205","172.30.1.104","TCP","54","38026 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35452","16.671287","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35453","16.671725","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35454","16.671731","172.30.1.205","172.30.1.104","TCP","54","38026 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35455","16.673114","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35456","16.676120","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35457","16.676129","172.30.1.205","172.30.1.104","TCP","54","38026 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35458","16.677087","172.30.1.205","172.30.1.104","TCP","74","45392 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919903 TSecr=0 WS=128" "35459","16.677532","172.30.1.104","172.30.1.205","TCP","66","135 > 45392 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35460","16.677543","172.30.1.205","172.30.1.104","TCP","54","45392 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35461","16.677899","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35462","16.678237","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35463","16.678246","172.30.1.205","172.30.1.104","TCP","54","45392 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35464","16.680435","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35465","16.680945","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35466","16.680955","172.30.1.205","172.30.1.104","TCP","54","45392 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35467","16.682861","172.30.1.205","172.30.1.104","TCP","54","45392 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35468","16.682989","172.30.1.205","172.30.1.104","TCP","74","38030 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919909 TSecr=0 WS=128" "35469","16.683185","172.30.1.104","172.30.1.205","TCP","54","135 > 45392 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35470","16.683211","172.30.1.104","172.30.1.205","TCP","54","135 > 45392 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35471","16.683217","172.30.1.205","172.30.1.104","TCP","54","45392 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35472","16.683343","172.30.1.104","172.30.1.205","TCP","66","49671 > 38030 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35473","16.683351","172.30.1.205","172.30.1.104","TCP","54","38030 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35474","16.683704","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35475","16.684080","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35476","16.684096","172.30.1.205","172.30.1.104","TCP","54","38030 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35477","16.686017","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35478","16.686451","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35479","16.686457","172.30.1.205","172.30.1.104","TCP","54","38030 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35480","16.687805","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35481","16.690845","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35482","16.690856","172.30.1.205","172.30.1.104","TCP","54","38030 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35483","16.691810","172.30.1.205","172.30.1.104","TCP","74","45396 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919918 TSecr=0 WS=128" "35484","16.692215","172.30.1.104","172.30.1.205","TCP","66","135 > 45396 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35485","16.692226","172.30.1.205","172.30.1.104","TCP","54","45396 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35486","16.692572","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35487","16.692933","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35488","16.692943","172.30.1.205","172.30.1.104","TCP","54","45396 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35489","16.695137","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35490","16.695629","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35491","16.695636","172.30.1.205","172.30.1.104","TCP","54","45396 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35492","16.697465","172.30.1.205","172.30.1.104","TCP","54","45396 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35493","16.697575","172.30.1.205","172.30.1.104","TCP","74","38034 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919923 TSecr=0 WS=128" "35494","16.697786","172.30.1.104","172.30.1.205","TCP","54","135 > 45396 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35495","16.697824","172.30.1.104","172.30.1.205","TCP","54","135 > 45396 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35496","16.697830","172.30.1.205","172.30.1.104","TCP","54","45396 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35497","16.697924","172.30.1.104","172.30.1.205","TCP","66","49671 > 38034 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35498","16.697932","172.30.1.205","172.30.1.104","TCP","54","38034 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35499","16.698277","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35500","16.698652","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35501","16.698659","172.30.1.205","172.30.1.104","TCP","54","38034 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35502","16.700514","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35503","16.700991","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35504","16.700998","172.30.1.205","172.30.1.104","TCP","54","38034 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35505","16.702347","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35506","16.705384","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35507","16.705394","172.30.1.205","172.30.1.104","TCP","54","38034 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35508","16.706341","172.30.1.205","172.30.1.104","TCP","74","45400 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919932 TSecr=0 WS=128" "35509","16.706722","172.30.1.104","172.30.1.205","TCP","66","135 > 45400 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35510","16.706732","172.30.1.205","172.30.1.104","TCP","54","45400 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35511","16.707087","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35512","16.707477","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35513","16.707486","172.30.1.205","172.30.1.104","TCP","54","45400 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35514","16.709707","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35515","16.710180","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35516","16.710186","172.30.1.205","172.30.1.104","TCP","54","45400 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35517","16.711037","172.30.1.205","172.30.1.104","TCP","54","37994 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35518","16.711086","172.30.1.205","172.30.1.104","TCP","54","37998 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35519","16.711123","172.30.1.205","172.30.1.104","TCP","54","38002 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35520","16.711152","172.30.1.205","172.30.1.104","TCP","54","38006 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35521","16.711179","172.30.1.205","172.30.1.104","TCP","54","38010 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35522","16.711208","172.30.1.205","172.30.1.104","TCP","54","38014 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35523","16.711234","172.30.1.205","172.30.1.104","TCP","54","38018 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35524","16.711261","172.30.1.205","172.30.1.104","TCP","54","38022 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35525","16.711282","172.30.1.205","172.30.1.104","TCP","54","38026 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35526","16.711309","172.30.1.205","172.30.1.104","TCP","54","38030 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35527","16.711335","172.30.1.205","172.30.1.104","TCP","54","38034 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35528","16.711407","172.30.1.205","172.30.1.104","TCP","54","37990 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35529","16.711766","172.30.1.104","172.30.1.205","TCP","54","49671 > 37994 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35530","16.711787","172.30.1.104","172.30.1.205","TCP","54","49671 > 37998 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35531","16.711821","172.30.1.104","172.30.1.205","TCP","54","49671 > 37994 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35532","16.711828","172.30.1.205","172.30.1.104","TCP","54","37994 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35533","16.711860","172.30.1.104","172.30.1.205","TCP","54","49671 > 38002 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35534","16.711887","172.30.1.104","172.30.1.205","TCP","54","49671 > 38006 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35535","16.711928","172.30.1.104","172.30.1.205","TCP","54","49671 > 38006 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35536","16.711933","172.30.1.205","172.30.1.104","TCP","54","38006 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35537","16.711958","172.30.1.104","172.30.1.205","TCP","54","49671 > 38010 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35538","16.711986","172.30.1.104","172.30.1.205","TCP","54","49671 > 38010 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35539","16.711989","172.30.1.205","172.30.1.104","TCP","54","38010 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35540","16.712016","172.30.1.104","172.30.1.205","TCP","54","49671 > 38014 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35541","16.712044","172.30.1.104","172.30.1.205","TCP","54","49671 > 38014 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35542","16.712047","172.30.1.205","172.30.1.104","TCP","54","38014 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35543","16.712073","172.30.1.104","172.30.1.205","TCP","54","49671 > 38018 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35544","16.712102","172.30.1.104","172.30.1.205","TCP","54","49671 > 38018 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35545","16.712106","172.30.1.205","172.30.1.104","TCP","54","38018 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35546","16.712131","172.30.1.104","172.30.1.205","TCP","54","49671 > 37998 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35547","16.712134","172.30.1.205","172.30.1.104","TCP","54","37998 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35548","16.712158","172.30.1.104","172.30.1.205","TCP","54","49671 > 38022 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35549","16.712195","172.30.1.104","172.30.1.205","TCP","54","49671 > 38026 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35550","16.712235","172.30.1.104","172.30.1.205","TCP","54","49671 > 38026 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35551","16.712240","172.30.1.205","172.30.1.104","TCP","54","38026 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35552","16.712261","172.30.1.104","172.30.1.205","TCP","54","49671 > 38030 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35553","16.712289","172.30.1.104","172.30.1.205","TCP","54","49671 > 38030 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35554","16.712294","172.30.1.205","172.30.1.104","TCP","54","38030 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35555","16.712318","172.30.1.104","172.30.1.205","TCP","54","49671 > 38034 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35556","16.712349","172.30.1.104","172.30.1.205","TCP","54","49671 > 38002 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35557","16.712352","172.30.1.205","172.30.1.104","TCP","54","38002 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35558","16.712378","172.30.1.104","172.30.1.205","TCP","54","49671 > 37990 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35559","16.712406","172.30.1.104","172.30.1.205","TCP","54","49671 > 37990 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35560","16.712409","172.30.1.205","172.30.1.104","TCP","54","37990 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35561","16.712437","172.30.1.104","172.30.1.205","TCP","54","49671 > 38022 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35562","16.712440","172.30.1.205","172.30.1.104","TCP","54","38022 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35563","16.712466","172.30.1.104","172.30.1.205","TCP","54","49671 > 38034 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35564","16.712468","172.30.1.205","172.30.1.104","TCP","54","38034 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35565","16.713050","172.30.1.205","172.30.1.104","TCP","54","45400 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35566","16.713165","172.30.1.205","172.30.1.104","TCP","74","38038 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919939 TSecr=0 WS=128" "35567","16.713352","172.30.1.104","172.30.1.205","TCP","54","135 > 45400 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35568","16.713432","172.30.1.104","172.30.1.205","TCP","54","135 > 45400 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35569","16.713437","172.30.1.205","172.30.1.104","TCP","54","45400 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35570","16.713550","172.30.1.104","172.30.1.205","TCP","66","49671 > 38038 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35571","16.713560","172.30.1.205","172.30.1.104","TCP","54","38038 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35572","16.713940","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35573","16.714293","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35574","16.714301","172.30.1.205","172.30.1.104","TCP","54","38038 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35575","16.716176","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35576","16.716640","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35577","16.716646","172.30.1.205","172.30.1.104","TCP","54","38038 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35578","16.718024","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35579","16.721034","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35580","16.721045","172.30.1.205","172.30.1.104","TCP","54","38038 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35581","16.722004","172.30.1.205","172.30.1.104","TCP","74","45404 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919948 TSecr=0 WS=128" "35582","16.722412","172.30.1.104","172.30.1.205","TCP","66","135 > 45404 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35583","16.722423","172.30.1.205","172.30.1.104","TCP","54","45404 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35584","16.722781","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35585","16.723127","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35586","16.723135","172.30.1.205","172.30.1.104","TCP","54","45404 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35587","16.725334","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35588","16.725791","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35589","16.725797","172.30.1.205","172.30.1.104","TCP","54","45404 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35590","16.727603","172.30.1.205","172.30.1.104","TCP","54","45404 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35591","16.727712","172.30.1.205","172.30.1.104","TCP","74","38042 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919954 TSecr=0 WS=128" "35592","16.727897","172.30.1.104","172.30.1.205","TCP","54","135 > 45404 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35593","16.727924","172.30.1.104","172.30.1.205","TCP","54","135 > 45404 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35594","16.727929","172.30.1.205","172.30.1.104","TCP","54","45404 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35595","16.728022","172.30.1.104","172.30.1.205","TCP","66","49671 > 38042 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35596","16.728030","172.30.1.205","172.30.1.104","TCP","54","38042 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35597","16.728376","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35598","16.728709","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35599","16.728718","172.30.1.205","172.30.1.104","TCP","54","38042 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35600","16.730628","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35601","16.731079","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35602","16.731085","172.30.1.205","172.30.1.104","TCP","54","38042 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35603","16.732428","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35604","16.735330","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35605","16.735340","172.30.1.205","172.30.1.104","TCP","54","38042 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35606","16.736290","172.30.1.205","172.30.1.104","TCP","74","45408 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919962 TSecr=0 WS=128" "35607","16.736635","172.30.1.104","172.30.1.205","TCP","66","135 > 45408 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35608","16.736646","172.30.1.205","172.30.1.104","TCP","54","45408 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35609","16.737022","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35610","16.737442","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35611","16.737456","172.30.1.205","172.30.1.104","TCP","54","45408 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35612","16.739758","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35613","16.740249","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35614","16.740257","172.30.1.205","172.30.1.104","TCP","54","45408 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35615","16.742120","172.30.1.205","172.30.1.104","TCP","54","45408 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35616","16.742244","172.30.1.205","172.30.1.104","TCP","74","38046 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919968 TSecr=0 WS=128" "35617","16.742451","172.30.1.104","172.30.1.205","TCP","54","135 > 45408 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35618","16.742509","172.30.1.104","172.30.1.205","TCP","54","135 > 45408 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35619","16.742516","172.30.1.205","172.30.1.104","TCP","54","45408 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35620","16.742595","172.30.1.104","172.30.1.205","TCP","66","49671 > 38046 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35621","16.742604","172.30.1.205","172.30.1.104","TCP","54","38046 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35622","16.742973","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35623","16.743327","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35624","16.743336","172.30.1.205","172.30.1.104","TCP","54","38046 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35625","16.745252","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35626","16.745684","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35627","16.745691","172.30.1.205","172.30.1.104","TCP","54","38046 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35628","16.747054","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35629","16.750000","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35630","16.750010","172.30.1.205","172.30.1.104","TCP","54","38046 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35631","16.750971","172.30.1.205","172.30.1.104","TCP","74","45412 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919977 TSecr=0 WS=128" "35632","16.751310","172.30.1.104","172.30.1.205","TCP","66","135 > 45412 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35633","16.751321","172.30.1.205","172.30.1.104","TCP","54","45412 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35634","16.751675","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35635","16.752005","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35636","16.752014","172.30.1.205","172.30.1.104","TCP","54","45412 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35637","16.754247","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35638","16.754693","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35639","16.754700","172.30.1.205","172.30.1.104","TCP","54","45412 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35640","16.756517","172.30.1.205","172.30.1.104","TCP","54","45412 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35641","16.756629","172.30.1.205","172.30.1.104","TCP","74","38050 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919983 TSecr=0 WS=128" "35642","16.756931","172.30.1.104","172.30.1.205","TCP","54","135 > 45412 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35643","16.756940","172.30.1.104","172.30.1.205","TCP","54","135 > 45412 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35644","16.756946","172.30.1.205","172.30.1.104","TCP","54","45412 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35645","16.756952","172.30.1.104","172.30.1.205","TCP","66","49671 > 38050 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35646","16.756960","172.30.1.205","172.30.1.104","TCP","54","38050 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35647","16.757331","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35648","16.757678","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35649","16.757687","172.30.1.205","172.30.1.104","TCP","54","38050 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35650","16.759574","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35651","16.760014","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35652","16.760021","172.30.1.205","172.30.1.104","TCP","54","38050 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35653","16.761414","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35654","16.764489","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35655","16.764500","172.30.1.205","172.30.1.104","TCP","54","38050 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35656","16.765488","172.30.1.205","172.30.1.104","TCP","74","45416 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919991 TSecr=0 WS=128" "35657","16.765819","172.30.1.104","172.30.1.205","TCP","66","135 > 45416 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35658","16.765830","172.30.1.205","172.30.1.104","TCP","54","45416 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35659","16.766194","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35660","16.766519","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35661","16.766528","172.30.1.205","172.30.1.104","TCP","54","45416 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35662","16.768765","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35663","16.769210","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35664","16.769217","172.30.1.205","172.30.1.104","TCP","54","45416 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35665","16.771034","172.30.1.205","172.30.1.104","TCP","54","45416 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35666","16.771146","172.30.1.205","172.30.1.104","TCP","74","38054 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499919997 TSecr=0 WS=128" "35667","16.771355","172.30.1.104","172.30.1.205","TCP","54","135 > 45416 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35668","16.771489","172.30.1.104","172.30.1.205","TCP","54","135 > 45416 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35669","16.771495","172.30.1.205","172.30.1.104","TCP","54","45416 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35670","16.771500","172.30.1.104","172.30.1.205","TCP","66","49671 > 38054 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35671","16.771508","172.30.1.205","172.30.1.104","TCP","54","38054 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35672","16.771872","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35673","16.772210","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35674","16.772217","172.30.1.205","172.30.1.104","TCP","54","38054 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35675","16.774124","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35676","16.774537","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35677","16.774543","172.30.1.205","172.30.1.104","TCP","54","38054 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35678","16.775906","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35679","16.779233","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35680","16.779242","172.30.1.205","172.30.1.104","TCP","54","38054 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35681","16.780212","172.30.1.205","172.30.1.104","TCP","74","45420 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920006 TSecr=0 WS=128" "35682","16.780535","172.30.1.104","172.30.1.205","TCP","66","135 > 45420 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35683","16.780546","172.30.1.205","172.30.1.104","TCP","54","45420 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35684","16.780951","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35685","16.781291","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35686","16.781299","172.30.1.205","172.30.1.104","TCP","54","45420 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35687","16.783543","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35688","16.784052","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35689","16.784059","172.30.1.205","172.30.1.104","TCP","54","45420 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35690","16.785921","172.30.1.205","172.30.1.104","TCP","54","45420 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35691","16.786049","172.30.1.205","172.30.1.104","TCP","74","38058 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920012 TSecr=0 WS=128" "35692","16.786259","172.30.1.104","172.30.1.205","TCP","54","135 > 45420 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35693","16.786269","172.30.1.104","172.30.1.205","TCP","54","135 > 45420 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35694","16.786283","172.30.1.205","172.30.1.104","TCP","54","45420 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35695","16.786380","172.30.1.104","172.30.1.205","TCP","66","49671 > 38058 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35696","16.786389","172.30.1.205","172.30.1.104","TCP","54","38058 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35697","16.786742","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35698","16.787115","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35699","16.787123","172.30.1.205","172.30.1.104","TCP","54","38058 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35700","16.789068","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35701","16.789511","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35702","16.789517","172.30.1.205","172.30.1.104","TCP","54","38058 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35703","16.790883","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35704","16.794282","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35705","16.794293","172.30.1.205","172.30.1.104","TCP","54","38058 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35706","16.795276","172.30.1.205","172.30.1.104","TCP","74","45424 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920021 TSecr=0 WS=128" "35707","16.795599","172.30.1.104","172.30.1.205","TCP","66","135 > 45424 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35708","16.795612","172.30.1.205","172.30.1.104","TCP","54","45424 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35709","16.795974","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35710","16.796296","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35711","16.796305","172.30.1.205","172.30.1.104","TCP","54","45424 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35712","16.798533","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35713","16.798954","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35714","16.798960","172.30.1.205","172.30.1.104","TCP","54","45424 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35715","16.800793","172.30.1.205","172.30.1.104","TCP","54","45424 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35716","16.800912","172.30.1.205","172.30.1.104","TCP","74","38062 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920027 TSecr=0 WS=128" "35717","16.801101","172.30.1.104","172.30.1.205","TCP","54","135 > 45424 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35718","16.801110","172.30.1.104","172.30.1.205","TCP","54","135 > 45424 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35719","16.801115","172.30.1.205","172.30.1.104","TCP","54","45424 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35720","16.801225","172.30.1.104","172.30.1.205","TCP","66","49671 > 38062 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35721","16.801235","172.30.1.205","172.30.1.104","TCP","54","38062 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35722","16.801583","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35723","16.801918","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35724","16.801927","172.30.1.205","172.30.1.104","TCP","54","38062 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35725","16.803801","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35726","16.804196","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35727","16.804203","172.30.1.205","172.30.1.104","TCP","54","38062 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35728","16.805592","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35729","16.808431","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35730","16.808452","172.30.1.205","172.30.1.104","TCP","54","38062 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35731","16.809426","172.30.1.205","172.30.1.104","TCP","74","45428 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920035 TSecr=0 WS=128" "35732","16.809720","172.30.1.104","172.30.1.205","TCP","66","135 > 45428 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35733","16.809731","172.30.1.205","172.30.1.104","TCP","54","45428 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35734","16.810078","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35735","16.810354","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35736","16.810363","172.30.1.205","172.30.1.104","TCP","54","45428 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35737","16.812549","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35738","16.812921","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35739","16.812931","172.30.1.205","172.30.1.104","TCP","54","45428 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35740","16.814834","172.30.1.205","172.30.1.104","TCP","54","45428 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35741","16.814960","172.30.1.205","172.30.1.104","TCP","74","38066 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920041 TSecr=0 WS=128" "35742","16.815101","172.30.1.104","172.30.1.205","TCP","54","135 > 45428 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35743","16.815128","172.30.1.104","172.30.1.205","TCP","54","135 > 45428 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35744","16.815135","172.30.1.205","172.30.1.104","TCP","54","45428 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35745","16.815239","172.30.1.104","172.30.1.205","TCP","66","49671 > 38066 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35746","16.815247","172.30.1.205","172.30.1.104","TCP","54","38066 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35747","16.815594","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35748","16.815887","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35749","16.815895","172.30.1.205","172.30.1.104","TCP","54","38066 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35750","16.817818","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35751","16.818212","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35752","16.818218","172.30.1.205","172.30.1.104","TCP","54","38066 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35753","16.819576","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35754","16.822529","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35755","16.822541","172.30.1.205","172.30.1.104","TCP","54","38066 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35756","16.823522","172.30.1.205","172.30.1.104","TCP","74","45432 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920049 TSecr=0 WS=128" "35757","16.823857","172.30.1.104","172.30.1.205","TCP","66","135 > 45432 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35758","16.823868","172.30.1.205","172.30.1.104","TCP","54","45432 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35759","16.824219","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35760","16.824530","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35761","16.824542","172.30.1.205","172.30.1.104","TCP","54","45432 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35762","16.826777","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35763","16.827193","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35764","16.827200","172.30.1.205","172.30.1.104","TCP","54","45432 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35765","16.829039","172.30.1.205","172.30.1.104","TCP","54","45432 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35766","16.829151","172.30.1.205","172.30.1.104","TCP","74","38070 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920055 TSecr=0 WS=128" "35767","16.829293","172.30.1.104","172.30.1.205","TCP","54","135 > 45432 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35768","16.829320","172.30.1.104","172.30.1.205","TCP","54","135 > 45432 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35769","16.829326","172.30.1.205","172.30.1.104","TCP","54","45432 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35770","16.829403","172.30.1.104","172.30.1.205","TCP","66","49671 > 38070 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35771","16.829412","172.30.1.205","172.30.1.104","TCP","54","38070 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35772","16.829754","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35773","16.830024","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35774","16.830033","172.30.1.205","172.30.1.104","TCP","54","38070 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35775","16.831914","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35776","16.832293","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35777","16.832303","172.30.1.205","172.30.1.104","TCP","54","38070 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35778","16.833797","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35779","16.836695","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35780","16.836706","172.30.1.205","172.30.1.104","TCP","54","38070 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35781","16.837714","172.30.1.205","172.30.1.104","TCP","74","45436 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920064 TSecr=0 WS=128" "35782","16.838018","172.30.1.104","172.30.1.205","TCP","66","135 > 45436 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35783","16.838029","172.30.1.205","172.30.1.104","TCP","54","45436 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35784","16.838383","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35785","16.838657","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35786","16.838667","172.30.1.205","172.30.1.104","TCP","54","45436 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35787","16.840879","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35788","16.841287","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35789","16.841293","172.30.1.205","172.30.1.104","TCP","54","45436 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35790","16.843112","172.30.1.205","172.30.1.104","TCP","54","45436 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35791","16.843222","172.30.1.205","172.30.1.104","TCP","74","38074 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920069 TSecr=0 WS=128" "35792","16.843394","172.30.1.104","172.30.1.205","TCP","54","135 > 45436 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35793","16.843403","172.30.1.104","172.30.1.205","TCP","54","135 > 45436 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35794","16.843409","172.30.1.205","172.30.1.104","TCP","54","45436 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35795","16.843480","172.30.1.104","172.30.1.205","TCP","66","49671 > 38074 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35796","16.843488","172.30.1.205","172.30.1.104","TCP","54","38074 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35797","16.843856","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35798","16.844126","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35799","16.844134","172.30.1.205","172.30.1.104","TCP","54","38074 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35800","16.846026","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35801","16.846398","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35802","16.846405","172.30.1.205","172.30.1.104","TCP","54","38074 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35803","16.847784","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35804","16.850693","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35805","16.850703","172.30.1.205","172.30.1.104","TCP","54","38074 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35806","16.851663","172.30.1.205","172.30.1.104","TCP","74","45440 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920078 TSecr=0 WS=128" "35807","16.851961","172.30.1.104","172.30.1.205","TCP","66","135 > 45440 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35808","16.851973","172.30.1.205","172.30.1.104","TCP","54","45440 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35809","16.852326","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35810","16.852611","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35811","16.852620","172.30.1.205","172.30.1.104","TCP","54","45440 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35812","16.854849","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35813","16.855232","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35814","16.855239","172.30.1.205","172.30.1.104","TCP","54","45440 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35815","16.857074","172.30.1.205","172.30.1.104","TCP","54","45440 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35816","16.857191","172.30.1.205","172.30.1.104","TCP","74","38078 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920083 TSecr=0 WS=128" "35817","16.857354","172.30.1.104","172.30.1.205","TCP","54","135 > 45440 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35818","16.857451","172.30.1.104","172.30.1.205","TCP","54","135 > 45440 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35819","16.857457","172.30.1.205","172.30.1.104","TCP","54","45440 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35820","16.857526","172.30.1.104","172.30.1.205","TCP","66","49671 > 38078 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35821","16.857535","172.30.1.205","172.30.1.104","TCP","54","38078 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35822","16.857885","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35823","16.858806","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35824","16.858815","172.30.1.205","172.30.1.104","TCP","54","38078 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35825","16.860708","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35826","16.861112","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35827","16.861119","172.30.1.205","172.30.1.104","TCP","54","38078 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35828","16.862481","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35829","16.865406","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35830","16.865415","172.30.1.205","172.30.1.104","TCP","54","38078 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35831","16.866365","172.30.1.205","172.30.1.104","TCP","74","45444 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920092 TSecr=0 WS=128" "35832","16.866653","172.30.1.104","172.30.1.205","TCP","66","135 > 45444 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35833","16.866665","172.30.1.205","172.30.1.104","TCP","54","45444 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35834","16.867017","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35835","16.867305","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35836","16.867314","172.30.1.205","172.30.1.104","TCP","54","45444 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35837","16.869529","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35838","16.869900","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35839","16.869907","172.30.1.205","172.30.1.104","TCP","54","45444 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35840","16.871709","172.30.1.205","172.30.1.104","TCP","54","45444 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35841","16.871827","172.30.1.205","172.30.1.104","TCP","74","38082 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920098 TSecr=0 WS=128" "35842","16.871985","172.30.1.104","172.30.1.205","TCP","54","135 > 45444 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35843","16.872019","172.30.1.104","172.30.1.205","TCP","54","135 > 45444 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35844","16.872025","172.30.1.205","172.30.1.104","TCP","54","45444 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35845","16.872096","172.30.1.104","172.30.1.205","TCP","66","49671 > 38082 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35846","16.872105","172.30.1.205","172.30.1.104","TCP","54","38082 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35847","16.872448","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35848","16.872711","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35849","16.872720","172.30.1.205","172.30.1.104","TCP","54","38082 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35850","16.874630","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35851","16.875003","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35852","16.875009","172.30.1.205","172.30.1.104","TCP","54","38082 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35853","16.876360","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35854","16.879298","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35855","16.879308","172.30.1.205","172.30.1.104","TCP","54","38082 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35856","16.880260","172.30.1.205","172.30.1.104","TCP","74","45448 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920106 TSecr=0 WS=128" "35857","16.880566","172.30.1.104","172.30.1.205","TCP","66","135 > 45448 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35858","16.880577","172.30.1.205","172.30.1.104","TCP","54","45448 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35859","16.880974","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35860","16.881322","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35861","16.881331","172.30.1.205","172.30.1.104","TCP","54","45448 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35862","16.883500","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35863","16.883902","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35864","16.883909","172.30.1.205","172.30.1.104","TCP","54","45448 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35865","16.884756","172.30.1.205","172.30.1.104","TCP","54","38042 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35866","16.884825","172.30.1.205","172.30.1.104","TCP","54","38046 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35867","16.884874","172.30.1.205","172.30.1.104","TCP","54","38050 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35868","16.884911","172.30.1.205","172.30.1.104","TCP","54","38054 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35869","16.884934","172.30.1.205","172.30.1.104","TCP","54","38058 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35870","16.884963","172.30.1.205","172.30.1.104","TCP","54","38062 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35871","16.884991","172.30.1.205","172.30.1.104","TCP","54","38066 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35872","16.885015","172.30.1.205","172.30.1.104","TCP","54","38070 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35873","16.885037","172.30.1.205","172.30.1.104","TCP","54","38074 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35874","16.885047","172.30.1.104","172.30.1.205","TCP","54","49671 > 38042 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35875","16.885092","172.30.1.205","172.30.1.104","TCP","54","38078 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35876","16.885126","172.30.1.205","172.30.1.104","TCP","54","38082 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35877","16.885165","172.30.1.104","172.30.1.205","TCP","54","49671 > 38042 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35878","16.885172","172.30.1.205","172.30.1.104","TCP","54","38042 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35879","16.885189","172.30.1.104","172.30.1.205","TCP","54","49671 > 38046 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35880","16.885215","172.30.1.104","172.30.1.205","TCP","54","49671 > 38046 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35881","16.885220","172.30.1.205","172.30.1.104","TCP","54","38046 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35882","16.885241","172.30.1.104","172.30.1.205","TCP","54","49671 > 38050 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35883","16.885248","172.30.1.205","172.30.1.104","TCP","54","38038 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "35884","16.885277","172.30.1.104","172.30.1.205","TCP","54","49671 > 38050 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35885","16.885281","172.30.1.205","172.30.1.104","TCP","54","38050 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35886","16.885424","172.30.1.104","172.30.1.205","TCP","54","49671 > 38054 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35887","16.885446","172.30.1.104","172.30.1.205","TCP","54","49671 > 38058 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35888","16.885472","172.30.1.104","172.30.1.205","TCP","54","49671 > 38054 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35889","16.885477","172.30.1.205","172.30.1.104","TCP","54","38054 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35890","16.885498","172.30.1.104","172.30.1.205","TCP","54","49671 > 38058 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35891","16.885502","172.30.1.205","172.30.1.104","TCP","54","38058 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35892","16.885523","172.30.1.104","172.30.1.205","TCP","54","49671 > 38062 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35893","16.885562","172.30.1.104","172.30.1.205","TCP","54","49671 > 38066 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35894","16.885648","172.30.1.104","172.30.1.205","TCP","54","49671 > 38070 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35895","16.885672","172.30.1.104","172.30.1.205","TCP","54","49671 > 38074 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35896","16.885697","172.30.1.104","172.30.1.205","TCP","54","49671 > 38062 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35897","16.885701","172.30.1.205","172.30.1.104","TCP","54","38062 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35898","16.885722","172.30.1.104","172.30.1.205","TCP","54","49671 > 38074 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35899","16.885724","172.30.1.205","172.30.1.104","TCP","54","38074 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35900","16.885756","172.30.1.104","172.30.1.205","TCP","54","49671 > 38066 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35901","16.885760","172.30.1.205","172.30.1.104","TCP","54","38066 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35902","16.885784","172.30.1.104","172.30.1.205","TCP","54","49671 > 38070 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35903","16.885786","172.30.1.205","172.30.1.104","TCP","54","38070 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35904","16.885810","172.30.1.104","172.30.1.205","TCP","54","49671 > 38078 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35905","16.885835","172.30.1.104","172.30.1.205","TCP","54","49671 > 38082 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35906","16.885861","172.30.1.104","172.30.1.205","TCP","54","49671 > 38078 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35907","16.885864","172.30.1.205","172.30.1.104","TCP","54","38078 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35908","16.885886","172.30.1.104","172.30.1.205","TCP","54","49671 > 38038 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35909","16.885913","172.30.1.104","172.30.1.205","TCP","54","49671 > 38082 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35910","16.885916","172.30.1.205","172.30.1.104","TCP","54","38082 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35911","16.885938","172.30.1.104","172.30.1.205","TCP","54","49671 > 38038 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "35912","16.885944","172.30.1.205","172.30.1.104","TCP","54","38038 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "35913","16.886810","172.30.1.205","172.30.1.104","TCP","54","45448 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35914","16.886921","172.30.1.205","172.30.1.104","TCP","74","38086 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920113 TSecr=0 WS=128" "35915","16.887099","172.30.1.104","172.30.1.205","TCP","54","135 > 45448 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35916","16.887108","172.30.1.104","172.30.1.205","TCP","54","135 > 45448 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35917","16.887112","172.30.1.205","172.30.1.104","TCP","54","45448 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35918","16.887193","172.30.1.104","172.30.1.205","TCP","66","49671 > 38086 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35919","16.887201","172.30.1.205","172.30.1.104","TCP","54","38086 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35920","16.887552","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35921","16.887829","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35922","16.887838","172.30.1.205","172.30.1.104","TCP","54","38086 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35923","16.889744","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35924","16.890670","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35925","16.890676","172.30.1.205","172.30.1.104","TCP","54","38086 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35926","16.892032","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35927","16.894942","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35928","16.894951","172.30.1.205","172.30.1.104","TCP","54","38086 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35929","16.895892","172.30.1.205","172.30.1.104","TCP","74","45452 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920122 TSecr=0 WS=128" "35930","16.896236","172.30.1.104","172.30.1.205","TCP","66","135 > 45452 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35931","16.896254","172.30.1.205","172.30.1.104","TCP","54","45452 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35932","16.896661","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35933","16.896940","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35934","16.896950","172.30.1.205","172.30.1.104","TCP","54","45452 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35935","16.899174","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35936","16.899604","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35937","16.899611","172.30.1.205","172.30.1.104","TCP","54","45452 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35938","16.901485","172.30.1.205","172.30.1.104","TCP","54","45452 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35939","16.901600","172.30.1.205","172.30.1.104","TCP","74","38090 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920128 TSecr=0 WS=128" "35940","16.901741","172.30.1.104","172.30.1.205","TCP","54","135 > 45452 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35941","16.901780","172.30.1.104","172.30.1.205","TCP","54","135 > 45452 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35942","16.901786","172.30.1.205","172.30.1.104","TCP","54","45452 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35943","16.901891","172.30.1.104","172.30.1.205","TCP","66","49671 > 38090 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35944","16.901899","172.30.1.205","172.30.1.104","TCP","54","38090 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35945","16.902247","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35946","16.902657","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35947","16.902666","172.30.1.205","172.30.1.104","TCP","54","38090 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35948","16.904526","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35949","16.905275","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35950","16.905282","172.30.1.205","172.30.1.104","TCP","54","38090 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35951","16.906653","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35952","16.909659","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35953","16.909669","172.30.1.205","172.30.1.104","TCP","54","38090 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35954","16.910640","172.30.1.205","172.30.1.104","TCP","74","45456 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920137 TSecr=0 WS=128" "35955","16.910941","172.30.1.104","172.30.1.205","TCP","66","135 > 45456 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35956","16.910952","172.30.1.205","172.30.1.104","TCP","54","45456 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35957","16.911305","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35958","16.911593","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35959","16.911614","172.30.1.205","172.30.1.104","TCP","54","45456 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35960","16.913892","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35961","16.914315","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35962","16.914322","172.30.1.205","172.30.1.104","TCP","54","45456 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35963","16.916163","172.30.1.205","172.30.1.104","TCP","54","45456 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35964","16.916278","172.30.1.205","172.30.1.104","TCP","74","38094 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920142 TSecr=0 WS=128" "35965","16.916437","172.30.1.104","172.30.1.205","TCP","54","135 > 45456 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35966","16.916447","172.30.1.104","172.30.1.205","TCP","54","135 > 45456 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35967","16.916452","172.30.1.205","172.30.1.104","TCP","54","45456 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35968","16.916553","172.30.1.104","172.30.1.205","TCP","66","49671 > 38094 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35969","16.916562","172.30.1.205","172.30.1.104","TCP","54","38094 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35970","16.916948","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35971","16.917263","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35972","16.917272","172.30.1.205","172.30.1.104","TCP","54","38094 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35973","16.919179","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35974","16.919553","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "35975","16.919559","172.30.1.205","172.30.1.104","TCP","54","38094 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "35976","16.920955","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "35977","16.923958","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "35978","16.923968","172.30.1.205","172.30.1.104","TCP","54","38094 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "35979","16.924940","172.30.1.205","172.30.1.104","TCP","74","45460 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920151 TSecr=0 WS=128" "35980","16.925268","172.30.1.104","172.30.1.205","TCP","66","135 > 45460 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35981","16.925279","172.30.1.205","172.30.1.104","TCP","54","45460 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35982","16.925636","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "35983","16.925938","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35984","16.925948","172.30.1.205","172.30.1.104","TCP","54","45460 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35985","16.928170","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "35986","16.928642","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "35987","16.928649","172.30.1.205","172.30.1.104","TCP","54","45460 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "35988","16.930504","172.30.1.205","172.30.1.104","TCP","54","45460 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "35989","16.930619","172.30.1.205","172.30.1.104","TCP","74","38098 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920157 TSecr=0 WS=128" "35990","16.930801","172.30.1.104","172.30.1.205","TCP","54","135 > 45460 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35991","16.930828","172.30.1.104","172.30.1.205","TCP","54","135 > 45460 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "35992","16.930835","172.30.1.205","172.30.1.104","TCP","54","45460 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "35993","16.930903","172.30.1.104","172.30.1.205","TCP","66","49671 > 38098 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "35994","16.930912","172.30.1.205","172.30.1.104","TCP","54","38098 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "35995","16.931280","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "35996","16.931568","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "35997","16.931577","172.30.1.205","172.30.1.104","TCP","54","38098 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "35998","16.933492","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "35999","16.934236","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36000","16.934244","172.30.1.205","172.30.1.104","TCP","54","38098 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36001","16.935628","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36002","16.938630","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36003","16.938640","172.30.1.205","172.30.1.104","TCP","54","38098 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36004","16.939633","172.30.1.205","172.30.1.104","TCP","74","45464 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920166 TSecr=0 WS=128" "36005","16.939965","172.30.1.104","172.30.1.205","TCP","66","135 > 45464 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36006","16.939978","172.30.1.205","172.30.1.104","TCP","54","45464 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36007","16.940334","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36008","16.940636","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36009","16.940645","172.30.1.205","172.30.1.104","TCP","54","45464 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36010","16.942876","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36011","16.943350","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36012","16.943357","172.30.1.205","172.30.1.104","TCP","54","45464 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36013","16.945210","172.30.1.205","172.30.1.104","TCP","54","45464 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36014","16.945325","172.30.1.205","172.30.1.104","TCP","74","38102 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920171 TSecr=0 WS=128" "36015","16.945499","172.30.1.104","172.30.1.205","TCP","54","135 > 45464 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36016","16.945512","172.30.1.104","172.30.1.205","TCP","54","135 > 45464 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36017","16.945520","172.30.1.205","172.30.1.104","TCP","54","45464 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36018","16.945590","172.30.1.104","172.30.1.205","TCP","66","49671 > 38102 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36019","16.945601","172.30.1.205","172.30.1.104","TCP","54","38102 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36020","16.945990","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36021","16.946321","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36022","16.946332","172.30.1.205","172.30.1.104","TCP","54","38102 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36023","16.948255","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36024","16.948636","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36025","16.948643","172.30.1.205","172.30.1.104","TCP","54","38102 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36026","16.950044","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36027","16.952975","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36028","16.952984","172.30.1.205","172.30.1.104","TCP","54","38102 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36029","16.953935","172.30.1.205","172.30.1.104","TCP","74","45468 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920180 TSecr=0 WS=128" "36030","16.954241","172.30.1.104","172.30.1.205","TCP","66","135 > 45468 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36031","16.954251","172.30.1.205","172.30.1.104","TCP","54","45468 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36032","16.954604","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36033","16.954948","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36034","16.954957","172.30.1.205","172.30.1.104","TCP","54","45468 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36035","16.957171","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36036","16.957566","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36037","16.957573","172.30.1.205","172.30.1.104","TCP","54","45468 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36038","16.959392","172.30.1.205","172.30.1.104","TCP","54","45468 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36039","16.959504","172.30.1.205","172.30.1.104","TCP","74","38106 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920185 TSecr=0 WS=128" "36040","16.959643","172.30.1.104","172.30.1.205","TCP","54","135 > 45468 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36041","16.959654","172.30.1.104","172.30.1.205","TCP","54","135 > 45468 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36042","16.959660","172.30.1.205","172.30.1.104","TCP","54","45468 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36043","16.959770","172.30.1.104","172.30.1.205","TCP","66","49671 > 38106 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36044","16.959779","172.30.1.205","172.30.1.104","TCP","54","38106 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36045","16.960143","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36046","16.960975","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36047","16.960983","172.30.1.205","172.30.1.104","TCP","54","38106 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36048","16.962861","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36049","16.963310","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36050","16.963317","172.30.1.205","172.30.1.104","TCP","54","38106 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36051","16.964669","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36052","16.967638","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36053","16.967658","172.30.1.205","172.30.1.104","TCP","54","38106 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36054","16.968635","172.30.1.205","172.30.1.104","TCP","74","45472 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920195 TSecr=0 WS=128" "36055","16.968926","172.30.1.104","172.30.1.205","TCP","66","135 > 45472 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36056","16.968937","172.30.1.205","172.30.1.104","TCP","54","45472 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36057","16.969300","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36058","16.969584","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36059","16.969594","172.30.1.205","172.30.1.104","TCP","54","45472 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36060","16.971823","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36061","16.972234","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36062","16.972241","172.30.1.205","172.30.1.104","TCP","54","45472 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36063","16.974125","172.30.1.205","172.30.1.104","TCP","54","45472 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36064","16.974238","172.30.1.205","172.30.1.104","TCP","74","38110 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920200 TSecr=0 WS=128" "36065","16.974390","172.30.1.104","172.30.1.205","TCP","54","135 > 45472 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36066","16.974426","172.30.1.104","172.30.1.205","TCP","54","135 > 45472 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36067","16.974432","172.30.1.205","172.30.1.104","TCP","54","45472 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36068","16.974512","172.30.1.104","172.30.1.205","TCP","66","49671 > 38110 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36069","16.974520","172.30.1.205","172.30.1.104","TCP","54","38110 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36070","16.974863","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36071","16.975166","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36072","16.975175","172.30.1.205","172.30.1.104","TCP","54","38110 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36073","16.977086","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36074","16.977598","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36075","16.977604","172.30.1.205","172.30.1.104","TCP","54","38110 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36076","16.978981","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36077","16.982035","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36078","16.982049","172.30.1.205","172.30.1.104","TCP","54","38110 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36079","16.983099","172.30.1.205","172.30.1.104","TCP","74","45476 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920209 TSecr=0 WS=128" "36080","16.983525","172.30.1.104","172.30.1.205","TCP","66","135 > 45476 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36081","16.983538","172.30.1.205","172.30.1.104","TCP","54","45476 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36082","16.983902","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36083","16.984202","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36084","16.984213","172.30.1.205","172.30.1.104","TCP","54","45476 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36085","16.986513","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36086","16.986918","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36087","16.986926","172.30.1.205","172.30.1.104","TCP","54","45476 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36088","16.988760","172.30.1.205","172.30.1.104","TCP","54","45476 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36089","16.988904","172.30.1.205","172.30.1.104","TCP","74","38114 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920215 TSecr=0 WS=128" "36090","16.989021","172.30.1.104","172.30.1.205","TCP","54","135 > 45476 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36091","16.989032","172.30.1.104","172.30.1.205","TCP","54","135 > 45476 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36092","16.989039","172.30.1.205","172.30.1.104","TCP","54","45476 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36093","16.989211","172.30.1.104","172.30.1.205","TCP","66","49671 > 38114 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36094","16.989227","172.30.1.205","172.30.1.104","TCP","54","38114 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36095","16.989644","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36096","16.989960","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36097","16.989969","172.30.1.205","172.30.1.104","TCP","54","38114 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36098","16.991888","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36099","16.992246","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36100","16.992253","172.30.1.205","172.30.1.104","TCP","54","38114 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36101","16.993685","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36102","16.996770","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36103","16.996790","172.30.1.205","172.30.1.104","TCP","54","38114 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36104","16.997786","172.30.1.205","172.30.1.104","TCP","74","45480 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920224 TSecr=0 WS=128" "36105","16.998123","172.30.1.104","172.30.1.205","TCP","66","135 > 45480 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36106","16.998135","172.30.1.205","172.30.1.104","TCP","54","45480 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36107","16.998497","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36108","16.999069","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36109","16.999085","172.30.1.205","172.30.1.104","TCP","54","45480 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36110","17.001329","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36111","17.001744","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36112","17.001751","172.30.1.205","172.30.1.104","TCP","54","45480 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36113","17.003568","172.30.1.205","172.30.1.104","TCP","54","45480 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36114","17.003691","172.30.1.205","172.30.1.104","TCP","74","38118 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920230 TSecr=0 WS=128" "36115","17.003852","172.30.1.104","172.30.1.205","TCP","54","135 > 45480 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36116","17.003864","172.30.1.104","172.30.1.205","TCP","54","135 > 45480 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36117","17.003871","172.30.1.205","172.30.1.104","TCP","54","45480 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36118","17.004031","172.30.1.104","172.30.1.205","TCP","66","49671 > 38118 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36119","17.004039","172.30.1.205","172.30.1.104","TCP","54","38118 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36120","17.004385","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36121","17.004676","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36122","17.004688","172.30.1.205","172.30.1.104","TCP","54","38118 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36123","17.006598","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36124","17.007002","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36125","17.007008","172.30.1.205","172.30.1.104","TCP","54","38118 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36126","17.008430","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36127","17.011419","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36128","17.011430","172.30.1.205","172.30.1.104","TCP","54","38118 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36129","17.012477","172.30.1.205","172.30.1.104","TCP","74","45484 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920238 TSecr=0 WS=128" "36130","17.012823","172.30.1.104","172.30.1.205","TCP","66","135 > 45484 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36131","17.012837","172.30.1.205","172.30.1.104","TCP","54","45484 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36132","17.013215","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36133","17.013536","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36134","17.013545","172.30.1.205","172.30.1.104","TCP","54","45484 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36135","17.015789","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36136","17.016234","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36137","17.016240","172.30.1.205","172.30.1.104","TCP","54","45484 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36138","17.018097","172.30.1.205","172.30.1.104","TCP","54","45484 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36139","17.018233","172.30.1.205","172.30.1.104","TCP","74","38122 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920244 TSecr=0 WS=128" "36140","17.018356","172.30.1.104","172.30.1.205","TCP","54","135 > 45484 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36141","17.018382","172.30.1.104","172.30.1.205","TCP","54","135 > 45484 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36142","17.018390","172.30.1.205","172.30.1.104","TCP","54","45484 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36143","17.018527","172.30.1.104","172.30.1.205","TCP","66","49671 > 38122 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36144","17.018536","172.30.1.205","172.30.1.104","TCP","54","38122 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36145","17.018883","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36146","17.019179","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36147","17.019189","172.30.1.205","172.30.1.104","TCP","54","38122 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36148","17.021138","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36149","17.021532","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36150","17.021538","172.30.1.205","172.30.1.104","TCP","54","38122 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36151","17.022920","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36152","17.025827","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36153","17.025838","172.30.1.205","172.30.1.104","TCP","54","38122 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36154","17.026875","172.30.1.205","172.30.1.104","TCP","74","45488 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920253 TSecr=0 WS=128" "36155","17.027195","172.30.1.104","172.30.1.205","TCP","66","135 > 45488 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36156","17.027208","172.30.1.205","172.30.1.104","TCP","54","45488 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36157","17.027574","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36158","17.027878","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36159","17.027887","172.30.1.205","172.30.1.104","TCP","54","45488 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36160","17.030154","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36161","17.030569","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36162","17.030576","172.30.1.205","172.30.1.104","TCP","54","45488 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36163","17.032421","172.30.1.205","172.30.1.104","TCP","54","45488 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36164","17.032548","172.30.1.205","172.30.1.104","TCP","74","38126 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920258 TSecr=0 WS=128" "36165","17.032736","172.30.1.104","172.30.1.205","TCP","54","135 > 45488 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36166","17.032753","172.30.1.104","172.30.1.205","TCP","54","135 > 45488 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36167","17.032761","172.30.1.205","172.30.1.104","TCP","54","45488 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36168","17.032865","172.30.1.104","172.30.1.205","TCP","66","49671 > 38126 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36169","17.032873","172.30.1.205","172.30.1.104","TCP","54","38126 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36170","17.033238","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36171","17.033561","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36172","17.033570","172.30.1.205","172.30.1.104","TCP","54","38126 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36173","17.035483","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36174","17.035884","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36175","17.035890","172.30.1.205","172.30.1.104","TCP","54","38126 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36176","17.037289","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36177","17.040204","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36178","17.040217","172.30.1.205","172.30.1.104","TCP","54","38126 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36179","17.041278","172.30.1.205","172.30.1.104","TCP","74","45492 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920267 TSecr=0 WS=128" "36180","17.041575","172.30.1.104","172.30.1.205","TCP","66","135 > 45492 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36181","17.041587","172.30.1.205","172.30.1.104","TCP","54","45492 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36182","17.041948","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36183","17.042278","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36184","17.042287","172.30.1.205","172.30.1.104","TCP","54","45492 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36185","17.044526","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36186","17.045014","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36187","17.045021","172.30.1.205","172.30.1.104","TCP","54","45492 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36188","17.046853","172.30.1.205","172.30.1.104","TCP","54","45492 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36189","17.046970","172.30.1.205","172.30.1.104","TCP","74","38130 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920273 TSecr=0 WS=128" "36190","17.047201","172.30.1.104","172.30.1.205","TCP","54","135 > 45492 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36191","17.047225","172.30.1.104","172.30.1.205","TCP","54","135 > 45492 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36192","17.047232","172.30.1.205","172.30.1.104","TCP","54","45492 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36193","17.047273","172.30.1.104","172.30.1.205","TCP","66","49671 > 38130 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36194","17.047282","172.30.1.205","172.30.1.104","TCP","54","38130 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36195","17.047650","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36196","17.047958","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36197","17.047968","172.30.1.205","172.30.1.104","TCP","54","38130 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36198","17.049885","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36199","17.050285","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36200","17.050291","172.30.1.205","172.30.1.104","TCP","54","38130 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36201","17.051691","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36202","17.054649","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36203","17.054659","172.30.1.205","172.30.1.104","TCP","54","38130 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36204","17.055602","172.30.1.205","172.30.1.104","TCP","74","45496 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920282 TSecr=0 WS=128" "36205","17.055967","172.30.1.104","172.30.1.205","TCP","66","135 > 45496 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36206","17.055978","172.30.1.205","172.30.1.104","TCP","54","45496 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36207","17.056347","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36208","17.056688","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36209","17.056697","172.30.1.205","172.30.1.104","TCP","54","45496 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36210","17.058902","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36211","17.059365","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36212","17.059372","172.30.1.205","172.30.1.104","TCP","54","45496 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36213","17.060252","172.30.1.205","172.30.1.104","TCP","54","38090 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36214","17.060301","172.30.1.205","172.30.1.104","TCP","54","38094 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36215","17.060328","172.30.1.205","172.30.1.104","TCP","54","38098 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36216","17.060358","172.30.1.205","172.30.1.104","TCP","54","38102 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36217","17.060381","172.30.1.205","172.30.1.104","TCP","54","38106 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36218","17.060409","172.30.1.205","172.30.1.104","TCP","54","38110 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36219","17.060432","172.30.1.205","172.30.1.104","TCP","54","38114 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36220","17.060460","172.30.1.205","172.30.1.104","TCP","54","38118 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36221","17.060486","172.30.1.205","172.30.1.104","TCP","54","38122 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36222","17.060508","172.30.1.205","172.30.1.104","TCP","54","38126 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36223","17.060535","172.30.1.205","172.30.1.104","TCP","54","38130 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36224","17.060574","172.30.1.104","172.30.1.205","TCP","54","49671 > 38090 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36225","17.060596","172.30.1.104","172.30.1.205","TCP","54","49671 > 38094 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36226","17.060640","172.30.1.205","172.30.1.104","TCP","54","38086 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36227","17.060746","172.30.1.104","172.30.1.205","TCP","54","49671 > 38090 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36228","17.060754","172.30.1.205","172.30.1.104","TCP","54","38090 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36229","17.060787","172.30.1.104","172.30.1.205","TCP","54","49671 > 38098 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36230","17.060805","172.30.1.104","172.30.1.205","TCP","54","49671 > 38094 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36231","17.060810","172.30.1.205","172.30.1.104","TCP","54","38094 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36232","17.060829","172.30.1.104","172.30.1.205","TCP","54","49671 > 38098 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36233","17.060833","172.30.1.205","172.30.1.104","TCP","54","38098 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36234","17.060855","172.30.1.104","172.30.1.205","TCP","54","49671 > 38102 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36235","17.060882","172.30.1.104","172.30.1.205","TCP","54","49671 > 38102 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36236","17.060886","172.30.1.205","172.30.1.104","TCP","54","38102 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36237","17.060910","172.30.1.104","172.30.1.205","TCP","54","49671 > 38106 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36238","17.061071","172.30.1.104","172.30.1.205","TCP","54","49671 > 38110 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36239","17.061094","172.30.1.104","172.30.1.205","TCP","54","49671 > 38106 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36240","17.061099","172.30.1.205","172.30.1.104","TCP","54","38106 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36241","17.061120","172.30.1.104","172.30.1.205","TCP","54","49671 > 38110 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36242","17.061123","172.30.1.205","172.30.1.104","TCP","54","38110 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36243","17.061148","172.30.1.104","172.30.1.205","TCP","54","49671 > 38114 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36244","17.061172","172.30.1.104","172.30.1.205","TCP","54","49671 > 38118 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36245","17.061197","172.30.1.104","172.30.1.205","TCP","54","49671 > 38122 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36246","17.061221","172.30.1.104","172.30.1.205","TCP","54","49671 > 38114 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36247","17.061225","172.30.1.205","172.30.1.104","TCP","54","38114 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36248","17.061246","172.30.1.104","172.30.1.205","TCP","54","49671 > 38126 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36249","17.061271","172.30.1.104","172.30.1.205","TCP","54","49671 > 38126 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36250","17.061274","172.30.1.205","172.30.1.104","TCP","54","38126 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36251","17.061374","172.30.1.104","172.30.1.205","TCP","54","49671 > 38130 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36252","17.061399","172.30.1.104","172.30.1.205","TCP","54","49671 > 38130 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36253","17.061403","172.30.1.205","172.30.1.104","TCP","54","38130 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36254","17.061426","172.30.1.104","172.30.1.205","TCP","54","49671 > 38118 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36255","17.061428","172.30.1.205","172.30.1.104","TCP","54","38118 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36256","17.061452","172.30.1.104","172.30.1.205","TCP","54","49671 > 38122 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36257","17.061454","172.30.1.205","172.30.1.104","TCP","54","38122 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36258","17.061479","172.30.1.104","172.30.1.205","TCP","54","49671 > 38086 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36259","17.061600","172.30.1.104","172.30.1.205","TCP","54","49671 > 38086 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36260","17.061604","172.30.1.205","172.30.1.104","TCP","54","38086 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36261","17.062269","172.30.1.205","172.30.1.104","TCP","54","45496 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36262","17.062387","172.30.1.205","172.30.1.104","TCP","74","38134 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920288 TSecr=0 WS=128" "36263","17.062537","172.30.1.104","172.30.1.205","TCP","54","135 > 45496 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36264","17.062567","172.30.1.104","172.30.1.205","TCP","54","135 > 45496 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36265","17.062572","172.30.1.205","172.30.1.104","TCP","54","45496 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36266","17.062706","172.30.1.104","172.30.1.205","TCP","66","49671 > 38134 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36267","17.062714","172.30.1.205","172.30.1.104","TCP","54","38134 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36268","17.063068","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36269","17.063380","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36270","17.063386","172.30.1.205","172.30.1.104","TCP","54","38134 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36271","17.065305","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36272","17.065692","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36273","17.065698","172.30.1.205","172.30.1.104","TCP","54","38134 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36274","17.067060","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36275","17.070080","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36276","17.070090","172.30.1.205","172.30.1.104","TCP","54","38134 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36277","17.071097","172.30.1.205","172.30.1.104","TCP","74","45500 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920297 TSecr=0 WS=128" "36278","17.071465","172.30.1.104","172.30.1.205","TCP","66","135 > 45500 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36279","17.071483","172.30.1.205","172.30.1.104","TCP","54","45500 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36280","17.071847","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36281","17.072162","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36282","17.072171","172.30.1.205","172.30.1.104","TCP","54","45500 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36283","17.074393","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36284","17.074913","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36285","17.074919","172.30.1.205","172.30.1.104","TCP","54","45500 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36286","17.076747","172.30.1.205","172.30.1.104","TCP","54","45500 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36287","17.076881","172.30.1.205","172.30.1.104","TCP","74","38138 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920303 TSecr=0 WS=128" "36288","17.077063","172.30.1.104","172.30.1.205","TCP","54","135 > 45500 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36289","17.077118","172.30.1.104","172.30.1.205","TCP","54","135 > 45500 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36290","17.077124","172.30.1.205","172.30.1.104","TCP","54","45500 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36291","17.077232","172.30.1.104","172.30.1.205","TCP","66","49671 > 38138 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36292","17.077247","172.30.1.205","172.30.1.104","TCP","54","38138 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36293","17.077590","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36294","17.077868","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36295","17.077877","172.30.1.205","172.30.1.104","TCP","54","38138 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36296","17.079761","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36297","17.080218","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36298","17.080224","172.30.1.205","172.30.1.104","TCP","54","38138 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36299","17.081615","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36300","17.084575","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36301","17.084587","172.30.1.205","172.30.1.104","TCP","54","38138 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36302","17.085608","172.30.1.205","172.30.1.104","TCP","74","45504 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920312 TSecr=0 WS=128" "36303","17.085939","172.30.1.104","172.30.1.205","TCP","66","135 > 45504 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36304","17.085950","172.30.1.205","172.30.1.104","TCP","54","45504 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36305","17.086309","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36306","17.086728","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36307","17.086737","172.30.1.205","172.30.1.104","TCP","54","45504 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36308","17.088976","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36309","17.089372","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36310","17.089379","172.30.1.205","172.30.1.104","TCP","54","45504 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36311","17.091204","172.30.1.205","172.30.1.104","TCP","54","45504 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36312","17.091317","172.30.1.205","172.30.1.104","TCP","74","38142 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920317 TSecr=0 WS=128" "36313","17.091478","172.30.1.104","172.30.1.205","TCP","54","135 > 45504 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36314","17.091502","172.30.1.104","172.30.1.205","TCP","54","135 > 45504 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36315","17.091509","172.30.1.205","172.30.1.104","TCP","54","45504 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36316","17.091587","172.30.1.104","172.30.1.205","TCP","66","49671 > 38142 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36317","17.091596","172.30.1.205","172.30.1.104","TCP","54","38142 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36318","17.091956","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36319","17.093248","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36320","17.093257","172.30.1.205","172.30.1.104","TCP","54","38142 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36321","17.095170","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36322","17.095563","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36323","17.095570","172.30.1.205","172.30.1.104","TCP","54","38142 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36324","17.096967","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36325","17.099916","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36326","17.099926","172.30.1.205","172.30.1.104","TCP","54","38142 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36327","17.100923","172.30.1.205","172.30.1.104","TCP","74","45508 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920327 TSecr=0 WS=128" "36328","17.101248","172.30.1.104","172.30.1.205","TCP","66","135 > 45508 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36329","17.101260","172.30.1.205","172.30.1.104","TCP","54","45508 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36330","17.101621","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36331","17.101898","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36332","17.101907","172.30.1.205","172.30.1.104","TCP","54","45508 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36333","17.104129","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36334","17.104555","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36335","17.104563","172.30.1.205","172.30.1.104","TCP","54","45508 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36336","17.106404","172.30.1.205","172.30.1.104","TCP","54","45508 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36337","17.106528","172.30.1.205","172.30.1.104","TCP","74","38146 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920332 TSecr=0 WS=128" "36338","17.106714","172.30.1.104","172.30.1.205","TCP","54","135 > 45508 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36339","17.106725","172.30.1.104","172.30.1.205","TCP","54","135 > 45508 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36340","17.106732","172.30.1.205","172.30.1.104","TCP","54","45508 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36341","17.106803","172.30.1.104","172.30.1.205","TCP","66","49671 > 38146 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36342","17.106812","172.30.1.205","172.30.1.104","TCP","54","38146 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36343","17.107162","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36344","17.107471","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36345","17.107480","172.30.1.205","172.30.1.104","TCP","54","38146 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36346","17.109392","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36347","17.109776","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36348","17.109780","172.30.1.205","172.30.1.104","TCP","54","38146 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36349","17.111141","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36350","17.113981","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36351","17.113991","172.30.1.205","172.30.1.104","TCP","54","38146 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36352","17.114968","172.30.1.205","172.30.1.104","TCP","74","45512 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920341 TSecr=0 WS=128" "36353","17.115650","172.30.1.104","172.30.1.205","TCP","66","135 > 45512 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36354","17.115661","172.30.1.205","172.30.1.104","TCP","54","45512 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36355","17.116012","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36356","17.116390","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36357","17.116401","172.30.1.205","172.30.1.104","TCP","54","45512 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36358","17.118627","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36359","17.119077","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36360","17.119087","172.30.1.205","172.30.1.104","TCP","54","45512 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36361","17.121034","172.30.1.205","172.30.1.104","TCP","54","45512 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36362","17.121165","172.30.1.205","172.30.1.104","TCP","74","38150 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920347 TSecr=0 WS=128" "36363","17.121369","172.30.1.104","172.30.1.205","TCP","54","135 > 45512 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36364","17.121385","172.30.1.104","172.30.1.205","TCP","54","135 > 45512 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36365","17.121391","172.30.1.205","172.30.1.104","TCP","54","45512 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36366","17.121461","172.30.1.104","172.30.1.205","TCP","66","49671 > 38150 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36367","17.121470","172.30.1.205","172.30.1.104","TCP","54","38150 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36368","17.121821","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36369","17.122131","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36370","17.122141","172.30.1.205","172.30.1.104","TCP","54","38150 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36371","17.124051","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36372","17.124442","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36373","17.124449","172.30.1.205","172.30.1.104","TCP","54","38150 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36374","17.125842","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36375","17.128807","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36376","17.128817","172.30.1.205","172.30.1.104","TCP","54","38150 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36377","17.129785","172.30.1.205","172.30.1.104","TCP","74","45516 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920356 TSecr=0 WS=128" "36378","17.130130","172.30.1.104","172.30.1.205","TCP","66","135 > 45516 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36379","17.130142","172.30.1.205","172.30.1.104","TCP","54","45516 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36380","17.130498","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36381","17.130798","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36382","17.130807","172.30.1.205","172.30.1.104","TCP","54","45516 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36383","17.133024","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36384","17.133409","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36385","17.133416","172.30.1.205","172.30.1.104","TCP","54","45516 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36386","17.135238","172.30.1.205","172.30.1.104","TCP","54","45516 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36387","17.135353","172.30.1.205","172.30.1.104","TCP","74","38154 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920361 TSecr=0 WS=128" "36388","17.135491","172.30.1.104","172.30.1.205","TCP","54","135 > 45516 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36389","17.135524","172.30.1.104","172.30.1.205","TCP","54","135 > 45516 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36390","17.135530","172.30.1.205","172.30.1.104","TCP","54","45516 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36391","17.135630","172.30.1.104","172.30.1.205","TCP","66","49671 > 38154 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36392","17.135639","172.30.1.205","172.30.1.104","TCP","54","38154 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36393","17.135988","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36394","17.136259","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36395","17.136268","172.30.1.205","172.30.1.104","TCP","54","38154 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36396","17.138170","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36397","17.138521","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36398","17.138528","172.30.1.205","172.30.1.104","TCP","54","38154 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36399","17.139895","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36400","17.142822","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36401","17.142834","172.30.1.205","172.30.1.104","TCP","54","38154 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36402","17.143807","172.30.1.205","172.30.1.104","TCP","74","45520 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920370 TSecr=0 WS=128" "36403","17.144133","172.30.1.104","172.30.1.205","TCP","66","135 > 45520 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36404","17.144145","172.30.1.205","172.30.1.104","TCP","54","45520 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36405","17.144493","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36406","17.144786","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36407","17.144796","172.30.1.205","172.30.1.104","TCP","54","45520 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36408","17.147015","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36409","17.147463","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36410","17.147470","172.30.1.205","172.30.1.104","TCP","54","45520 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36411","17.149327","172.30.1.205","172.30.1.104","TCP","54","45520 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36412","17.149448","172.30.1.205","172.30.1.104","TCP","74","38158 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920375 TSecr=0 WS=128" "36413","17.149590","172.30.1.104","172.30.1.205","TCP","54","135 > 45520 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36414","17.149609","172.30.1.104","172.30.1.205","TCP","54","135 > 45520 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36415","17.149616","172.30.1.205","172.30.1.104","TCP","54","45520 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36416","17.149740","172.30.1.104","172.30.1.205","TCP","66","49671 > 38158 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36417","17.149749","172.30.1.205","172.30.1.104","TCP","54","38158 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36418","17.150093","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36419","17.150392","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36420","17.150399","172.30.1.205","172.30.1.104","TCP","54","38158 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36421","17.152268","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36422","17.152704","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36423","17.152711","172.30.1.205","172.30.1.104","TCP","54","38158 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36424","17.154100","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36425","17.157113","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36426","17.157124","172.30.1.205","172.30.1.104","TCP","54","38158 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36427","17.158098","172.30.1.205","172.30.1.104","TCP","74","45524 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920384 TSecr=0 WS=128" "36428","17.158394","172.30.1.104","172.30.1.205","TCP","66","135 > 45524 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36429","17.158405","172.30.1.205","172.30.1.104","TCP","54","45524 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36430","17.158758","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36431","17.159051","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36432","17.159060","172.30.1.205","172.30.1.104","TCP","54","45524 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36433","17.161331","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36434","17.161754","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36435","17.161760","172.30.1.205","172.30.1.104","TCP","54","45524 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36436","17.163577","172.30.1.205","172.30.1.104","TCP","54","45524 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36437","17.163698","172.30.1.205","172.30.1.104","TCP","74","38162 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920390 TSecr=0 WS=128" "36438","17.163843","172.30.1.104","172.30.1.205","TCP","54","135 > 45524 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36439","17.163879","172.30.1.104","172.30.1.205","TCP","54","135 > 45524 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36440","17.163885","172.30.1.205","172.30.1.104","TCP","54","45524 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36441","17.163977","172.30.1.104","172.30.1.205","TCP","66","49671 > 38162 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36442","17.163986","172.30.1.205","172.30.1.104","TCP","54","38162 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36443","17.164331","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36444","17.164636","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36445","17.164645","172.30.1.205","172.30.1.104","TCP","54","38162 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36446","17.166572","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36447","17.166928","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36448","17.166934","172.30.1.205","172.30.1.104","TCP","54","38162 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36449","17.168303","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36450","17.171272","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36451","17.171288","172.30.1.205","172.30.1.104","TCP","54","38162 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36452","17.172284","172.30.1.205","172.30.1.104","TCP","74","45528 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920398 TSecr=0 WS=128" "36453","17.172624","172.30.1.104","172.30.1.205","TCP","66","135 > 45528 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36454","17.172635","172.30.1.205","172.30.1.104","TCP","54","45528 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36455","17.173015","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36456","17.173286","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36457","17.173295","172.30.1.205","172.30.1.104","TCP","54","45528 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36458","17.175514","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36459","17.175934","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36460","17.175941","172.30.1.205","172.30.1.104","TCP","54","45528 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36461","17.177837","172.30.1.205","172.30.1.104","TCP","54","45528 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36462","17.177952","172.30.1.205","172.30.1.104","TCP","74","38166 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920404 TSecr=0 WS=128" "36463","17.178112","172.30.1.104","172.30.1.205","TCP","54","135 > 45528 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36464","17.178141","172.30.1.104","172.30.1.205","TCP","54","135 > 45528 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36465","17.178147","172.30.1.205","172.30.1.104","TCP","54","45528 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36466","17.178218","172.30.1.104","172.30.1.205","TCP","66","49671 > 38166 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36467","17.178226","172.30.1.205","172.30.1.104","TCP","54","38166 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36468","17.178579","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36469","17.178869","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36470","17.178878","172.30.1.205","172.30.1.104","TCP","54","38166 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36471","17.180763","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36472","17.181167","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36473","17.181173","172.30.1.205","172.30.1.104","TCP","54","38166 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36474","17.182523","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36475","17.185632","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36476","17.185644","172.30.1.205","172.30.1.104","TCP","54","38166 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36477","17.186644","172.30.1.205","172.30.1.104","TCP","74","45532 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920413 TSecr=0 WS=128" "36478","17.187002","172.30.1.104","172.30.1.205","TCP","66","135 > 45532 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36479","17.187014","172.30.1.205","172.30.1.104","TCP","54","45532 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36480","17.187366","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36481","17.187726","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36482","17.187737","172.30.1.205","172.30.1.104","TCP","54","45532 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36483","17.189999","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36484","17.190423","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36485","17.190430","172.30.1.205","172.30.1.104","TCP","54","45532 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36486","17.192253","172.30.1.205","172.30.1.104","TCP","54","45532 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36487","17.192373","172.30.1.205","172.30.1.104","TCP","74","38170 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920418 TSecr=0 WS=128" "36488","17.192516","172.30.1.104","172.30.1.205","TCP","54","135 > 45532 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36489","17.192546","172.30.1.104","172.30.1.205","TCP","54","135 > 45532 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36490","17.192553","172.30.1.205","172.30.1.104","TCP","54","45532 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36491","17.192642","172.30.1.104","172.30.1.205","TCP","66","49671 > 38170 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36492","17.192650","172.30.1.205","172.30.1.104","TCP","54","38170 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36493","17.193049","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36494","17.193338","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36495","17.193347","172.30.1.205","172.30.1.104","TCP","54","38170 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36496","17.195219","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36497","17.195599","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36498","17.195605","172.30.1.205","172.30.1.104","TCP","54","38170 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36499","17.196992","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36500","17.200067","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36501","17.200076","172.30.1.205","172.30.1.104","TCP","54","38170 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36502","17.201060","172.30.1.205","172.30.1.104","TCP","74","45536 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920427 TSecr=0 WS=128" "36503","17.201428","172.30.1.104","172.30.1.205","TCP","66","135 > 45536 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36504","17.201440","172.30.1.205","172.30.1.104","TCP","54","45536 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36505","17.201798","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36506","17.202128","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36507","17.202137","172.30.1.205","172.30.1.104","TCP","54","45536 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36508","17.204352","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36509","17.204791","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36510","17.204798","172.30.1.205","172.30.1.104","TCP","54","45536 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36511","17.206625","172.30.1.205","172.30.1.104","TCP","54","45536 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36512","17.206750","172.30.1.205","172.30.1.104","TCP","74","38174 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920433 TSecr=0 WS=128" "36513","17.206895","172.30.1.104","172.30.1.205","TCP","54","135 > 45536 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36514","17.206925","172.30.1.104","172.30.1.205","TCP","54","135 > 45536 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36515","17.206932","172.30.1.205","172.30.1.104","TCP","54","45536 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36516","17.207063","172.30.1.104","172.30.1.205","TCP","66","49671 > 38174 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36517","17.207072","172.30.1.205","172.30.1.104","TCP","54","38174 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36518","17.207426","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36519","17.207700","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36520","17.207709","172.30.1.205","172.30.1.104","TCP","54","38174 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36521","17.209648","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36522","17.210655","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36523","17.210661","172.30.1.205","172.30.1.104","TCP","54","38174 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36524","17.212031","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36525","17.214985","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36526","17.214997","172.30.1.205","172.30.1.104","TCP","54","38174 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36527","17.216045","172.30.1.205","172.30.1.104","TCP","74","45540 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920442 TSecr=0 WS=128" "36528","17.216386","172.30.1.104","172.30.1.205","TCP","66","135 > 45540 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36529","17.216398","172.30.1.205","172.30.1.104","TCP","54","45540 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36530","17.216754","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36531","17.217046","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36532","17.217055","172.30.1.205","172.30.1.104","TCP","54","45540 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36533","17.219280","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36534","17.219664","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36535","17.219671","172.30.1.205","172.30.1.104","TCP","54","45540 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36536","17.221519","172.30.1.205","172.30.1.104","TCP","54","45540 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36537","17.221643","172.30.1.205","172.30.1.104","TCP","74","38178 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920448 TSecr=0 WS=128" "36538","17.221797","172.30.1.104","172.30.1.205","TCP","54","135 > 45540 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36539","17.221807","172.30.1.104","172.30.1.205","TCP","54","135 > 45540 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36540","17.221814","172.30.1.205","172.30.1.104","TCP","54","45540 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36541","17.221906","172.30.1.104","172.30.1.205","TCP","66","49671 > 38178 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36542","17.221914","172.30.1.205","172.30.1.104","TCP","54","38178 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36543","17.222258","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36544","17.222531","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36545","17.222540","172.30.1.205","172.30.1.104","TCP","54","38178 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36546","17.224420","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36547","17.224770","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36548","17.224786","172.30.1.205","172.30.1.104","TCP","54","38178 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36549","17.226149","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36550","17.229142","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36551","17.229152","172.30.1.205","172.30.1.104","TCP","54","38178 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36552","17.230121","172.30.1.205","172.30.1.104","TCP","74","45544 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920456 TSecr=0 WS=128" "36553","17.230435","172.30.1.104","172.30.1.205","TCP","66","135 > 45544 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36554","17.230446","172.30.1.205","172.30.1.104","TCP","54","45544 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36555","17.230802","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36556","17.231102","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36557","17.231111","172.30.1.205","172.30.1.104","TCP","54","45544 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36558","17.233333","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36559","17.233749","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36560","17.233756","172.30.1.205","172.30.1.104","TCP","54","45544 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36561","17.234616","172.30.1.205","172.30.1.104","TCP","54","38134 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36562","17.234666","172.30.1.205","172.30.1.104","TCP","54","38138 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36563","17.234704","172.30.1.205","172.30.1.104","TCP","54","38142 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36564","17.234738","172.30.1.205","172.30.1.104","TCP","54","38146 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36565","17.234771","172.30.1.205","172.30.1.104","TCP","54","38150 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36566","17.234803","172.30.1.205","172.30.1.104","TCP","54","38154 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36567","17.234832","172.30.1.205","172.30.1.104","TCP","54","38158 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36568","17.234859","172.30.1.205","172.30.1.104","TCP","54","38162 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36569","17.234885","172.30.1.205","172.30.1.104","TCP","54","38166 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36570","17.234912","172.30.1.205","172.30.1.104","TCP","54","38170 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36571","17.234939","172.30.1.205","172.30.1.104","TCP","54","38174 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36572","17.234961","172.30.1.205","172.30.1.104","TCP","54","38178 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36573","17.235255","172.30.1.104","172.30.1.205","TCP","54","49671 > 38134 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36574","17.235271","172.30.1.104","172.30.1.205","TCP","54","49671 > 38142 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36575","17.235292","172.30.1.104","172.30.1.205","TCP","54","49671 > 38134 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36576","17.235299","172.30.1.205","172.30.1.104","TCP","54","38134 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36577","17.235311","172.30.1.104","172.30.1.205","TCP","54","49671 > 38138 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36578","17.235335","172.30.1.104","172.30.1.205","TCP","54","49671 > 38146 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36579","17.235382","172.30.1.104","172.30.1.205","TCP","54","49671 > 38138 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36580","17.235388","172.30.1.205","172.30.1.104","TCP","54","38138 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36581","17.235400","172.30.1.104","172.30.1.205","TCP","54","49671 > 38150 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36582","17.235422","172.30.1.104","172.30.1.205","TCP","54","49671 > 38142 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36583","17.235426","172.30.1.205","172.30.1.104","TCP","54","38142 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36584","17.235468","172.30.1.104","172.30.1.205","TCP","54","49671 > 38154 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36585","17.235486","172.30.1.104","172.30.1.205","TCP","54","49671 > 38154 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36586","17.235489","172.30.1.205","172.30.1.104","TCP","54","38154 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36587","17.235506","172.30.1.104","172.30.1.205","TCP","54","49671 > 38158 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36588","17.235538","172.30.1.104","172.30.1.205","TCP","54","49671 > 38150 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36589","17.235540","172.30.1.205","172.30.1.104","TCP","54","38150 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36590","17.235558","172.30.1.104","172.30.1.205","TCP","54","49671 > 38162 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36591","17.235579","172.30.1.104","172.30.1.205","TCP","54","49671 > 38162 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36592","17.235582","172.30.1.205","172.30.1.104","TCP","54","38162 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36593","17.235599","172.30.1.104","172.30.1.205","TCP","54","49671 > 38166 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36594","17.235619","172.30.1.104","172.30.1.205","TCP","54","49671 > 38158 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36595","17.235622","172.30.1.205","172.30.1.104","TCP","54","38158 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36596","17.235639","172.30.1.104","172.30.1.205","TCP","54","49671 > 38170 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36597","17.235659","172.30.1.104","172.30.1.205","TCP","54","49671 > 38170 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36598","17.235663","172.30.1.205","172.30.1.104","TCP","54","38170 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36599","17.235679","172.30.1.104","172.30.1.205","TCP","54","49671 > 38174 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36600","17.235702","172.30.1.104","172.30.1.205","TCP","54","49671 > 38166 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36601","17.235706","172.30.1.205","172.30.1.104","TCP","54","38166 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36602","17.235722","172.30.1.104","172.30.1.205","TCP","54","49671 > 38178 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36603","17.235743","172.30.1.104","172.30.1.205","TCP","54","49671 > 38178 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36604","17.235747","172.30.1.205","172.30.1.104","TCP","54","38178 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36605","17.235763","172.30.1.104","172.30.1.205","TCP","54","49671 > 38174 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36606","17.235766","172.30.1.205","172.30.1.104","TCP","54","38174 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36607","17.235782","172.30.1.104","172.30.1.205","TCP","54","49671 > 38146 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36608","17.235785","172.30.1.205","172.30.1.104","TCP","54","38146 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36609","17.236560","172.30.1.205","172.30.1.104","TCP","54","45544 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36610","17.236673","172.30.1.205","172.30.1.104","TCP","74","38182 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920463 TSecr=0 WS=128" "36611","17.236841","172.30.1.104","172.30.1.205","TCP","54","135 > 45544 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36612","17.236862","172.30.1.104","172.30.1.205","TCP","54","135 > 45544 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36613","17.236868","172.30.1.205","172.30.1.104","TCP","54","45544 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36614","17.236999","172.30.1.104","172.30.1.205","TCP","66","49671 > 38182 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36615","17.237008","172.30.1.205","172.30.1.104","TCP","54","38182 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36616","17.237371","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36617","17.237677","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36618","17.237684","172.30.1.205","172.30.1.104","TCP","54","38182 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36619","17.239556","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36620","17.239942","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36621","17.239948","172.30.1.205","172.30.1.104","TCP","54","38182 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36622","17.241352","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36623","17.245540","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36624","17.245551","172.30.1.205","172.30.1.104","TCP","54","38182 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36625","17.246544","172.30.1.205","172.30.1.104","TCP","74","45548 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920472 TSecr=0 WS=128" "36626","17.246862","172.30.1.104","172.30.1.205","TCP","66","135 > 45548 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36627","17.246874","172.30.1.205","172.30.1.104","TCP","54","45548 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36628","17.247232","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36629","17.247603","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36630","17.247612","172.30.1.205","172.30.1.104","TCP","54","45548 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36631","17.249842","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36632","17.250268","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36633","17.250274","172.30.1.205","172.30.1.104","TCP","54","45548 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36634","17.252095","172.30.1.205","172.30.1.104","TCP","54","45548 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36635","17.252213","172.30.1.205","172.30.1.104","TCP","74","38186 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920478 TSecr=0 WS=128" "36636","17.252392","172.30.1.104","172.30.1.205","TCP","54","135 > 45548 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36637","17.252418","172.30.1.104","172.30.1.205","TCP","54","135 > 45548 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36638","17.252425","172.30.1.205","172.30.1.104","TCP","54","45548 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36639","17.252504","172.30.1.104","172.30.1.205","TCP","66","49671 > 38186 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36640","17.252512","172.30.1.205","172.30.1.104","TCP","54","38186 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36641","17.252886","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36642","17.253236","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36643","17.253244","172.30.1.205","172.30.1.104","TCP","54","38186 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36644","17.255141","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36645","17.255516","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36646","17.255522","172.30.1.205","172.30.1.104","TCP","54","38186 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36647","17.256918","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36648","17.259921","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36649","17.259930","172.30.1.205","172.30.1.104","TCP","54","38186 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36650","17.260901","172.30.1.205","172.30.1.104","TCP","74","45552 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920487 TSecr=0 WS=128" "36651","17.261219","172.30.1.104","172.30.1.205","TCP","66","135 > 45552 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36652","17.261230","172.30.1.205","172.30.1.104","TCP","54","45552 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36653","17.261584","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36654","17.261995","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36655","17.262007","172.30.1.205","172.30.1.104","TCP","54","45552 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36656","17.264249","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36657","17.264667","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36658","17.264673","172.30.1.205","172.30.1.104","TCP","54","45552 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36659","17.266513","172.30.1.205","172.30.1.104","TCP","54","45552 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36660","17.266627","172.30.1.205","172.30.1.104","TCP","74","38190 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920493 TSecr=0 WS=128" "36661","17.266765","172.30.1.104","172.30.1.205","TCP","54","135 > 45552 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36662","17.266781","172.30.1.104","172.30.1.205","TCP","54","135 > 45552 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36663","17.266786","172.30.1.205","172.30.1.104","TCP","54","45552 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36664","17.266911","172.30.1.104","172.30.1.205","TCP","66","49671 > 38190 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36665","17.266919","172.30.1.205","172.30.1.104","TCP","54","38190 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36666","17.267265","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36667","17.267558","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36668","17.267567","172.30.1.205","172.30.1.104","TCP","54","38190 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36669","17.269498","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36670","17.269872","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36671","17.269879","172.30.1.205","172.30.1.104","TCP","54","38190 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36672","17.271226","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36673","17.274182","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36674","17.274192","172.30.1.205","172.30.1.104","TCP","54","38190 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36675","17.275157","172.30.1.205","172.30.1.104","TCP","74","45556 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920501 TSecr=0 WS=128" "36676","17.275609","172.30.1.104","172.30.1.205","TCP","66","135 > 45556 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36677","17.275619","172.30.1.205","172.30.1.104","TCP","54","45556 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36678","17.275974","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36679","17.276276","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36680","17.276285","172.30.1.205","172.30.1.104","TCP","54","45556 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36681","17.278510","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36682","17.278990","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36683","17.278997","172.30.1.205","172.30.1.104","TCP","54","45556 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36684","17.280831","172.30.1.205","172.30.1.104","TCP","54","45556 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36685","17.280941","172.30.1.205","172.30.1.104","TCP","74","38194 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920507 TSecr=0 WS=128" "36686","17.281130","172.30.1.104","172.30.1.205","TCP","54","135 > 45556 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36687","17.281151","172.30.1.104","172.30.1.205","TCP","54","135 > 45556 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36688","17.281158","172.30.1.205","172.30.1.104","TCP","54","45556 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36689","17.281261","172.30.1.104","172.30.1.205","TCP","66","49671 > 38194 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36690","17.281270","172.30.1.205","172.30.1.104","TCP","54","38194 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36691","17.281619","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36692","17.282482","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36693","17.282497","172.30.1.205","172.30.1.104","TCP","54","38194 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36694","17.284366","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36695","17.284771","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36696","17.284787","172.30.1.205","172.30.1.104","TCP","54","38194 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36697","17.286144","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36698","17.289211","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36699","17.289221","172.30.1.205","172.30.1.104","TCP","54","38194 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36700","17.290161","172.30.1.205","172.30.1.104","TCP","74","45560 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920516 TSecr=0 WS=128" "36701","17.290462","172.30.1.104","172.30.1.205","TCP","66","135 > 45560 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36702","17.290473","172.30.1.205","172.30.1.104","TCP","54","45560 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36703","17.290821","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36704","17.291097","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36705","17.291106","172.30.1.205","172.30.1.104","TCP","54","45560 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36706","17.293334","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36707","17.293814","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36708","17.293821","172.30.1.205","172.30.1.104","TCP","54","45560 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36709","17.295647","172.30.1.205","172.30.1.104","TCP","54","45560 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36710","17.295761","172.30.1.205","172.30.1.104","TCP","74","38198 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920522 TSecr=0 WS=128" "36711","17.295923","172.30.1.104","172.30.1.205","TCP","54","135 > 45560 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36712","17.295946","172.30.1.104","172.30.1.205","TCP","54","135 > 45560 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36713","17.295951","172.30.1.205","172.30.1.104","TCP","54","45560 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36714","17.296017","172.30.1.104","172.30.1.205","TCP","66","49671 > 38198 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36715","17.296026","172.30.1.205","172.30.1.104","TCP","54","38198 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36716","17.296370","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36717","17.296680","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36718","17.296689","172.30.1.205","172.30.1.104","TCP","54","38198 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36719","17.298599","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36720","17.298980","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36721","17.298987","172.30.1.205","172.30.1.104","TCP","54","38198 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36722","17.300333","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36723","17.304216","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36724","17.304226","172.30.1.205","172.30.1.104","TCP","54","38198 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36725","17.305201","172.30.1.205","172.30.1.104","TCP","74","45564 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920531 TSecr=0 WS=128" "36726","17.305551","172.30.1.104","172.30.1.205","TCP","66","135 > 45564 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36727","17.305563","172.30.1.205","172.30.1.104","TCP","54","45564 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36728","17.305923","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36729","17.306200","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36730","17.306209","172.30.1.205","172.30.1.104","TCP","54","45564 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36731","17.308397","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36732","17.308983","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36733","17.308990","172.30.1.205","172.30.1.104","TCP","54","45564 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36734","17.310825","172.30.1.205","172.30.1.104","TCP","54","45564 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36735","17.310938","172.30.1.205","172.30.1.104","TCP","74","38202 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920537 TSecr=0 WS=128" "36736","17.311092","172.30.1.104","172.30.1.205","TCP","54","135 > 45564 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36737","17.311121","172.30.1.104","172.30.1.205","TCP","54","135 > 45564 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36738","17.311126","172.30.1.205","172.30.1.104","TCP","54","45564 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36739","17.311224","172.30.1.104","172.30.1.205","TCP","66","49671 > 38202 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36740","17.311233","172.30.1.205","172.30.1.104","TCP","54","38202 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36741","17.311595","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36742","17.311884","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36743","17.311892","172.30.1.205","172.30.1.104","TCP","54","38202 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36744","17.313800","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36745","17.314219","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36746","17.314225","172.30.1.205","172.30.1.104","TCP","54","38202 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36747","17.315573","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36748","17.318707","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36749","17.318717","172.30.1.205","172.30.1.104","TCP","54","38202 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36750","17.319681","172.30.1.205","172.30.1.104","TCP","74","45568 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920546 TSecr=0 WS=128" "36751","17.319997","172.30.1.104","172.30.1.205","TCP","66","135 > 45568 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36752","17.320007","172.30.1.205","172.30.1.104","TCP","54","45568 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36753","17.320359","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36754","17.320655","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36755","17.320664","172.30.1.205","172.30.1.104","TCP","54","45568 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36756","17.322912","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36757","17.323355","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36758","17.323362","172.30.1.205","172.30.1.104","TCP","54","45568 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36759","17.325217","172.30.1.205","172.30.1.104","TCP","54","45568 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36760","17.325329","172.30.1.205","172.30.1.104","TCP","74","38206 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920551 TSecr=0 WS=128" "36761","17.325489","172.30.1.104","172.30.1.205","TCP","54","135 > 45568 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36762","17.325513","172.30.1.104","172.30.1.205","TCP","54","135 > 45568 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36763","17.325519","172.30.1.205","172.30.1.104","TCP","54","45568 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36764","17.325625","172.30.1.104","172.30.1.205","TCP","66","49671 > 38206 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36765","17.325633","172.30.1.205","172.30.1.104","TCP","54","38206 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36766","17.325976","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36767","17.326300","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36768","17.326309","172.30.1.205","172.30.1.104","TCP","54","38206 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36769","17.328199","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36770","17.328580","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36771","17.328586","172.30.1.205","172.30.1.104","TCP","54","38206 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36772","17.329966","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36773","17.332987","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36774","17.332997","172.30.1.205","172.30.1.104","TCP","54","38206 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36775","17.333943","172.30.1.205","172.30.1.104","TCP","74","45572 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920560 TSecr=0 WS=128" "36776","17.334268","172.30.1.104","172.30.1.205","TCP","66","135 > 45572 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36777","17.334281","172.30.1.205","172.30.1.104","TCP","54","45572 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36778","17.334648","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36779","17.334957","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36780","17.334966","172.30.1.205","172.30.1.104","TCP","54","45572 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36781","17.337190","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36782","17.337645","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36783","17.337655","172.30.1.205","172.30.1.104","TCP","54","45572 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36784","17.339571","172.30.1.205","172.30.1.104","TCP","54","45572 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36785","17.339697","172.30.1.205","172.30.1.104","TCP","74","38210 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920566 TSecr=0 WS=128" "36786","17.339855","172.30.1.104","172.30.1.205","TCP","54","135 > 45572 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36787","17.339882","172.30.1.104","172.30.1.205","TCP","54","135 > 45572 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36788","17.339887","172.30.1.205","172.30.1.104","TCP","54","45572 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36789","17.340010","172.30.1.104","172.30.1.205","TCP","66","49671 > 38210 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36790","17.340026","172.30.1.205","172.30.1.104","TCP","54","38210 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36791","17.340415","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36792","17.340722","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36793","17.340732","172.30.1.205","172.30.1.104","TCP","54","38210 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36794","17.342658","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36795","17.343032","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36796","17.343040","172.30.1.205","172.30.1.104","TCP","54","38210 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36797","17.344424","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36798","17.347494","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36799","17.347506","172.30.1.205","172.30.1.104","TCP","54","38210 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36800","17.348464","172.30.1.205","172.30.1.104","TCP","74","45576 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920574 TSecr=0 WS=128" "36801","17.348794","172.30.1.104","172.30.1.205","TCP","66","135 > 45576 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36802","17.348806","172.30.1.205","172.30.1.104","TCP","54","45576 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36803","17.349175","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36804","17.349462","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36805","17.349471","172.30.1.205","172.30.1.104","TCP","54","45576 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36806","17.351662","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36807","17.352057","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36808","17.352064","172.30.1.205","172.30.1.104","TCP","54","45576 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36809","17.353899","172.30.1.205","172.30.1.104","TCP","54","45576 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36810","17.354010","172.30.1.205","172.30.1.104","TCP","74","38214 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920580 TSecr=0 WS=128" "36811","17.354183","172.30.1.104","172.30.1.205","TCP","54","135 > 45576 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36812","17.354246","172.30.1.104","172.30.1.205","TCP","54","135 > 45576 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36813","17.354252","172.30.1.205","172.30.1.104","TCP","54","45576 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36814","17.354331","172.30.1.104","172.30.1.205","TCP","66","49671 > 38214 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36815","17.354340","172.30.1.205","172.30.1.104","TCP","54","38214 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36816","17.354696","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36817","17.354986","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36818","17.354995","172.30.1.205","172.30.1.104","TCP","54","38214 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36819","17.356886","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36820","17.357280","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36821","17.357286","172.30.1.205","172.30.1.104","TCP","54","38214 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36822","17.358637","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36823","17.361588","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36824","17.361599","172.30.1.205","172.30.1.104","TCP","54","38214 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36825","17.362533","172.30.1.205","172.30.1.104","TCP","74","45580 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920588 TSecr=0 WS=128" "36826","17.362882","172.30.1.104","172.30.1.205","TCP","66","135 > 45580 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36827","17.362893","172.30.1.205","172.30.1.104","TCP","54","45580 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36828","17.363244","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36829","17.363526","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36830","17.363535","172.30.1.205","172.30.1.104","TCP","54","45580 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36831","17.365818","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36832","17.366212","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36833","17.366219","172.30.1.205","172.30.1.104","TCP","54","45580 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36834","17.368058","172.30.1.205","172.30.1.104","TCP","54","45580 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36835","17.368171","172.30.1.205","172.30.1.104","TCP","74","38218 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920594 TSecr=0 WS=128" "36836","17.368333","172.30.1.104","172.30.1.205","TCP","54","135 > 45580 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36837","17.368355","172.30.1.104","172.30.1.205","TCP","54","135 > 45580 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36838","17.368360","172.30.1.205","172.30.1.104","TCP","54","45580 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36839","17.368458","172.30.1.104","172.30.1.205","TCP","66","49671 > 38218 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36840","17.368466","172.30.1.205","172.30.1.104","TCP","54","38218 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36841","17.368856","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36842","17.369150","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36843","17.369159","172.30.1.205","172.30.1.104","TCP","54","38218 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36844","17.371039","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36845","17.371451","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36846","17.371460","172.30.1.205","172.30.1.104","TCP","54","38218 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36847","17.372905","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36848","17.375916","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36849","17.375927","172.30.1.205","172.30.1.104","TCP","54","38218 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36850","17.376930","172.30.1.205","172.30.1.104","TCP","74","45584 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920603 TSecr=0 WS=128" "36851","17.377298","172.30.1.104","172.30.1.205","TCP","66","135 > 45584 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36852","17.377311","172.30.1.205","172.30.1.104","TCP","54","45584 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36853","17.377677","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36854","17.377986","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36855","17.377995","172.30.1.205","172.30.1.104","TCP","54","45584 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36856","17.380211","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36857","17.380637","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36858","17.380644","172.30.1.205","172.30.1.104","TCP","54","45584 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36859","17.382496","172.30.1.205","172.30.1.104","TCP","54","45584 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36860","17.382616","172.30.1.205","172.30.1.104","TCP","74","38222 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920609 TSecr=0 WS=128" "36861","17.382768","172.30.1.104","172.30.1.205","TCP","54","135 > 45584 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36862","17.382800","172.30.1.104","172.30.1.205","TCP","54","135 > 45584 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36863","17.382807","172.30.1.205","172.30.1.104","TCP","54","45584 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36864","17.382907","172.30.1.104","172.30.1.205","TCP","66","49671 > 38222 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36865","17.382916","172.30.1.205","172.30.1.104","TCP","54","38222 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36866","17.383267","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36867","17.383574","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36868","17.383583","172.30.1.205","172.30.1.104","TCP","54","38222 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36869","17.385535","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36870","17.385916","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36871","17.385923","172.30.1.205","172.30.1.104","TCP","54","38222 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36872","17.387291","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36873","17.390374","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36874","17.390384","172.30.1.205","172.30.1.104","TCP","54","38222 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36875","17.391349","172.30.1.205","172.30.1.104","TCP","74","45588 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920617 TSecr=0 WS=128" "36876","17.391650","172.30.1.104","172.30.1.205","TCP","66","135 > 45588 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36877","17.391660","172.30.1.205","172.30.1.104","TCP","54","45588 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36878","17.392008","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36879","17.392282","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36880","17.392290","172.30.1.205","172.30.1.104","TCP","54","45588 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36881","17.394525","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36882","17.394967","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36883","17.394974","172.30.1.205","172.30.1.104","TCP","54","45588 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36884","17.396819","172.30.1.205","172.30.1.104","TCP","54","45588 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36885","17.396940","172.30.1.205","172.30.1.104","TCP","74","38226 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920623 TSecr=0 WS=128" "36886","17.397088","172.30.1.104","172.30.1.205","TCP","54","135 > 45588 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36887","17.397100","172.30.1.104","172.30.1.205","TCP","54","135 > 45588 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36888","17.397106","172.30.1.205","172.30.1.104","TCP","54","45588 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36889","17.397260","172.30.1.104","172.30.1.205","TCP","66","49671 > 38226 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36890","17.397269","172.30.1.205","172.30.1.104","TCP","54","38226 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36891","17.397616","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36892","17.399094","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36893","17.399101","172.30.1.205","172.30.1.104","TCP","54","38226 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36894","17.401033","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36895","17.401407","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36896","17.401413","172.30.1.205","172.30.1.104","TCP","54","38226 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36897","17.402771","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36898","17.405846","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36899","17.405856","172.30.1.205","172.30.1.104","TCP","54","38226 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36900","17.406825","172.30.1.205","172.30.1.104","TCP","74","45592 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920633 TSecr=0 WS=128" "36901","17.407131","172.30.1.104","172.30.1.205","TCP","66","135 > 45592 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36902","17.407141","172.30.1.205","172.30.1.104","TCP","54","45592 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36903","17.407489","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36904","17.407822","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36905","17.407831","172.30.1.205","172.30.1.104","TCP","54","45592 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36906","17.410095","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36907","17.410491","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36908","17.410497","172.30.1.205","172.30.1.104","TCP","54","45592 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36909","17.411346","172.30.1.205","172.30.1.104","TCP","54","38186 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36910","17.411395","172.30.1.205","172.30.1.104","TCP","54","38190 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36911","17.411432","172.30.1.205","172.30.1.104","TCP","54","38194 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36912","17.411465","172.30.1.205","172.30.1.104","TCP","54","38198 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36913","17.411498","172.30.1.205","172.30.1.104","TCP","54","38202 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36914","17.411530","172.30.1.205","172.30.1.104","TCP","54","38206 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36915","17.411558","172.30.1.205","172.30.1.104","TCP","54","38210 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36916","17.411584","172.30.1.205","172.30.1.104","TCP","54","38214 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36917","17.411616","172.30.1.205","172.30.1.104","TCP","54","38218 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36918","17.411646","172.30.1.205","172.30.1.104","TCP","54","38222 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36919","17.411674","172.30.1.205","172.30.1.104","TCP","54","38226 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36920","17.411748","172.30.1.205","172.30.1.104","TCP","54","38182 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "36921","17.411870","172.30.1.104","172.30.1.205","TCP","54","49671 > 38186 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36922","17.411880","172.30.1.104","172.30.1.205","TCP","54","49671 > 38190 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36923","17.411884","172.30.1.104","172.30.1.205","TCP","54","49671 > 38194 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36924","17.411887","172.30.1.104","172.30.1.205","TCP","54","49671 > 38198 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36925","17.411890","172.30.1.104","172.30.1.205","TCP","54","49671 > 38202 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36926","17.412190","172.30.1.104","172.30.1.205","TCP","54","49671 > 38186 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36927","17.412198","172.30.1.205","172.30.1.104","TCP","54","38186 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36928","17.412205","172.30.1.104","172.30.1.205","TCP","54","49671 > 38206 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36929","17.412211","172.30.1.104","172.30.1.205","TCP","54","49671 > 38206 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36930","17.412217","172.30.1.205","172.30.1.104","TCP","54","38206 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36931","17.412219","172.30.1.104","172.30.1.205","TCP","54","49671 > 38202 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36932","17.412221","172.30.1.205","172.30.1.104","TCP","54","38202 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36933","17.412222","172.30.1.104","172.30.1.205","TCP","54","49671 > 38198 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36934","17.412224","172.30.1.205","172.30.1.104","TCP","54","38198 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36935","17.412225","172.30.1.104","172.30.1.205","TCP","54","49671 > 38190 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36936","17.412227","172.30.1.205","172.30.1.104","TCP","54","38190 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36937","17.412228","172.30.1.104","172.30.1.205","TCP","54","49671 > 38194 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36938","17.412230","172.30.1.205","172.30.1.104","TCP","54","38194 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36939","17.412231","172.30.1.104","172.30.1.205","TCP","54","49671 > 38210 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36940","17.412235","172.30.1.104","172.30.1.205","TCP","54","49671 > 38214 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36941","17.412237","172.30.1.104","172.30.1.205","TCP","54","49671 > 38218 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36942","17.412240","172.30.1.104","172.30.1.205","TCP","54","49671 > 38210 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36943","17.412242","172.30.1.205","172.30.1.104","TCP","54","38210 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36944","17.412243","172.30.1.104","172.30.1.205","TCP","54","49671 > 38222 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36945","17.412531","172.30.1.104","172.30.1.205","TCP","54","49671 > 38226 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36946","17.412537","172.30.1.104","172.30.1.205","TCP","54","49671 > 38226 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36947","17.412542","172.30.1.205","172.30.1.104","TCP","54","38226 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36948","17.412548","172.30.1.104","172.30.1.205","TCP","54","49671 > 38222 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36949","17.412550","172.30.1.205","172.30.1.104","TCP","54","38222 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36950","17.412552","172.30.1.104","172.30.1.205","TCP","54","49671 > 38214 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36951","17.412554","172.30.1.205","172.30.1.104","TCP","54","38214 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36952","17.412559","172.30.1.104","172.30.1.205","TCP","54","49671 > 38218 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36953","17.412561","172.30.1.205","172.30.1.104","TCP","54","38218 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36954","17.412562","172.30.1.104","172.30.1.205","TCP","54","49671 > 38182 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36955","17.412566","172.30.1.104","172.30.1.205","TCP","54","49671 > 38182 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "36956","17.412568","172.30.1.205","172.30.1.104","TCP","54","38182 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "36957","17.413341","172.30.1.205","172.30.1.104","TCP","54","45592 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36958","17.413453","172.30.1.205","172.30.1.104","TCP","74","38230 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920639 TSecr=0 WS=128" "36959","17.413595","172.30.1.104","172.30.1.205","TCP","54","135 > 45592 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36960","17.413603","172.30.1.104","172.30.1.205","TCP","54","135 > 45592 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36961","17.413608","172.30.1.205","172.30.1.104","TCP","54","45592 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36962","17.413714","172.30.1.104","172.30.1.205","TCP","66","49671 > 38230 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36963","17.413722","172.30.1.205","172.30.1.104","TCP","54","38230 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36964","17.414077","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36965","17.414368","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36966","17.414377","172.30.1.205","172.30.1.104","TCP","54","38230 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36967","17.416240","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36968","17.416668","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36969","17.416674","172.30.1.205","172.30.1.104","TCP","54","38230 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36970","17.418055","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36971","17.421126","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36972","17.421136","172.30.1.205","172.30.1.104","TCP","54","38230 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36973","17.422078","172.30.1.205","172.30.1.104","TCP","74","45596 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920648 TSecr=0 WS=128" "36974","17.422412","172.30.1.104","172.30.1.205","TCP","66","135 > 45596 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36975","17.422423","172.30.1.205","172.30.1.104","TCP","54","45596 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36976","17.422774","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "36977","17.423081","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36978","17.423090","172.30.1.205","172.30.1.104","TCP","54","45596 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36979","17.425297","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "36980","17.425745","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "36981","17.425752","172.30.1.205","172.30.1.104","TCP","54","45596 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "36982","17.427567","172.30.1.205","172.30.1.104","TCP","54","45596 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "36983","17.427682","172.30.1.205","172.30.1.104","TCP","74","38234 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920654 TSecr=0 WS=128" "36984","17.427854","172.30.1.104","172.30.1.205","TCP","54","135 > 45596 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36985","17.427875","172.30.1.104","172.30.1.205","TCP","54","135 > 45596 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "36986","17.427881","172.30.1.205","172.30.1.104","TCP","54","45596 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "36987","17.427973","172.30.1.104","172.30.1.205","TCP","66","49671 > 38234 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "36988","17.427982","172.30.1.205","172.30.1.104","TCP","54","38234 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "36989","17.428330","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "36990","17.428642","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "36991","17.428651","172.30.1.205","172.30.1.104","TCP","54","38234 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "36992","17.430556","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "36993","17.430933","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "36994","17.430939","172.30.1.205","172.30.1.104","TCP","54","38234 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "36995","17.432290","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "36996","17.435403","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "36997","17.435413","172.30.1.205","172.30.1.104","TCP","54","38234 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "36998","17.436363","172.30.1.205","172.30.1.104","TCP","74","45600 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920662 TSecr=0 WS=128" "36999","17.436727","172.30.1.104","172.30.1.205","TCP","66","135 > 45600 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37000","17.436739","172.30.1.205","172.30.1.104","TCP","54","45600 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37001","17.437121","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37002","17.437449","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37003","17.437459","172.30.1.205","172.30.1.104","TCP","54","45600 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37004","17.439659","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37005","17.440073","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37006","17.440080","172.30.1.205","172.30.1.104","TCP","54","45600 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37007","17.441924","172.30.1.205","172.30.1.104","TCP","54","45600 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37008","17.442035","172.30.1.205","172.30.1.104","TCP","74","38238 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920668 TSecr=0 WS=128" "37009","17.442213","172.30.1.104","172.30.1.205","TCP","54","135 > 45600 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37010","17.442228","172.30.1.104","172.30.1.205","TCP","54","135 > 45600 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37011","17.442234","172.30.1.205","172.30.1.104","TCP","54","45600 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37012","17.442321","172.30.1.104","172.30.1.205","TCP","66","49671 > 38238 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37013","17.442329","172.30.1.205","172.30.1.104","TCP","54","38238 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37014","17.442677","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37015","17.442954","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37016","17.442963","172.30.1.205","172.30.1.104","TCP","54","38238 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37017","17.444879","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37018","17.445277","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37019","17.445283","172.30.1.205","172.30.1.104","TCP","54","38238 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37020","17.446644","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37021","17.449771","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37022","17.449782","172.30.1.205","172.30.1.104","TCP","54","38238 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37023","17.450732","172.30.1.205","172.30.1.104","TCP","74","45604 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920677 TSecr=0 WS=128" "37024","17.451064","172.30.1.104","172.30.1.205","TCP","66","135 > 45604 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37025","17.451074","172.30.1.205","172.30.1.104","TCP","54","45604 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37026","17.451430","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37027","17.451705","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37028","17.451714","172.30.1.205","172.30.1.104","TCP","54","45604 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37029","17.453931","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37030","17.454414","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37031","17.454420","172.30.1.205","172.30.1.104","TCP","54","45604 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37032","17.456241","172.30.1.205","172.30.1.104","TCP","54","45604 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37033","17.456352","172.30.1.205","172.30.1.104","TCP","74","38242 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920682 TSecr=0 WS=128" "37034","17.456528","172.30.1.104","172.30.1.205","TCP","54","135 > 45604 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37035","17.456542","172.30.1.104","172.30.1.205","TCP","54","135 > 45604 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37036","17.456547","172.30.1.205","172.30.1.104","TCP","54","45604 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37037","17.456652","172.30.1.104","172.30.1.205","TCP","66","49671 > 38242 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37038","17.456663","172.30.1.205","172.30.1.104","TCP","54","38242 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37039","17.457326","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37040","17.457620","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37041","17.457630","172.30.1.205","172.30.1.104","TCP","54","38242 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37042","17.459523","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37043","17.459910","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37044","17.459917","172.30.1.205","172.30.1.104","TCP","54","38242 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37045","17.461312","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37046","17.464410","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37047","17.464422","172.30.1.205","172.30.1.104","TCP","54","38242 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37048","17.465409","172.30.1.205","172.30.1.104","TCP","74","45608 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920691 TSecr=0 WS=128" "37049","17.465743","172.30.1.104","172.30.1.205","TCP","66","135 > 45608 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37050","17.465755","172.30.1.205","172.30.1.104","TCP","54","45608 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37051","17.466106","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37052","17.466396","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37053","17.466405","172.30.1.205","172.30.1.104","TCP","54","45608 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37054","17.468602","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37055","17.469048","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37056","17.469055","172.30.1.205","172.30.1.104","TCP","54","45608 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37057","17.470863","172.30.1.205","172.30.1.104","TCP","54","45608 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37058","17.470976","172.30.1.205","172.30.1.104","TCP","74","38246 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920697 TSecr=0 WS=128" "37059","17.471169","172.30.1.104","172.30.1.205","TCP","54","135 > 45608 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37060","17.471190","172.30.1.104","172.30.1.205","TCP","54","135 > 45608 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37061","17.471195","172.30.1.205","172.30.1.104","TCP","54","45608 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37062","17.471274","172.30.1.104","172.30.1.205","TCP","66","49671 > 38246 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37063","17.471282","172.30.1.205","172.30.1.104","TCP","54","38246 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37064","17.471653","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37065","17.471951","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37066","17.471960","172.30.1.205","172.30.1.104","TCP","54","38246 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37067","17.473873","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37068","17.474233","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37069","17.474240","172.30.1.205","172.30.1.104","TCP","54","38246 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37070","17.475598","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37071","17.478639","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37072","17.478649","172.30.1.205","172.30.1.104","TCP","54","38246 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37073","17.479592","172.30.1.205","172.30.1.104","TCP","74","45612 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920706 TSecr=0 WS=128" "37074","17.479921","172.30.1.104","172.30.1.205","TCP","66","135 > 45612 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37075","17.479931","172.30.1.205","172.30.1.104","TCP","54","45612 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37076","17.480279","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37077","17.480618","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37078","17.480627","172.30.1.205","172.30.1.104","TCP","54","45612 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37079","17.482846","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37080","17.483274","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37081","17.483281","172.30.1.205","172.30.1.104","TCP","54","45612 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37082","17.485118","172.30.1.205","172.30.1.104","TCP","54","45612 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37083","17.485229","172.30.1.205","172.30.1.104","TCP","74","38250 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920711 TSecr=0 WS=128" "37084","17.485426","172.30.1.104","172.30.1.205","TCP","54","135 > 45612 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37085","17.485459","172.30.1.104","172.30.1.205","TCP","54","135 > 45612 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37086","17.485465","172.30.1.205","172.30.1.104","TCP","54","45612 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37087","17.485549","172.30.1.104","172.30.1.205","TCP","66","49671 > 38250 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37088","17.485557","172.30.1.205","172.30.1.104","TCP","54","38250 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37089","17.485906","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37090","17.486237","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37091","17.486245","172.30.1.205","172.30.1.104","TCP","54","38250 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37092","17.488131","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37093","17.488519","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37094","17.488526","172.30.1.205","172.30.1.104","TCP","54","38250 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37095","17.489901","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37096","17.492891","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37097","17.492901","172.30.1.205","172.30.1.104","TCP","54","38250 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37098","17.493845","172.30.1.205","172.30.1.104","TCP","74","45616 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920720 TSecr=0 WS=128" "37099","17.494174","172.30.1.104","172.30.1.205","TCP","66","135 > 45616 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37100","17.494185","172.30.1.205","172.30.1.104","TCP","54","45616 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37101","17.494535","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37102","17.494844","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37103","17.494855","172.30.1.205","172.30.1.104","TCP","54","45616 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37104","17.497096","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37105","17.497512","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37106","17.497519","172.30.1.205","172.30.1.104","TCP","54","45616 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37107","17.499337","172.30.1.205","172.30.1.104","TCP","54","45616 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37108","17.499464","172.30.1.205","172.30.1.104","TCP","74","38254 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920725 TSecr=0 WS=128" "37109","17.499627","172.30.1.104","172.30.1.205","TCP","54","135 > 45616 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37110","17.499656","172.30.1.104","172.30.1.205","TCP","54","135 > 45616 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37111","17.499662","172.30.1.205","172.30.1.104","TCP","54","45616 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37112","17.499774","172.30.1.104","172.30.1.205","TCP","66","49671 > 38254 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37113","17.499782","172.30.1.205","172.30.1.104","TCP","54","38254 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37114","17.500128","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37115","17.500432","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37116","17.500447","172.30.1.205","172.30.1.104","TCP","54","38254 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37117","17.502454","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37118","17.502863","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37119","17.502870","172.30.1.205","172.30.1.104","TCP","54","38254 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37120","17.504242","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37121","17.507261","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37122","17.507272","172.30.1.205","172.30.1.104","TCP","54","38254 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37123","17.508252","172.30.1.205","172.30.1.104","TCP","74","45620 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920734 TSecr=0 WS=128" "37124","17.508571","172.30.1.104","172.30.1.205","TCP","66","135 > 45620 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37125","17.508587","172.30.1.205","172.30.1.104","TCP","54","45620 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37126","17.508992","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37127","17.509334","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37128","17.509343","172.30.1.205","172.30.1.104","TCP","54","45620 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37129","17.511566","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37130","17.512101","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37131","17.512107","172.30.1.205","172.30.1.104","TCP","54","45620 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37132","17.513940","172.30.1.205","172.30.1.104","TCP","54","45620 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37133","17.514055","172.30.1.205","172.30.1.104","TCP","74","38258 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920740 TSecr=0 WS=128" "37134","17.514228","172.30.1.104","172.30.1.205","TCP","54","135 > 45620 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37135","17.514256","172.30.1.104","172.30.1.205","TCP","54","135 > 45620 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37136","17.514262","172.30.1.205","172.30.1.104","TCP","54","45620 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37137","17.514367","172.30.1.104","172.30.1.205","TCP","66","49671 > 38258 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37138","17.514375","172.30.1.205","172.30.1.104","TCP","54","38258 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37139","17.514723","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37140","17.515086","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37141","17.515095","172.30.1.205","172.30.1.104","TCP","54","38258 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37142","17.517022","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37143","17.517443","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37144","17.517450","172.30.1.205","172.30.1.104","TCP","54","38258 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37145","17.518809","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37146","17.521860","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37147","17.521872","172.30.1.205","172.30.1.104","TCP","54","38258 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37148","17.522880","172.30.1.205","172.30.1.104","TCP","74","45624 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920749 TSecr=0 WS=128" "37149","17.523217","172.30.1.104","172.30.1.205","TCP","66","135 > 45624 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37150","17.523229","172.30.1.205","172.30.1.104","TCP","54","45624 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37151","17.523581","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37152","17.523916","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37153","17.523925","172.30.1.205","172.30.1.104","TCP","54","45624 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37154","17.526171","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37155","17.526628","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37156","17.526635","172.30.1.205","172.30.1.104","TCP","54","45624 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37157","17.528465","172.30.1.205","172.30.1.104","TCP","54","45624 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37158","17.528592","172.30.1.205","172.30.1.104","TCP","74","38262 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920755 TSecr=0 WS=128" "37159","17.528770","172.30.1.104","172.30.1.205","TCP","54","135 > 45624 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37160","17.528800","172.30.1.104","172.30.1.205","TCP","54","135 > 45624 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37161","17.528808","172.30.1.205","172.30.1.104","TCP","54","45624 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37162","17.528908","172.30.1.104","172.30.1.205","TCP","66","49671 > 38262 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37163","17.528917","172.30.1.205","172.30.1.104","TCP","54","38262 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37164","17.529270","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37165","17.529595","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37166","17.529603","172.30.1.205","172.30.1.104","TCP","54","38262 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37167","17.531463","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37168","17.531868","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37169","17.531874","172.30.1.205","172.30.1.104","TCP","54","38262 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37170","17.533270","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37171","17.536280","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37172","17.536290","172.30.1.205","172.30.1.104","TCP","54","38262 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37173","17.537273","172.30.1.205","172.30.1.104","TCP","74","45628 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920763 TSecr=0 WS=128" "37174","17.537634","172.30.1.104","172.30.1.205","TCP","66","135 > 45628 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37175","17.537645","172.30.1.205","172.30.1.104","TCP","54","45628 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37176","17.537998","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37177","17.538335","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37178","17.538343","172.30.1.205","172.30.1.104","TCP","54","45628 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37179","17.540525","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37180","17.540979","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37181","17.540986","172.30.1.205","172.30.1.104","TCP","54","45628 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37182","17.542795","172.30.1.205","172.30.1.104","TCP","54","45628 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37183","17.542908","172.30.1.205","172.30.1.104","TCP","74","38266 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920769 TSecr=0 WS=128" "37184","17.543115","172.30.1.104","172.30.1.205","TCP","54","135 > 45628 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37185","17.543236","172.30.1.104","172.30.1.205","TCP","66","49671 > 38266 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37186","17.543245","172.30.1.205","172.30.1.104","TCP","54","38266 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37187","17.543347","172.30.1.104","172.30.1.205","TCP","54","135 > 45628 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37188","17.543354","172.30.1.205","172.30.1.104","TCP","54","45628 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37189","17.543638","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37190","17.543978","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37191","17.543986","172.30.1.205","172.30.1.104","TCP","54","38266 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37192","17.545925","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37193","17.547352","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37194","17.547359","172.30.1.205","172.30.1.104","TCP","54","38266 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37195","17.548700","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37196","17.551751","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37197","17.551762","172.30.1.205","172.30.1.104","TCP","54","38266 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37198","17.552718","172.30.1.205","172.30.1.104","TCP","74","45632 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920779 TSecr=0 WS=128" "37199","17.553114","172.30.1.104","172.30.1.205","TCP","66","135 > 45632 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37200","17.553125","172.30.1.205","172.30.1.104","TCP","54","45632 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37201","17.553486","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37202","17.553872","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37203","17.553891","172.30.1.205","172.30.1.104","TCP","54","45632 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37204","17.556272","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37205","17.556713","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37206","17.556719","172.30.1.205","172.30.1.104","TCP","54","45632 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37207","17.558527","172.30.1.205","172.30.1.104","TCP","54","45632 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37208","17.558639","172.30.1.205","172.30.1.104","TCP","74","38270 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920785 TSecr=0 WS=128" "37209","17.558861","172.30.1.104","172.30.1.205","TCP","54","135 > 45632 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37210","17.558902","172.30.1.104","172.30.1.205","TCP","54","135 > 45632 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37211","17.558908","172.30.1.205","172.30.1.104","TCP","54","45632 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37212","17.559010","172.30.1.104","172.30.1.205","TCP","66","49671 > 38270 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37213","17.559018","172.30.1.205","172.30.1.104","TCP","54","38270 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37214","17.559370","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37215","17.559687","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37216","17.559696","172.30.1.205","172.30.1.104","TCP","54","38270 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37217","17.561600","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37218","17.562030","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37219","17.562037","172.30.1.205","172.30.1.104","TCP","54","38270 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37220","17.563403","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37221","17.566478","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37222","17.566487","172.30.1.205","172.30.1.104","TCP","54","38270 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37223","17.567432","172.30.1.205","172.30.1.104","TCP","74","45636 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920793 TSecr=0 WS=128" "37224","17.567789","172.30.1.104","172.30.1.205","TCP","66","135 > 45636 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37225","17.567800","172.30.1.205","172.30.1.104","TCP","54","45636 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37226","17.568151","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37227","17.568514","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37228","17.568524","172.30.1.205","172.30.1.104","TCP","54","45636 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37229","17.570730","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37230","17.571174","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37231","17.571181","172.30.1.205","172.30.1.104","TCP","54","45636 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37232","17.573016","172.30.1.205","172.30.1.104","TCP","54","45636 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37233","17.573126","172.30.1.205","172.30.1.104","TCP","74","38274 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920799 TSecr=0 WS=128" "37234","17.573312","172.30.1.104","172.30.1.205","TCP","54","135 > 45636 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37235","17.573341","172.30.1.104","172.30.1.205","TCP","54","135 > 45636 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37236","17.573346","172.30.1.205","172.30.1.104","TCP","54","45636 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37237","17.573467","172.30.1.104","172.30.1.205","TCP","66","49671 > 38274 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37238","17.573475","172.30.1.205","172.30.1.104","TCP","54","38274 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37239","17.573822","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37240","17.574167","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37241","17.574176","172.30.1.205","172.30.1.104","TCP","54","38274 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37242","17.576054","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37243","17.576473","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37244","17.576479","172.30.1.205","172.30.1.104","TCP","54","38274 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37245","17.577853","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37246","17.581909","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37247","17.581919","172.30.1.205","172.30.1.104","TCP","54","38274 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37248","17.582865","172.30.1.205","172.30.1.104","TCP","74","45640 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920809 TSecr=0 WS=128" "37249","17.583257","172.30.1.104","172.30.1.205","TCP","66","135 > 45640 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37250","17.583268","172.30.1.205","172.30.1.104","TCP","54","45640 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37251","17.583632","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37252","17.583961","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37253","17.583970","172.30.1.205","172.30.1.104","TCP","54","45640 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37254","17.586181","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37255","17.586648","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37256","17.586655","172.30.1.205","172.30.1.104","TCP","54","45640 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37257","17.587503","172.30.1.205","172.30.1.104","TCP","54","38234 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37258","17.587552","172.30.1.205","172.30.1.104","TCP","54","38238 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37259","17.587587","172.30.1.205","172.30.1.104","TCP","54","38242 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37260","17.587617","172.30.1.205","172.30.1.104","TCP","54","38246 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37261","17.587640","172.30.1.205","172.30.1.104","TCP","54","38250 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37262","17.587668","172.30.1.205","172.30.1.104","TCP","54","38254 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37263","17.587696","172.30.1.205","172.30.1.104","TCP","54","38258 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37264","17.587719","172.30.1.205","172.30.1.104","TCP","54","38262 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37265","17.587746","172.30.1.205","172.30.1.104","TCP","54","38266 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37266","17.587773","172.30.1.205","172.30.1.104","TCP","54","38270 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37267","17.587800","172.30.1.205","172.30.1.104","TCP","54","38274 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37268","17.587871","172.30.1.205","172.30.1.104","TCP","54","38230 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37269","17.587980","172.30.1.104","172.30.1.205","TCP","54","49671 > 38234 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37270","17.588015","172.30.1.104","172.30.1.205","TCP","54","49671 > 38238 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37271","17.588050","172.30.1.104","172.30.1.205","TCP","54","49671 > 38234 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37272","17.588057","172.30.1.205","172.30.1.104","TCP","54","38234 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37273","17.588078","172.30.1.104","172.30.1.205","TCP","54","49671 > 38242 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37274","17.588104","172.30.1.104","172.30.1.205","TCP","54","49671 > 38246 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37275","17.588132","172.30.1.104","172.30.1.205","TCP","54","49671 > 38246 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37276","17.588137","172.30.1.205","172.30.1.104","TCP","54","38246 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37277","17.588160","172.30.1.104","172.30.1.205","TCP","54","49671 > 38250 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37278","17.588189","172.30.1.104","172.30.1.205","TCP","54","49671 > 38250 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37279","17.588193","172.30.1.205","172.30.1.104","TCP","54","38250 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37280","17.588216","172.30.1.104","172.30.1.205","TCP","54","49671 > 38238 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37281","17.588219","172.30.1.205","172.30.1.104","TCP","54","38238 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37282","17.588244","172.30.1.104","172.30.1.205","TCP","54","49671 > 38242 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37283","17.588249","172.30.1.205","172.30.1.104","TCP","54","38242 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37284","17.588273","172.30.1.104","172.30.1.205","TCP","54","49671 > 38254 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37285","17.588301","172.30.1.104","172.30.1.205","TCP","54","49671 > 38258 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37286","17.588330","172.30.1.104","172.30.1.205","TCP","54","49671 > 38262 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37287","17.588358","172.30.1.104","172.30.1.205","TCP","54","49671 > 38266 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37288","17.588386","172.30.1.104","172.30.1.205","TCP","54","49671 > 38254 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37289","17.588391","172.30.1.205","172.30.1.104","TCP","54","38254 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37290","17.588414","172.30.1.104","172.30.1.205","TCP","54","49671 > 38270 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37291","17.588443","172.30.1.104","172.30.1.205","TCP","54","49671 > 38274 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37292","17.588478","172.30.1.104","172.30.1.205","TCP","54","49671 > 38274 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37293","17.588482","172.30.1.205","172.30.1.104","TCP","54","38274 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37294","17.588511","172.30.1.104","172.30.1.205","TCP","54","49671 > 38270 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37295","17.588513","172.30.1.205","172.30.1.104","TCP","54","38270 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37296","17.588541","172.30.1.104","172.30.1.205","TCP","54","49671 > 38266 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37297","17.588544","172.30.1.205","172.30.1.104","TCP","54","38266 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37298","17.588571","172.30.1.104","172.30.1.205","TCP","54","49671 > 38258 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37299","17.588574","172.30.1.205","172.30.1.104","TCP","54","38258 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37300","17.588601","172.30.1.104","172.30.1.205","TCP","54","49671 > 38262 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37301","17.588604","172.30.1.205","172.30.1.104","TCP","54","38262 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37302","17.589004","172.30.1.104","172.30.1.205","TCP","54","49671 > 38230 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37303","17.589039","172.30.1.104","172.30.1.205","TCP","54","49671 > 38230 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37304","17.589045","172.30.1.205","172.30.1.104","TCP","54","38230 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37305","17.589553","172.30.1.205","172.30.1.104","TCP","54","45640 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37306","17.589665","172.30.1.205","172.30.1.104","TCP","74","38278 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920816 TSecr=0 WS=128" "37307","17.589834","172.30.1.104","172.30.1.205","TCP","54","135 > 45640 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37308","17.589862","172.30.1.104","172.30.1.205","TCP","54","135 > 45640 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37309","17.589867","172.30.1.205","172.30.1.104","TCP","54","45640 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37310","17.589961","172.30.1.104","172.30.1.205","TCP","66","49671 > 38278 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37311","17.589969","172.30.1.205","172.30.1.104","TCP","54","38278 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37312","17.590329","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37313","17.590663","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37314","17.590672","172.30.1.205","172.30.1.104","TCP","54","38278 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37315","17.592551","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37316","17.594256","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37317","17.594263","172.30.1.205","172.30.1.104","TCP","54","38278 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37318","17.595698","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37319","17.598840","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37320","17.598850","172.30.1.205","172.30.1.104","TCP","54","38278 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37321","17.599793","172.30.1.205","172.30.1.104","TCP","74","45644 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920826 TSecr=0 WS=128" "37322","17.600134","172.30.1.104","172.30.1.205","TCP","66","135 > 45644 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37323","17.600145","172.30.1.205","172.30.1.104","TCP","54","45644 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37324","17.600498","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37325","17.600846","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37326","17.600855","172.30.1.205","172.30.1.104","TCP","54","45644 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37327","17.603030","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37328","17.603463","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37329","17.603470","172.30.1.205","172.30.1.104","TCP","54","45644 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37330","17.605304","172.30.1.205","172.30.1.104","TCP","54","45644 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37331","17.605414","172.30.1.205","172.30.1.104","TCP","74","38282 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920831 TSecr=0 WS=128" "37332","17.605609","172.30.1.104","172.30.1.205","TCP","54","135 > 45644 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37333","17.605695","172.30.1.104","172.30.1.205","TCP","54","135 > 45644 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37334","17.605700","172.30.1.205","172.30.1.104","TCP","54","45644 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37335","17.605812","172.30.1.104","172.30.1.205","TCP","66","49671 > 38282 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37336","17.605820","172.30.1.205","172.30.1.104","TCP","54","38282 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37337","17.606164","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37338","17.606481","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37339","17.606490","172.30.1.205","172.30.1.104","TCP","54","38282 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37340","17.608364","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37341","17.608767","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37342","17.608783","172.30.1.205","172.30.1.104","TCP","54","38282 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37343","17.610135","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37344","17.613089","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37345","17.613099","172.30.1.205","172.30.1.104","TCP","54","38282 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37346","17.614039","172.30.1.205","172.30.1.104","TCP","74","45648 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920840 TSecr=0 WS=128" "37347","17.614354","172.30.1.104","172.30.1.205","TCP","66","135 > 45648 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37348","17.614365","172.30.1.205","172.30.1.104","TCP","54","45648 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37349","17.614714","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37350","17.615051","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37351","17.615060","172.30.1.205","172.30.1.104","TCP","54","45648 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37352","17.617284","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37353","17.617693","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37354","17.617700","172.30.1.205","172.30.1.104","TCP","54","45648 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37355","17.619506","172.30.1.205","172.30.1.104","TCP","54","45648 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37356","17.619619","172.30.1.205","172.30.1.104","TCP","74","38286 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920846 TSecr=0 WS=128" "37357","17.619788","172.30.1.104","172.30.1.205","TCP","54","135 > 45648 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37358","17.619834","172.30.1.104","172.30.1.205","TCP","54","135 > 45648 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37359","17.619839","172.30.1.205","172.30.1.104","TCP","54","45648 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37360","17.619941","172.30.1.104","172.30.1.205","TCP","66","49671 > 38286 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37361","17.619949","172.30.1.205","172.30.1.104","TCP","54","38286 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37362","17.620296","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37363","17.620608","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37364","17.620615","172.30.1.205","172.30.1.104","TCP","54","38286 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37365","17.622507","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37366","17.622966","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37367","17.622972","172.30.1.205","172.30.1.104","TCP","54","38286 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37368","17.624312","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37369","17.627264","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37370","17.627275","172.30.1.205","172.30.1.104","TCP","54","38286 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37371","17.628225","172.30.1.205","172.30.1.104","TCP","74","45652 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920854 TSecr=0 WS=128" "37372","17.628578","172.30.1.104","172.30.1.205","TCP","66","135 > 45652 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37373","17.628588","172.30.1.205","172.30.1.104","TCP","54","45652 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37374","17.628976","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37375","17.629325","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37376","17.629334","172.30.1.205","172.30.1.104","TCP","54","45652 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37377","17.631538","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37378","17.631974","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37379","17.631981","172.30.1.205","172.30.1.104","TCP","54","45652 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37380","17.633827","172.30.1.205","172.30.1.104","TCP","54","45652 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37381","17.633939","172.30.1.205","172.30.1.104","TCP","74","38290 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920860 TSecr=0 WS=128" "37382","17.634166","172.30.1.104","172.30.1.205","TCP","54","135 > 45652 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37383","17.634196","172.30.1.104","172.30.1.205","TCP","54","135 > 45652 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37384","17.634202","172.30.1.205","172.30.1.104","TCP","54","45652 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37385","17.634227","172.30.1.104","172.30.1.205","TCP","66","49671 > 38290 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37386","17.634236","172.30.1.205","172.30.1.104","TCP","54","38290 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37387","17.634599","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37388","17.634957","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37389","17.634966","172.30.1.205","172.30.1.104","TCP","54","38290 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37390","17.636866","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37391","17.637271","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37392","17.637277","172.30.1.205","172.30.1.104","TCP","54","38290 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37393","17.638633","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37394","17.641712","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37395","17.641728","172.30.1.205","172.30.1.104","TCP","54","38290 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37396","17.642694","172.30.1.205","172.30.1.104","TCP","74","45656 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920869 TSecr=0 WS=128" "37397","17.643031","172.30.1.104","172.30.1.205","TCP","66","135 > 45656 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37398","17.643043","172.30.1.205","172.30.1.104","TCP","54","45656 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37399","17.643393","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37400","17.643707","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37401","17.643716","172.30.1.205","172.30.1.104","TCP","54","45656 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37402","17.645950","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37403","17.646414","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37404","17.646421","172.30.1.205","172.30.1.104","TCP","54","45656 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37405","17.648235","172.30.1.205","172.30.1.104","TCP","54","45656 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37406","17.648356","172.30.1.205","172.30.1.104","TCP","74","38294 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920874 TSecr=0 WS=128" "37407","17.648549","172.30.1.104","172.30.1.205","TCP","54","135 > 45656 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37408","17.648576","172.30.1.104","172.30.1.205","TCP","54","135 > 45656 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37409","17.648581","172.30.1.205","172.30.1.104","TCP","54","45656 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37410","17.648689","172.30.1.104","172.30.1.205","TCP","66","49671 > 38294 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37411","17.648704","172.30.1.205","172.30.1.104","TCP","54","38294 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37412","17.649083","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37413","17.649405","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37414","17.649414","172.30.1.205","172.30.1.104","TCP","54","38294 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37415","17.651299","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37416","17.651744","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37417","17.651751","172.30.1.205","172.30.1.104","TCP","54","38294 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37418","17.653143","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37419","17.656258","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37420","17.656268","172.30.1.205","172.30.1.104","TCP","54","38294 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37421","17.657234","172.30.1.205","172.30.1.104","TCP","74","45660 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920883 TSecr=0 WS=128" "37422","17.657585","172.30.1.104","172.30.1.205","TCP","66","135 > 45660 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37423","17.657596","172.30.1.205","172.30.1.104","TCP","54","45660 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37424","17.657950","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37425","17.658283","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37426","17.658292","172.30.1.205","172.30.1.104","TCP","54","45660 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37427","17.660474","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37428","17.660911","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37429","17.660917","172.30.1.205","172.30.1.104","TCP","54","45660 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37430","17.662747","172.30.1.205","172.30.1.104","TCP","54","45660 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37431","17.662860","172.30.1.205","172.30.1.104","TCP","74","38298 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920889 TSecr=0 WS=128" "37432","17.663063","172.30.1.104","172.30.1.205","TCP","54","135 > 45660 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37433","17.663090","172.30.1.104","172.30.1.205","TCP","54","135 > 45660 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37434","17.663095","172.30.1.205","172.30.1.104","TCP","54","45660 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37435","17.663184","172.30.1.104","172.30.1.205","TCP","66","49671 > 38298 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37436","17.663192","172.30.1.205","172.30.1.104","TCP","54","38298 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37437","17.663540","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37438","17.663857","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37439","17.663864","172.30.1.205","172.30.1.104","TCP","54","38298 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37440","17.665765","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37441","17.666904","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37442","17.666910","172.30.1.205","172.30.1.104","TCP","54","38298 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37443","17.668270","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37444","17.671317","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37445","17.671326","172.30.1.205","172.30.1.104","TCP","54","38298 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37446","17.672275","172.30.1.205","172.30.1.104","TCP","74","45664 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920898 TSecr=0 WS=128" "37447","17.672639","172.30.1.104","172.30.1.205","TCP","66","135 > 45664 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37448","17.672650","172.30.1.205","172.30.1.104","TCP","54","45664 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37449","17.673036","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37450","17.675260","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37451","17.675269","172.30.1.205","172.30.1.104","TCP","54","45664 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37452","17.677502","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37453","17.678325","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37454","17.678332","172.30.1.205","172.30.1.104","TCP","54","45664 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37455","17.680164","172.30.1.205","172.30.1.104","TCP","54","45664 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37456","17.680275","172.30.1.205","172.30.1.104","TCP","74","38302 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920906 TSecr=0 WS=128" "37457","17.680470","172.30.1.104","172.30.1.205","TCP","54","135 > 45664 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37458","17.680481","172.30.1.104","172.30.1.205","TCP","54","135 > 45664 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37459","17.680487","172.30.1.205","172.30.1.104","TCP","54","45664 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37460","17.680585","172.30.1.104","172.30.1.205","TCP","66","49671 > 38302 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37461","17.680594","172.30.1.205","172.30.1.104","TCP","54","38302 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37462","17.680973","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37463","17.681303","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37464","17.681312","172.30.1.205","172.30.1.104","TCP","54","38302 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37465","17.683180","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37466","17.683615","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37467","17.683622","172.30.1.205","172.30.1.104","TCP","54","38302 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37468","17.685017","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37469","17.688198","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37470","17.688208","172.30.1.205","172.30.1.104","TCP","54","38302 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37471","17.689177","172.30.1.205","172.30.1.104","TCP","74","45668 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920915 TSecr=0 WS=128" "37472","17.689492","172.30.1.104","172.30.1.205","TCP","66","135 > 45668 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37473","17.689503","172.30.1.205","172.30.1.104","TCP","54","45668 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37474","17.689859","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37475","17.690183","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37476","17.690192","172.30.1.205","172.30.1.104","TCP","54","45668 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37477","17.692384","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37478","17.692807","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37479","17.692814","172.30.1.205","172.30.1.104","TCP","54","45668 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37480","17.694636","172.30.1.205","172.30.1.104","TCP","54","45668 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37481","17.694749","172.30.1.205","172.30.1.104","TCP","74","38306 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920921 TSecr=0 WS=128" "37482","17.694965","172.30.1.104","172.30.1.205","TCP","54","135 > 45668 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37483","17.695019","172.30.1.104","172.30.1.205","TCP","54","135 > 45668 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37484","17.695024","172.30.1.205","172.30.1.104","TCP","54","45668 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37485","17.695048","172.30.1.104","172.30.1.205","TCP","66","49671 > 38306 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37486","17.695057","172.30.1.205","172.30.1.104","TCP","54","38306 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37487","17.695405","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37488","17.695730","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37489","17.695739","172.30.1.205","172.30.1.104","TCP","54","38306 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37490","17.697640","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37491","17.699281","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37492","17.699287","172.30.1.205","172.30.1.104","TCP","54","38306 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37493","17.700648","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37494","17.703819","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37495","17.703829","172.30.1.205","172.30.1.104","TCP","54","38306 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37496","17.704791","172.30.1.205","172.30.1.104","TCP","74","45672 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920931 TSecr=0 WS=128" "37497","17.705169","172.30.1.104","172.30.1.205","TCP","66","135 > 45672 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37498","17.705181","172.30.1.205","172.30.1.104","TCP","54","45672 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37499","17.705542","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37500","17.705864","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37501","17.705873","172.30.1.205","172.30.1.104","TCP","54","45672 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37502","17.708058","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37503","17.708491","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37504","17.708498","172.30.1.205","172.30.1.104","TCP","54","45672 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37505","17.710331","172.30.1.205","172.30.1.104","TCP","54","45672 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37506","17.710443","172.30.1.205","172.30.1.104","TCP","74","38310 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920936 TSecr=0 WS=128" "37507","17.710633","172.30.1.104","172.30.1.205","TCP","54","135 > 45672 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37508","17.710656","172.30.1.104","172.30.1.205","TCP","54","135 > 45672 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37509","17.710661","172.30.1.205","172.30.1.104","TCP","54","45672 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37510","17.710848","172.30.1.104","172.30.1.205","TCP","66","49671 > 38310 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37511","17.710859","172.30.1.205","172.30.1.104","TCP","54","38310 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37512","17.711234","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37513","17.711614","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37514","17.711623","172.30.1.205","172.30.1.104","TCP","54","38310 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37515","17.713526","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37516","17.713940","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37517","17.713947","172.30.1.205","172.30.1.104","TCP","54","38310 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37518","17.715301","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37519","17.719736","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37520","17.719749","172.30.1.205","172.30.1.104","TCP","54","38310 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37521","17.720752","172.30.1.205","172.30.1.104","TCP","74","45676 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920947 TSecr=0 WS=128" "37522","17.721101","172.30.1.104","172.30.1.205","TCP","66","135 > 45676 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37523","17.721112","172.30.1.205","172.30.1.104","TCP","54","45676 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37524","17.721479","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37525","17.721825","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37526","17.721834","172.30.1.205","172.30.1.104","TCP","54","45676 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37527","17.724027","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37528","17.724504","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37529","17.724515","172.30.1.205","172.30.1.104","TCP","54","45676 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37530","17.726346","172.30.1.205","172.30.1.104","TCP","54","45676 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37531","17.726457","172.30.1.205","172.30.1.104","TCP","74","38314 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920952 TSecr=0 WS=128" "37532","17.726665","172.30.1.104","172.30.1.205","TCP","54","135 > 45676 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37533","17.726695","172.30.1.104","172.30.1.205","TCP","54","135 > 45676 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37534","17.726701","172.30.1.205","172.30.1.104","TCP","54","45676 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37535","17.726803","172.30.1.104","172.30.1.205","TCP","66","49671 > 38314 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37536","17.726812","172.30.1.205","172.30.1.104","TCP","54","38314 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37537","17.727158","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37538","17.727546","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37539","17.727555","172.30.1.205","172.30.1.104","TCP","54","38314 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37540","17.729465","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37541","17.729956","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37542","17.729966","172.30.1.205","172.30.1.104","TCP","54","38314 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37543","17.731402","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37544","17.734569","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37545","17.734582","172.30.1.205","172.30.1.104","TCP","54","38314 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37546","17.735567","172.30.1.205","172.30.1.104","TCP","74","45680 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920961 TSecr=0 WS=128" "37547","17.735925","172.30.1.104","172.30.1.205","TCP","66","135 > 45680 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37548","17.735936","172.30.1.205","172.30.1.104","TCP","54","45680 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37549","17.736292","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37550","17.736626","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37551","17.736635","172.30.1.205","172.30.1.104","TCP","54","45680 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37552","17.738886","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37553","17.739372","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37554","17.739379","172.30.1.205","172.30.1.104","TCP","54","45680 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37555","17.741215","172.30.1.205","172.30.1.104","TCP","54","45680 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37556","17.741327","172.30.1.205","172.30.1.104","TCP","74","38318 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920967 TSecr=0 WS=128" "37557","17.741522","172.30.1.104","172.30.1.205","TCP","54","135 > 45680 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37558","17.741550","172.30.1.104","172.30.1.205","TCP","54","135 > 45680 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37559","17.741556","172.30.1.205","172.30.1.104","TCP","54","45680 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37560","17.741653","172.30.1.104","172.30.1.205","TCP","66","49671 > 38318 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37561","17.741662","172.30.1.205","172.30.1.104","TCP","54","38318 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37562","17.742010","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37563","17.742359","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37564","17.742368","172.30.1.205","172.30.1.104","TCP","54","38318 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37565","17.744243","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37566","17.744705","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37567","17.744714","172.30.1.205","172.30.1.104","TCP","54","38318 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37568","17.746169","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37569","17.749330","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37570","17.749342","172.30.1.205","172.30.1.104","TCP","54","38318 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37571","17.750343","172.30.1.205","172.30.1.104","TCP","74","45684 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920976 TSecr=0 WS=128" "37572","17.750692","172.30.1.104","172.30.1.205","TCP","66","135 > 45684 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37573","17.750703","172.30.1.205","172.30.1.104","TCP","54","45684 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37574","17.751057","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37575","17.751389","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37576","17.751399","172.30.1.205","172.30.1.104","TCP","54","45684 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37577","17.753642","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37578","17.754089","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37579","17.754096","172.30.1.205","172.30.1.104","TCP","54","45684 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37580","17.755938","172.30.1.205","172.30.1.104","TCP","54","45684 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37581","17.756053","172.30.1.205","172.30.1.104","TCP","74","38322 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920982 TSecr=0 WS=128" "37582","17.756266","172.30.1.104","172.30.1.205","TCP","54","135 > 45684 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37583","17.756300","172.30.1.104","172.30.1.205","TCP","54","135 > 45684 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37584","17.756306","172.30.1.205","172.30.1.104","TCP","54","45684 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37585","17.756357","172.30.1.104","172.30.1.205","TCP","66","49671 > 38322 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37586","17.756366","172.30.1.205","172.30.1.104","TCP","54","38322 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37587","17.756716","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37588","17.757016","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37589","17.757025","172.30.1.205","172.30.1.104","TCP","54","38322 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37590","17.758924","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37591","17.759315","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37592","17.759321","172.30.1.205","172.30.1.104","TCP","54","38322 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37593","17.760673","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37594","17.763904","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37595","17.763914","172.30.1.205","172.30.1.104","TCP","54","38322 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37596","17.764883","172.30.1.205","172.30.1.104","TCP","74","45688 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920991 TSecr=0 WS=128" "37597","17.765183","172.30.1.104","172.30.1.205","TCP","66","135 > 45688 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37598","17.765193","172.30.1.205","172.30.1.104","TCP","54","45688 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37599","17.765560","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37600","17.765855","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37601","17.765865","172.30.1.205","172.30.1.104","TCP","54","45688 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37602","17.768043","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37603","17.768491","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37604","17.768499","172.30.1.205","172.30.1.104","TCP","54","45688 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37605","17.769426","172.30.1.205","172.30.1.104","TCP","54","38282 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37606","17.769475","172.30.1.205","172.30.1.104","TCP","54","38286 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37607","17.769512","172.30.1.205","172.30.1.104","TCP","54","38290 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37608","17.769537","172.30.1.205","172.30.1.104","TCP","54","38294 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37609","17.769560","172.30.1.205","172.30.1.104","TCP","54","38298 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37610","17.769585","172.30.1.205","172.30.1.104","TCP","54","38302 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37611","17.769613","172.30.1.205","172.30.1.104","TCP","54","38306 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37612","17.769641","172.30.1.205","172.30.1.104","TCP","54","38310 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37613","17.769662","172.30.1.205","172.30.1.104","TCP","54","38314 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37614","17.769683","172.30.1.205","172.30.1.104","TCP","54","38318 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37615","17.769708","172.30.1.205","172.30.1.104","TCP","54","38322 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37616","17.769788","172.30.1.205","172.30.1.104","TCP","54","38278 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37617","17.769894","172.30.1.104","172.30.1.205","TCP","54","49671 > 38282 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37618","17.769908","172.30.1.104","172.30.1.205","TCP","54","49671 > 38282 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37619","17.769914","172.30.1.205","172.30.1.104","TCP","54","38282 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37620","17.769928","172.30.1.104","172.30.1.205","TCP","54","49671 > 38286 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37621","17.769932","172.30.1.104","172.30.1.205","TCP","54","49671 > 38286 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37622","17.769934","172.30.1.205","172.30.1.104","TCP","54","38286 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37623","17.770218","172.30.1.104","172.30.1.205","TCP","54","49671 > 38290 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37624","17.770226","172.30.1.104","172.30.1.205","TCP","54","49671 > 38294 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37625","17.770228","172.30.1.104","172.30.1.205","TCP","54","49671 > 38298 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37626","17.770231","172.30.1.104","172.30.1.205","TCP","54","49671 > 38290 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37627","17.770236","172.30.1.205","172.30.1.104","TCP","54","38290 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37628","17.770242","172.30.1.104","172.30.1.205","TCP","54","49671 > 38294 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37629","17.770244","172.30.1.205","172.30.1.104","TCP","54","38294 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37630","17.770245","172.30.1.104","172.30.1.205","TCP","54","49671 > 38298 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37631","17.770247","172.30.1.205","172.30.1.104","TCP","54","38298 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37632","17.770249","172.30.1.104","172.30.1.205","TCP","54","49671 > 38302 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37633","17.770252","172.30.1.104","172.30.1.205","TCP","54","49671 > 38306 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37634","17.770254","172.30.1.104","172.30.1.205","TCP","54","49671 > 38302 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37635","17.770259","172.30.1.205","172.30.1.104","TCP","54","38302 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37636","17.770264","172.30.1.104","172.30.1.205","TCP","54","49671 > 38310 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37637","17.770267","172.30.1.104","172.30.1.205","TCP","54","49671 > 38314 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37638","17.770437","172.30.1.104","172.30.1.205","TCP","54","49671 > 38314 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37639","17.770442","172.30.1.205","172.30.1.104","TCP","54","38314 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37640","17.770449","172.30.1.104","172.30.1.205","TCP","54","49671 > 38318 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37641","17.770453","172.30.1.104","172.30.1.205","TCP","54","49671 > 38318 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37642","17.770459","172.30.1.205","172.30.1.104","TCP","54","38318 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37643","17.770460","172.30.1.104","172.30.1.205","TCP","54","49671 > 38306 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37644","17.770462","172.30.1.205","172.30.1.104","TCP","54","38306 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37645","17.770463","172.30.1.104","172.30.1.205","TCP","54","49671 > 38310 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37646","17.770465","172.30.1.205","172.30.1.104","TCP","54","38310 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37647","17.770632","172.30.1.104","172.30.1.205","TCP","54","49671 > 38322 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37648","17.770637","172.30.1.104","172.30.1.205","TCP","54","49671 > 38278 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37649","17.770640","172.30.1.104","172.30.1.205","TCP","54","49671 > 38278 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37650","17.770643","172.30.1.205","172.30.1.104","TCP","54","38278 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37651","17.770649","172.30.1.104","172.30.1.205","TCP","54","49671 > 38322 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37652","17.770651","172.30.1.205","172.30.1.104","TCP","54","38322 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37653","17.771277","172.30.1.205","172.30.1.104","TCP","54","45688 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37654","17.771396","172.30.1.205","172.30.1.104","TCP","74","38326 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499920997 TSecr=0 WS=128" "37655","17.771525","172.30.1.104","172.30.1.205","TCP","54","135 > 45688 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37656","17.771533","172.30.1.104","172.30.1.205","TCP","54","135 > 45688 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37657","17.771538","172.30.1.205","172.30.1.104","TCP","54","45688 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37658","17.771664","172.30.1.104","172.30.1.205","TCP","66","49671 > 38326 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37659","17.771673","172.30.1.205","172.30.1.104","TCP","54","38326 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37660","17.772023","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37661","17.772311","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37662","17.772317","172.30.1.205","172.30.1.104","TCP","54","38326 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37663","17.774209","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37664","17.774600","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37665","17.774606","172.30.1.205","172.30.1.104","TCP","54","38326 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37666","17.775965","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37667","17.781009","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37668","17.781021","172.30.1.205","172.30.1.104","TCP","54","38326 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37669","17.782049","172.30.1.205","172.30.1.104","TCP","74","45692 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921008 TSecr=0 WS=128" "37670","17.782380","172.30.1.104","172.30.1.205","TCP","66","135 > 45692 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37671","17.782393","172.30.1.205","172.30.1.104","TCP","54","45692 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37672","17.782757","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37673","17.783098","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37674","17.783107","172.30.1.205","172.30.1.104","TCP","54","45692 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37675","17.785331","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37676","17.785741","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37677","17.785747","172.30.1.205","172.30.1.104","TCP","54","45692 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37678","17.787563","172.30.1.205","172.30.1.104","TCP","54","45692 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37679","17.787678","172.30.1.205","172.30.1.104","TCP","74","38330 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921014 TSecr=0 WS=128" "37680","17.787874","172.30.1.104","172.30.1.205","TCP","54","135 > 45692 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37681","17.787883","172.30.1.104","172.30.1.205","TCP","54","135 > 45692 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37682","17.787888","172.30.1.205","172.30.1.104","TCP","54","45692 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37683","17.787973","172.30.1.104","172.30.1.205","TCP","66","49671 > 38330 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37684","17.787982","172.30.1.205","172.30.1.104","TCP","54","38330 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37685","17.788342","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37686","17.788651","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37687","17.788660","172.30.1.205","172.30.1.104","TCP","54","38330 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37688","17.790557","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37689","17.791462","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37690","17.791468","172.30.1.205","172.30.1.104","TCP","54","38330 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37691","17.792851","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37692","17.795929","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37693","17.795938","172.30.1.205","172.30.1.104","TCP","54","38330 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37694","17.796885","172.30.1.205","172.30.1.104","TCP","74","45696 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921023 TSecr=0 WS=128" "37695","17.797205","172.30.1.104","172.30.1.205","TCP","66","135 > 45696 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37696","17.797217","172.30.1.205","172.30.1.104","TCP","54","45696 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37697","17.797576","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37698","17.797865","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37699","17.797874","172.30.1.205","172.30.1.104","TCP","54","45696 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37700","17.800071","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37701","17.800478","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37702","17.800485","172.30.1.205","172.30.1.104","TCP","54","45696 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37703","17.802312","172.30.1.205","172.30.1.104","TCP","54","45696 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37704","17.802423","172.30.1.205","172.30.1.104","TCP","74","38334 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921028 TSecr=0 WS=128" "37705","17.802598","172.30.1.104","172.30.1.205","TCP","54","135 > 45696 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37706","17.802608","172.30.1.104","172.30.1.205","TCP","54","135 > 45696 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37707","17.802614","172.30.1.205","172.30.1.104","TCP","54","45696 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37708","17.802686","172.30.1.104","172.30.1.205","TCP","66","49671 > 38334 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37709","17.802695","172.30.1.205","172.30.1.104","TCP","54","38334 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37710","17.803041","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37711","17.803327","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37712","17.803336","172.30.1.205","172.30.1.104","TCP","54","38334 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37713","17.805258","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37714","17.805617","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37715","17.805624","172.30.1.205","172.30.1.104","TCP","54","38334 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37716","17.806980","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37717","17.810084","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37718","17.810094","172.30.1.205","172.30.1.104","TCP","54","38334 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37719","17.811057","172.30.1.205","172.30.1.104","TCP","74","45700 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921037 TSecr=0 WS=128" "37720","17.811399","172.30.1.104","172.30.1.205","TCP","66","135 > 45700 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37721","17.811410","172.30.1.205","172.30.1.104","TCP","54","45700 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37722","17.811765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37723","17.812072","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37724","17.812081","172.30.1.205","172.30.1.104","TCP","54","45700 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37725","17.814313","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37726","17.814700","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37727","17.814707","172.30.1.205","172.30.1.104","TCP","54","45700 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37728","17.816526","172.30.1.205","172.30.1.104","TCP","54","45700 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37729","17.816638","172.30.1.205","172.30.1.104","TCP","74","38338 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921043 TSecr=0 WS=128" "37730","17.816838","172.30.1.104","172.30.1.205","TCP","54","135 > 45700 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37731","17.816847","172.30.1.104","172.30.1.205","TCP","54","135 > 45700 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37732","17.816853","172.30.1.205","172.30.1.104","TCP","54","45700 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37733","17.816915","172.30.1.104","172.30.1.205","TCP","66","49671 > 38338 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37734","17.816924","172.30.1.205","172.30.1.104","TCP","54","38338 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37735","17.817296","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37736","17.817600","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37737","17.817609","172.30.1.205","172.30.1.104","TCP","54","38338 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37738","17.819480","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37739","17.819882","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37740","17.819889","172.30.1.205","172.30.1.104","TCP","54","38338 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37741","17.821277","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37742","17.824299","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37743","17.824311","172.30.1.205","172.30.1.104","TCP","54","38338 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37744","17.825308","172.30.1.205","172.30.1.104","TCP","74","45704 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921051 TSecr=0 WS=128" "37745","17.825606","172.30.1.104","172.30.1.205","TCP","66","135 > 45704 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37746","17.825617","172.30.1.205","172.30.1.104","TCP","54","45704 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37747","17.825981","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37748","17.826268","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37749","17.826277","172.30.1.205","172.30.1.104","TCP","54","45704 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37750","17.828464","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37751","17.828838","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37752","17.828845","172.30.1.205","172.30.1.104","TCP","54","45704 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37753","17.830659","172.30.1.205","172.30.1.104","TCP","54","45704 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37754","17.830771","172.30.1.205","172.30.1.104","TCP","74","38342 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921057 TSecr=0 WS=128" "37755","17.830910","172.30.1.104","172.30.1.205","TCP","54","135 > 45704 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37756","17.830935","172.30.1.104","172.30.1.205","TCP","54","135 > 45704 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37757","17.830940","172.30.1.205","172.30.1.104","TCP","54","45704 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37758","17.831032","172.30.1.104","172.30.1.205","TCP","66","49671 > 38342 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37759","17.831040","172.30.1.205","172.30.1.104","TCP","54","38342 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37760","17.831406","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37761","17.831679","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37762","17.831688","172.30.1.205","172.30.1.104","TCP","54","38342 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37763","17.833605","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37764","17.834072","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37765","17.834078","172.30.1.205","172.30.1.104","TCP","54","38342 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37766","17.835441","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37767","17.838527","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37768","17.838536","172.30.1.205","172.30.1.104","TCP","54","38342 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37769","17.839481","172.30.1.205","172.30.1.104","TCP","74","45708 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921065 TSecr=0 WS=128" "37770","17.839855","172.30.1.104","172.30.1.205","TCP","66","135 > 45708 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37771","17.839866","172.30.1.205","172.30.1.104","TCP","54","45708 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37772","17.840215","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37773","17.840548","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37774","17.840561","172.30.1.205","172.30.1.104","TCP","54","45708 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37775","17.842848","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37776","17.843231","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37777","17.843238","172.30.1.205","172.30.1.104","TCP","54","45708 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37778","17.845111","172.30.1.205","172.30.1.104","TCP","54","45708 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37779","17.845229","172.30.1.205","172.30.1.104","TCP","74","38346 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921071 TSecr=0 WS=128" "37780","17.845369","172.30.1.104","172.30.1.205","TCP","54","135 > 45708 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37781","17.845381","172.30.1.104","172.30.1.205","TCP","54","135 > 45708 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37782","17.845387","172.30.1.205","172.30.1.104","TCP","54","45708 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37783","17.845514","172.30.1.104","172.30.1.205","TCP","66","49671 > 38346 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37784","17.845522","172.30.1.205","172.30.1.104","TCP","54","38346 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37785","17.845879","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37786","17.847034","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37787","17.847048","172.30.1.205","172.30.1.104","TCP","54","38346 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37788","17.849026","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37789","17.849396","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37790","17.849402","172.30.1.205","172.30.1.104","TCP","54","38346 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37791","17.850767","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37792","17.853834","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37793","17.853844","172.30.1.205","172.30.1.104","TCP","54","38346 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37794","17.854814","172.30.1.205","172.30.1.104","TCP","74","45712 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921081 TSecr=0 WS=128" "37795","17.855128","172.30.1.104","172.30.1.205","TCP","66","135 > 45712 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37796","17.855141","172.30.1.205","172.30.1.104","TCP","54","45712 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37797","17.855492","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37798","17.855851","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37799","17.855860","172.30.1.205","172.30.1.104","TCP","54","45712 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37800","17.858081","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37801","17.858492","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37802","17.858500","172.30.1.205","172.30.1.104","TCP","54","45712 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37803","17.860323","172.30.1.205","172.30.1.104","TCP","54","45712 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37804","17.860443","172.30.1.205","172.30.1.104","TCP","74","38350 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921086 TSecr=0 WS=128" "37805","17.860701","172.30.1.104","172.30.1.205","TCP","54","135 > 45712 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37806","17.860711","172.30.1.104","172.30.1.205","TCP","54","135 > 45712 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37807","17.860716","172.30.1.205","172.30.1.104","TCP","54","45712 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37808","17.860725","172.30.1.104","172.30.1.205","TCP","66","49671 > 38350 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37809","17.860737","172.30.1.205","172.30.1.104","TCP","54","38350 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37810","17.861106","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37811","17.862069","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37812","17.862076","172.30.1.205","172.30.1.104","TCP","54","38350 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37813","17.863940","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37814","17.864303","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37815","17.864310","172.30.1.205","172.30.1.104","TCP","54","38350 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37816","17.865691","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37817","17.868697","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37818","17.868706","172.30.1.205","172.30.1.104","TCP","54","38350 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37819","17.869661","172.30.1.205","172.30.1.104","TCP","74","45716 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921096 TSecr=0 WS=128" "37820","17.869947","172.30.1.104","172.30.1.205","TCP","66","135 > 45716 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37821","17.869957","172.30.1.205","172.30.1.104","TCP","54","45716 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37822","17.870310","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37823","17.870615","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37824","17.870624","172.30.1.205","172.30.1.104","TCP","54","45716 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37825","17.872824","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37826","17.873229","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37827","17.873235","172.30.1.205","172.30.1.104","TCP","54","45716 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37828","17.875032","172.30.1.205","172.30.1.104","TCP","54","45716 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37829","17.875142","172.30.1.205","172.30.1.104","TCP","74","38354 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921101 TSecr=0 WS=128" "37830","17.875280","172.30.1.104","172.30.1.205","TCP","54","135 > 45716 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37831","17.875300","172.30.1.104","172.30.1.205","TCP","54","135 > 45716 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37832","17.875305","172.30.1.205","172.30.1.104","TCP","54","45716 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37833","17.875406","172.30.1.104","172.30.1.205","TCP","66","49671 > 38354 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37834","17.875414","172.30.1.205","172.30.1.104","TCP","54","38354 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37835","17.875758","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37836","17.877196","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37837","17.877205","172.30.1.205","172.30.1.104","TCP","54","38354 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37838","17.879057","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37839","17.879452","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37840","17.879458","172.30.1.205","172.30.1.104","TCP","54","38354 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37841","17.880835","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37842","17.883954","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37843","17.883965","172.30.1.205","172.30.1.104","TCP","54","38354 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37844","17.884943","172.30.1.205","172.30.1.104","TCP","74","45720 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921111 TSecr=0 WS=128" "37845","17.885384","172.30.1.104","172.30.1.205","TCP","66","135 > 45720 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37846","17.885395","172.30.1.205","172.30.1.104","TCP","54","45720 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37847","17.885746","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37848","17.886102","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37849","17.886112","172.30.1.205","172.30.1.104","TCP","54","45720 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37850","17.888291","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37851","17.888716","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37852","17.888725","172.30.1.205","172.30.1.104","TCP","54","45720 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37853","17.890607","172.30.1.205","172.30.1.104","TCP","54","45720 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37854","17.890724","172.30.1.205","172.30.1.104","TCP","74","38358 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921117 TSecr=0 WS=128" "37855","17.890866","172.30.1.104","172.30.1.205","TCP","54","135 > 45720 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37856","17.890899","172.30.1.104","172.30.1.205","TCP","54","135 > 45720 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37857","17.890905","172.30.1.205","172.30.1.104","TCP","54","45720 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37858","17.891000","172.30.1.104","172.30.1.205","TCP","66","49671 > 38358 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37859","17.891008","172.30.1.205","172.30.1.104","TCP","54","38358 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37860","17.891368","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37861","17.892899","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37862","17.892908","172.30.1.205","172.30.1.104","TCP","54","38358 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37863","17.894772","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37864","17.895146","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37865","17.895153","172.30.1.205","172.30.1.104","TCP","54","38358 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37866","17.896496","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37867","17.899583","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37868","17.899592","172.30.1.205","172.30.1.104","TCP","54","38358 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37869","17.900537","172.30.1.205","172.30.1.104","TCP","74","45724 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921126 TSecr=0 WS=128" "37870","17.900876","172.30.1.104","172.30.1.205","TCP","66","135 > 45724 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37871","17.900887","172.30.1.205","172.30.1.104","TCP","54","45724 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37872","17.901247","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37873","17.901538","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37874","17.901546","172.30.1.205","172.30.1.104","TCP","54","45724 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37875","17.903718","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37876","17.904150","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37877","17.904156","172.30.1.205","172.30.1.104","TCP","54","45724 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37878","17.906006","172.30.1.205","172.30.1.104","TCP","54","45724 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37879","17.906116","172.30.1.205","172.30.1.104","TCP","74","38362 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921132 TSecr=0 WS=128" "37880","17.906256","172.30.1.104","172.30.1.205","TCP","54","135 > 45724 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37881","17.906302","172.30.1.104","172.30.1.205","TCP","54","135 > 45724 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37882","17.906307","172.30.1.205","172.30.1.104","TCP","54","45724 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37883","17.906373","172.30.1.104","172.30.1.205","TCP","66","49671 > 38362 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37884","17.906382","172.30.1.205","172.30.1.104","TCP","54","38362 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37885","17.906736","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37886","17.907030","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37887","17.907039","172.30.1.205","172.30.1.104","TCP","54","38362 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37888","17.908921","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37889","17.909302","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37890","17.909308","172.30.1.205","172.30.1.104","TCP","54","38362 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37891","17.910642","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37892","17.913856","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37893","17.913865","172.30.1.205","172.30.1.104","TCP","54","38362 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37894","17.914829","172.30.1.205","172.30.1.104","TCP","74","45728 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921141 TSecr=0 WS=128" "37895","17.915138","172.30.1.104","172.30.1.205","TCP","66","135 > 45728 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37896","17.915149","172.30.1.205","172.30.1.104","TCP","54","45728 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37897","17.915503","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37898","17.915779","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37899","17.915788","172.30.1.205","172.30.1.104","TCP","54","45728 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37900","17.917992","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37901","17.918391","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37902","17.918398","172.30.1.205","172.30.1.104","TCP","54","45728 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37903","17.920194","172.30.1.205","172.30.1.104","TCP","54","45728 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37904","17.920313","172.30.1.205","172.30.1.104","TCP","74","38366 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921146 TSecr=0 WS=128" "37905","17.920471","172.30.1.104","172.30.1.205","TCP","54","135 > 45728 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37906","17.920483","172.30.1.104","172.30.1.205","TCP","54","135 > 45728 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37907","17.920489","172.30.1.205","172.30.1.104","TCP","54","45728 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37908","17.920583","172.30.1.104","172.30.1.205","TCP","66","49671 > 38366 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37909","17.920591","172.30.1.205","172.30.1.104","TCP","54","38366 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37910","17.920973","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37911","17.921290","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37912","17.921299","172.30.1.205","172.30.1.104","TCP","54","38366 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37913","17.923188","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37914","17.923560","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37915","17.923567","172.30.1.205","172.30.1.104","TCP","54","38366 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37916","17.924939","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37917","17.927945","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37918","17.927954","172.30.1.205","172.30.1.104","TCP","54","38366 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37919","17.928904","172.30.1.205","172.30.1.104","TCP","74","45732 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921155 TSecr=0 WS=128" "37920","17.929224","172.30.1.104","172.30.1.205","TCP","66","135 > 45732 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37921","17.929236","172.30.1.205","172.30.1.104","TCP","54","45732 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37922","17.929595","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37923","17.929887","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37924","17.929896","172.30.1.205","172.30.1.104","TCP","54","45732 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37925","17.932071","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37926","17.932440","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37927","17.932446","172.30.1.205","172.30.1.104","TCP","54","45732 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37928","17.934274","172.30.1.205","172.30.1.104","TCP","54","45732 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "37929","17.934385","172.30.1.205","172.30.1.104","TCP","74","38370 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921160 TSecr=0 WS=128" "37930","17.934568","172.30.1.104","172.30.1.205","TCP","54","135 > 45732 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37931","17.934577","172.30.1.104","172.30.1.205","TCP","54","135 > 45732 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "37932","17.934583","172.30.1.205","172.30.1.104","TCP","54","45732 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "37933","17.934657","172.30.1.104","172.30.1.205","TCP","66","49671 > 38370 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37934","17.934665","172.30.1.205","172.30.1.104","TCP","54","38370 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37935","17.935006","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "37936","17.935305","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37937","17.935313","172.30.1.205","172.30.1.104","TCP","54","38370 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37938","17.937198","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "37939","17.937597","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "37940","17.937604","172.30.1.205","172.30.1.104","TCP","54","38370 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "37941","17.938956","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "37942","17.941958","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "37943","17.941967","172.30.1.205","172.30.1.104","TCP","54","38370 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "37944","17.942925","172.30.1.205","172.30.1.104","TCP","74","45736 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921169 TSecr=0 WS=128" "37945","17.943199","172.30.1.104","172.30.1.205","TCP","66","135 > 45736 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "37946","17.943210","172.30.1.205","172.30.1.104","TCP","54","45736 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "37947","17.943565","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "37948","17.943886","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "37949","17.943895","172.30.1.205","172.30.1.104","TCP","54","45736 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "37950","17.946098","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "37951","17.946465","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "37952","17.946472","172.30.1.205","172.30.1.104","TCP","54","45736 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "37953","17.947315","172.30.1.205","172.30.1.104","TCP","54","38330 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37954","17.947362","172.30.1.205","172.30.1.104","TCP","54","38334 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37955","17.947394","172.30.1.205","172.30.1.104","TCP","54","38338 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37956","17.947426","172.30.1.205","172.30.1.104","TCP","54","38342 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37957","17.947459","172.30.1.205","172.30.1.104","TCP","54","38346 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37958","17.947490","172.30.1.205","172.30.1.104","TCP","54","38350 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37959","17.947525","172.30.1.205","172.30.1.104","TCP","54","38354 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37960","17.947556","172.30.1.205","172.30.1.104","TCP","54","38358 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37961","17.947587","172.30.1.205","172.30.1.104","TCP","54","38362 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37962","17.947617","172.30.1.205","172.30.1.104","TCP","54","38366 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37963","17.947647","172.30.1.205","172.30.1.104","TCP","54","38370 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37964","17.947719","172.30.1.205","172.30.1.104","TCP","54","38326 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "37965","17.947868","172.30.1.104","172.30.1.205","TCP","54","49671 > 38330 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37966","17.947878","172.30.1.104","172.30.1.205","TCP","54","49671 > 38334 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37967","17.947881","172.30.1.104","172.30.1.205","TCP","54","49671 > 38338 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37968","17.947884","172.30.1.104","172.30.1.205","TCP","54","49671 > 38330 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37969","17.947891","172.30.1.205","172.30.1.104","TCP","54","38330 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37970","17.947897","172.30.1.104","172.30.1.205","TCP","54","49671 > 38342 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37971","17.947901","172.30.1.104","172.30.1.205","TCP","54","49671 > 38346 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37972","17.947907","172.30.1.104","172.30.1.205","TCP","54","49671 > 38346 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37973","17.947909","172.30.1.205","172.30.1.104","TCP","54","38346 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37974","17.947910","172.30.1.104","172.30.1.205","TCP","54","49671 > 38350 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37975","17.948160","172.30.1.104","172.30.1.205","TCP","54","49671 > 38354 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37976","17.948167","172.30.1.104","172.30.1.205","TCP","54","49671 > 38342 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37977","17.948171","172.30.1.205","172.30.1.104","TCP","54","38342 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37978","17.948177","172.30.1.104","172.30.1.205","TCP","54","49671 > 38354 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37979","17.948179","172.30.1.205","172.30.1.104","TCP","54","38354 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37980","17.948180","172.30.1.104","172.30.1.205","TCP","54","49671 > 38350 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37981","17.948182","172.30.1.205","172.30.1.104","TCP","54","38350 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37982","17.948183","172.30.1.104","172.30.1.205","TCP","54","49671 > 38334 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37983","17.948185","172.30.1.205","172.30.1.104","TCP","54","38334 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37984","17.948186","172.30.1.104","172.30.1.205","TCP","54","49671 > 38338 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37985","17.948187","172.30.1.205","172.30.1.104","TCP","54","38338 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37986","17.948188","172.30.1.104","172.30.1.205","TCP","54","49671 > 38358 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37987","17.948411","172.30.1.104","172.30.1.205","TCP","54","49671 > 38362 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37988","17.948417","172.30.1.104","172.30.1.205","TCP","54","49671 > 38358 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37989","17.948421","172.30.1.205","172.30.1.104","TCP","54","38358 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37990","17.948427","172.30.1.104","172.30.1.205","TCP","54","49671 > 38366 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37991","17.948430","172.30.1.104","172.30.1.205","TCP","54","49671 > 38370 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37992","17.948441","172.30.1.104","172.30.1.205","TCP","54","49671 > 38370 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37993","17.948443","172.30.1.205","172.30.1.104","TCP","54","38370 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37994","17.948638","172.30.1.104","172.30.1.205","TCP","54","49671 > 38326 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37995","17.948643","172.30.1.104","172.30.1.205","TCP","54","49671 > 38326 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37996","17.948647","172.30.1.205","172.30.1.104","TCP","54","38326 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37997","17.948653","172.30.1.104","172.30.1.205","TCP","54","49671 > 38362 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "37998","17.948655","172.30.1.205","172.30.1.104","TCP","54","38362 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "37999","17.948656","172.30.1.104","172.30.1.205","TCP","54","49671 > 38366 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38000","17.948657","172.30.1.205","172.30.1.104","TCP","54","38366 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38001","17.949234","172.30.1.205","172.30.1.104","TCP","54","45736 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38002","17.949344","172.30.1.205","172.30.1.104","TCP","74","38374 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921175 TSecr=0 WS=128" "38003","17.949506","172.30.1.104","172.30.1.205","TCP","54","135 > 45736 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38004","17.949541","172.30.1.104","172.30.1.205","TCP","54","135 > 45736 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38005","17.949546","172.30.1.205","172.30.1.104","TCP","54","45736 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38006","17.949624","172.30.1.104","172.30.1.205","TCP","66","49671 > 38374 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38007","17.949632","172.30.1.205","172.30.1.104","TCP","54","38374 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38008","17.949993","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38009","17.950280","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38010","17.950288","172.30.1.205","172.30.1.104","TCP","54","38374 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38011","17.952154","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38012","17.952522","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38013","17.952528","172.30.1.205","172.30.1.104","TCP","54","38374 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38014","17.953899","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38015","17.956972","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38016","17.956981","172.30.1.205","172.30.1.104","TCP","54","38374 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38017","17.957922","172.30.1.205","172.30.1.104","TCP","74","45740 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921184 TSecr=0 WS=128" "38018","17.958252","172.30.1.104","172.30.1.205","TCP","66","135 > 45740 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38019","17.958262","172.30.1.205","172.30.1.104","TCP","54","45740 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38020","17.958613","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38021","17.958993","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38022","17.959002","172.30.1.205","172.30.1.104","TCP","54","45740 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38023","17.961187","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38024","17.961591","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38025","17.961597","172.30.1.205","172.30.1.104","TCP","54","45740 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38026","17.963390","172.30.1.205","172.30.1.104","TCP","54","45740 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38027","17.963499","172.30.1.205","172.30.1.104","TCP","74","38378 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921189 TSecr=0 WS=128" "38028","17.963653","172.30.1.104","172.30.1.205","TCP","54","135 > 45740 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38029","17.963663","172.30.1.104","172.30.1.205","TCP","54","135 > 45740 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38030","17.963668","172.30.1.205","172.30.1.104","TCP","54","45740 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38031","17.963775","172.30.1.104","172.30.1.205","TCP","66","49671 > 38378 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38032","17.963784","172.30.1.205","172.30.1.104","TCP","54","38378 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38033","17.964128","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38034","17.964436","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38035","17.964445","172.30.1.205","172.30.1.104","TCP","54","38378 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38036","17.966325","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38037","17.966699","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38038","17.966705","172.30.1.205","172.30.1.104","TCP","54","38378 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38039","17.968040","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38040","17.971152","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38041","17.971161","172.30.1.205","172.30.1.104","TCP","54","38378 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38042","17.972103","172.30.1.205","172.30.1.104","TCP","74","45744 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921198 TSecr=0 WS=128" "38043","17.972433","172.30.1.104","172.30.1.205","TCP","66","135 > 45744 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38044","17.972445","172.30.1.205","172.30.1.104","TCP","54","45744 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38045","17.972821","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38046","17.973125","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38047","17.973134","172.30.1.205","172.30.1.104","TCP","54","45744 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38048","17.975316","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38049","17.975740","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38050","17.975746","172.30.1.205","172.30.1.104","TCP","54","45744 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38051","17.977576","172.30.1.205","172.30.1.104","TCP","54","45744 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38052","17.977685","172.30.1.205","172.30.1.104","TCP","74","38382 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921204 TSecr=0 WS=128" "38053","17.977828","172.30.1.104","172.30.1.205","TCP","54","135 > 45744 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38054","17.977857","172.30.1.104","172.30.1.205","TCP","54","135 > 45744 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38055","17.977862","172.30.1.205","172.30.1.104","TCP","54","45744 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38056","17.977977","172.30.1.104","172.30.1.205","TCP","66","49671 > 38382 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38057","17.977985","172.30.1.205","172.30.1.104","TCP","54","38382 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38058","17.978331","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38059","17.978596","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38060","17.978604","172.30.1.205","172.30.1.104","TCP","54","38382 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38061","17.980473","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38062","17.980874","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38063","17.980880","172.30.1.205","172.30.1.104","TCP","54","38382 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38064","17.982233","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38065","17.985330","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38066","17.985339","172.30.1.205","172.30.1.104","TCP","54","38382 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38067","17.986298","172.30.1.205","172.30.1.104","TCP","74","45748 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921212 TSecr=0 WS=128" "38068","17.986610","172.30.1.104","172.30.1.205","TCP","66","135 > 45748 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38069","17.986623","172.30.1.205","172.30.1.104","TCP","54","45748 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38070","17.986981","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38071","17.987274","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38072","17.987282","172.30.1.205","172.30.1.104","TCP","54","45748 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38073","17.989493","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38074","17.989893","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38075","17.989899","172.30.1.205","172.30.1.104","TCP","54","45748 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38076","17.991723","172.30.1.205","172.30.1.104","TCP","54","45748 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38077","17.991832","172.30.1.205","172.30.1.104","TCP","74","38386 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921218 TSecr=0 WS=128" "38078","17.992008","172.30.1.104","172.30.1.205","TCP","54","135 > 45748 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38079","17.992060","172.30.1.104","172.30.1.205","TCP","54","135 > 45748 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38080","17.992065","172.30.1.205","172.30.1.104","TCP","54","45748 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38081","17.992137","172.30.1.104","172.30.1.205","TCP","66","49671 > 38386 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38082","17.992145","172.30.1.205","172.30.1.104","TCP","54","38386 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38083","17.992490","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38084","17.992772","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38085","17.992790","172.30.1.205","172.30.1.104","TCP","54","38386 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38086","17.994674","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38087","17.995050","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38088","17.995056","172.30.1.205","172.30.1.104","TCP","54","38386 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38089","17.996400","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38090","17.999466","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38091","17.999479","172.30.1.205","172.30.1.104","TCP","54","38386 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38092","18.000479","172.30.1.205","172.30.1.104","TCP","74","45752 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921226 TSecr=0 WS=128" "38093","18.000776","172.30.1.104","172.30.1.205","TCP","66","135 > 45752 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38094","18.000792","172.30.1.205","172.30.1.104","TCP","54","45752 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38095","18.001191","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38096","18.001494","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38097","18.001504","172.30.1.205","172.30.1.104","TCP","54","45752 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38098","18.003727","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38099","18.004123","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38100","18.004130","172.30.1.205","172.30.1.104","TCP","54","45752 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38101","18.005983","172.30.1.205","172.30.1.104","TCP","54","45752 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38102","18.006104","172.30.1.205","172.30.1.104","TCP","74","38390 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921232 TSecr=0 WS=128" "38103","18.006265","172.30.1.104","172.30.1.205","TCP","54","135 > 45752 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38104","18.006297","172.30.1.104","172.30.1.205","TCP","54","135 > 45752 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38105","18.006304","172.30.1.205","172.30.1.104","TCP","54","45752 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38106","18.006376","172.30.1.104","172.30.1.205","TCP","66","49671 > 38390 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38107","18.006384","172.30.1.205","172.30.1.104","TCP","54","38390 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38108","18.006731","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38109","18.007040","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38110","18.007048","172.30.1.205","172.30.1.104","TCP","54","38390 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38111","18.008964","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38112","18.009318","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38113","18.009324","172.30.1.205","172.30.1.104","TCP","54","38390 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38114","18.010698","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38115","18.013898","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38116","18.013922","172.30.1.205","172.30.1.104","TCP","54","38390 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38117","18.015131","172.30.1.205","172.30.1.104","TCP","74","45756 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921241 TSecr=0 WS=128" "38118","18.015486","172.30.1.104","172.30.1.205","TCP","66","135 > 45756 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38119","18.015500","172.30.1.205","172.30.1.104","TCP","54","45756 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38120","18.015866","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38121","18.016168","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38122","18.016177","172.30.1.205","172.30.1.104","TCP","54","45756 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38123","18.018473","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38124","18.018887","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38125","18.018894","172.30.1.205","172.30.1.104","TCP","54","45756 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38126","18.020737","172.30.1.205","172.30.1.104","TCP","54","45756 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38127","18.020901","172.30.1.205","172.30.1.104","TCP","74","38394 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921247 TSecr=0 WS=128" "38128","18.021016","172.30.1.104","172.30.1.205","TCP","54","135 > 45756 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38129","18.021029","172.30.1.104","172.30.1.205","TCP","54","135 > 45756 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38130","18.021037","172.30.1.205","172.30.1.104","TCP","54","45756 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38131","18.021202","172.30.1.104","172.30.1.205","TCP","66","49671 > 38394 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38132","18.021211","172.30.1.205","172.30.1.104","TCP","54","38394 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38133","18.021574","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38134","18.021906","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38135","18.021914","172.30.1.205","172.30.1.104","TCP","54","38394 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38136","18.023799","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38137","18.024172","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38138","18.024179","172.30.1.205","172.30.1.104","TCP","54","38394 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38139","18.025588","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38140","18.028812","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38141","18.028823","172.30.1.205","172.30.1.104","TCP","54","38394 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38142","18.029823","172.30.1.205","172.30.1.104","TCP","74","45760 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921256 TSecr=0 WS=128" "38143","18.031303","172.30.1.104","172.30.1.205","TCP","66","135 > 45760 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38144","18.031315","172.30.1.205","172.30.1.104","TCP","54","45760 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38145","18.031679","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38146","18.032001","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38147","18.032012","172.30.1.205","172.30.1.104","TCP","54","45760 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38148","18.034269","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38149","18.034701","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38150","18.034708","172.30.1.205","172.30.1.104","TCP","54","45760 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38151","18.036544","172.30.1.205","172.30.1.104","TCP","54","45760 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38152","18.036660","172.30.1.205","172.30.1.104","TCP","74","38398 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921263 TSecr=0 WS=128" "38153","18.036881","172.30.1.104","172.30.1.205","TCP","54","135 > 45760 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38154","18.036892","172.30.1.104","172.30.1.205","TCP","54","135 > 45760 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38155","18.036899","172.30.1.205","172.30.1.104","TCP","54","45760 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38156","18.036997","172.30.1.104","172.30.1.205","TCP","66","49671 > 38398 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38157","18.037005","172.30.1.205","172.30.1.104","TCP","54","38398 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38158","18.037352","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38159","18.037646","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38160","18.037654","172.30.1.205","172.30.1.104","TCP","54","38398 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38161","18.039527","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38162","18.039910","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38163","18.039916","172.30.1.205","172.30.1.104","TCP","54","38398 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38164","18.041305","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38165","18.044600","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38166","18.044611","172.30.1.205","172.30.1.104","TCP","54","38398 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38167","18.045644","172.30.1.205","172.30.1.104","TCP","74","45764 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921272 TSecr=0 WS=128" "38168","18.045968","172.30.1.104","172.30.1.205","TCP","66","135 > 45764 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38169","18.045979","172.30.1.205","172.30.1.104","TCP","54","45764 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38170","18.046341","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38171","18.046650","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38172","18.046661","172.30.1.205","172.30.1.104","TCP","54","45764 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38173","18.048909","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38174","18.049325","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38175","18.049331","172.30.1.205","172.30.1.104","TCP","54","45764 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38176","18.051143","172.30.1.205","172.30.1.104","TCP","54","45764 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38177","18.051259","172.30.1.205","172.30.1.104","TCP","74","38402 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921277 TSecr=0 WS=128" "38178","18.051573","172.30.1.104","172.30.1.205","TCP","66","49671 > 38402 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38179","18.051586","172.30.1.205","172.30.1.104","TCP","54","38402 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38180","18.051598","172.30.1.104","172.30.1.205","TCP","54","135 > 45764 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38181","18.051615","172.30.1.104","172.30.1.205","TCP","54","135 > 45764 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38182","18.051621","172.30.1.205","172.30.1.104","TCP","54","45764 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38183","18.051973","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38184","18.052276","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38185","18.052285","172.30.1.205","172.30.1.104","TCP","54","38402 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38186","18.054199","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38187","18.054558","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38188","18.054564","172.30.1.205","172.30.1.104","TCP","54","38402 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38189","18.055921","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38190","18.059058","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38191","18.059068","172.30.1.205","172.30.1.104","TCP","54","38402 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38192","18.060037","172.30.1.205","172.30.1.104","TCP","74","45768 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921286 TSecr=0 WS=128" "38193","18.060353","172.30.1.104","172.30.1.205","TCP","66","135 > 45768 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38194","18.060364","172.30.1.205","172.30.1.104","TCP","54","45768 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38195","18.060711","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38196","18.061005","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38197","18.061014","172.30.1.205","172.30.1.104","TCP","54","45768 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38198","18.063205","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38199","18.063591","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38200","18.063598","172.30.1.205","172.30.1.104","TCP","54","45768 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38201","18.065431","172.30.1.205","172.30.1.104","TCP","54","45768 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38202","18.065543","172.30.1.205","172.30.1.104","TCP","74","38406 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921291 TSecr=0 WS=128" "38203","18.065728","172.30.1.104","172.30.1.205","TCP","54","135 > 45768 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38204","18.065753","172.30.1.104","172.30.1.205","TCP","54","135 > 45768 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38205","18.065759","172.30.1.205","172.30.1.104","TCP","54","45768 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38206","18.065881","172.30.1.104","172.30.1.205","TCP","66","49671 > 38406 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38207","18.065888","172.30.1.205","172.30.1.104","TCP","54","38406 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38208","18.066236","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38209","18.066537","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38210","18.066546","172.30.1.205","172.30.1.104","TCP","54","38406 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38211","18.068396","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38212","18.069184","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38213","18.069191","172.30.1.205","172.30.1.104","TCP","54","38406 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38214","18.070544","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38215","18.073560","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38216","18.073569","172.30.1.205","172.30.1.104","TCP","54","38406 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38217","18.074549","172.30.1.205","172.30.1.104","TCP","74","45772 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921300 TSecr=0 WS=128" "38218","18.074900","172.30.1.104","172.30.1.205","TCP","66","135 > 45772 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38219","18.074912","172.30.1.205","172.30.1.104","TCP","54","45772 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38220","18.075269","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38221","18.075585","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38222","18.075594","172.30.1.205","172.30.1.104","TCP","54","45772 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38223","18.077827","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38224","18.078206","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38225","18.078213","172.30.1.205","172.30.1.104","TCP","54","45772 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38226","18.080029","172.30.1.205","172.30.1.104","TCP","54","45772 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38227","18.080161","172.30.1.205","172.30.1.104","TCP","74","38410 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921306 TSecr=0 WS=128" "38228","18.080332","172.30.1.104","172.30.1.205","TCP","54","135 > 45772 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38229","18.080363","172.30.1.104","172.30.1.205","TCP","54","135 > 45772 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38230","18.080369","172.30.1.205","172.30.1.104","TCP","54","45772 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38231","18.080540","172.30.1.104","172.30.1.205","TCP","66","49671 > 38410 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38232","18.080557","172.30.1.205","172.30.1.104","TCP","54","38410 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38233","18.080928","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38234","18.082194","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38235","18.082203","172.30.1.205","172.30.1.104","TCP","54","38410 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38236","18.084081","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38237","18.084509","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38238","18.084515","172.30.1.205","172.30.1.104","TCP","54","38410 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38239","18.085898","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38240","18.088878","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38241","18.088888","172.30.1.205","172.30.1.104","TCP","54","38410 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38242","18.089852","172.30.1.205","172.30.1.104","TCP","74","45776 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921316 TSecr=0 WS=128" "38243","18.090280","172.30.1.104","172.30.1.205","TCP","66","135 > 45776 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38244","18.090291","172.30.1.205","172.30.1.104","TCP","54","45776 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38245","18.090645","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38246","18.090971","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38247","18.090980","172.30.1.205","172.30.1.104","TCP","54","45776 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38248","18.093202","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38249","18.093618","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38250","18.093625","172.30.1.205","172.30.1.104","TCP","54","45776 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38251","18.095438","172.30.1.205","172.30.1.104","TCP","54","45776 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38252","18.095563","172.30.1.205","172.30.1.104","TCP","74","38414 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921321 TSecr=0 WS=128" "38253","18.095706","172.30.1.104","172.30.1.205","TCP","54","135 > 45776 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38254","18.095729","172.30.1.104","172.30.1.205","TCP","54","135 > 45776 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38255","18.095735","172.30.1.205","172.30.1.104","TCP","54","45776 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38256","18.095830","172.30.1.104","172.30.1.205","TCP","66","49671 > 38414 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38257","18.095839","172.30.1.205","172.30.1.104","TCP","54","38414 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38258","18.096186","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38259","18.096487","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38260","18.096496","172.30.1.205","172.30.1.104","TCP","54","38414 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38261","18.098425","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38262","18.098797","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38263","18.098804","172.30.1.205","172.30.1.104","TCP","54","38414 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38264","18.100178","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38265","18.103220","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38266","18.103233","172.30.1.205","172.30.1.104","TCP","54","38414 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38267","18.104257","172.30.1.205","172.30.1.104","TCP","74","45780 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921330 TSecr=0 WS=128" "38268","18.104563","172.30.1.104","172.30.1.205","TCP","66","135 > 45780 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38269","18.104577","172.30.1.205","172.30.1.104","TCP","54","45780 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38270","18.104976","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38271","18.105274","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38272","18.105284","172.30.1.205","172.30.1.104","TCP","54","45780 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38273","18.107485","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38274","18.107910","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38275","18.107917","172.30.1.205","172.30.1.104","TCP","54","45780 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38276","18.109773","172.30.1.205","172.30.1.104","TCP","54","45780 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38277","18.109885","172.30.1.205","172.30.1.104","TCP","74","38418 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921336 TSecr=0 WS=128" "38278","18.110112","172.30.1.104","172.30.1.205","TCP","54","135 > 45780 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38279","18.110122","172.30.1.104","172.30.1.205","TCP","54","135 > 45780 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38280","18.110127","172.30.1.205","172.30.1.104","TCP","54","45780 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38281","18.110222","172.30.1.104","172.30.1.205","TCP","66","49671 > 38418 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38282","18.110231","172.30.1.205","172.30.1.104","TCP","54","38418 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38283","18.110576","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38284","18.110911","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38285","18.110918","172.30.1.205","172.30.1.104","TCP","54","38418 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38286","18.112813","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38287","18.113220","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38288","18.113226","172.30.1.205","172.30.1.104","TCP","54","38418 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38289","18.114585","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38290","18.117645","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38291","18.117655","172.30.1.205","172.30.1.104","TCP","54","38418 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38292","18.118608","172.30.1.205","172.30.1.104","TCP","74","45784 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921345 TSecr=0 WS=128" "38293","18.118957","172.30.1.104","172.30.1.205","TCP","66","135 > 45784 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38294","18.118968","172.30.1.205","172.30.1.104","TCP","54","45784 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38295","18.119314","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38296","18.119650","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38297","18.119660","172.30.1.205","172.30.1.104","TCP","54","45784 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38298","18.121877","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38299","18.122319","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38300","18.122326","172.30.1.205","172.30.1.104","TCP","54","45784 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38301","18.123176","172.30.1.205","172.30.1.104","TCP","54","38378 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38302","18.123227","172.30.1.205","172.30.1.104","TCP","54","38382 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38303","18.123260","172.30.1.205","172.30.1.104","TCP","54","38386 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38304","18.123288","172.30.1.205","172.30.1.104","TCP","54","38390 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38305","18.123311","172.30.1.205","172.30.1.104","TCP","54","38394 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38306","18.123339","172.30.1.205","172.30.1.104","TCP","54","38398 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38307","18.123366","172.30.1.205","172.30.1.104","TCP","54","38402 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38308","18.123392","172.30.1.205","172.30.1.104","TCP","54","38406 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38309","18.123416","172.30.1.205","172.30.1.104","TCP","54","38410 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38310","18.123442","172.30.1.205","172.30.1.104","TCP","54","38414 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38311","18.123467","172.30.1.205","172.30.1.104","TCP","54","38418 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38312","18.123506","172.30.1.104","172.30.1.205","TCP","54","49671 > 38378 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38313","18.123560","172.30.1.205","172.30.1.104","TCP","54","38374 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38314","18.123707","172.30.1.104","172.30.1.205","TCP","54","49671 > 38382 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38315","18.123733","172.30.1.104","172.30.1.205","TCP","54","49671 > 38378 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38316","18.123740","172.30.1.205","172.30.1.104","TCP","54","38378 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38317","18.123760","172.30.1.104","172.30.1.205","TCP","54","49671 > 38386 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38318","18.123791","172.30.1.104","172.30.1.205","TCP","54","49671 > 38382 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38319","18.123796","172.30.1.205","172.30.1.104","TCP","54","38382 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38320","18.123824","172.30.1.104","172.30.1.205","TCP","54","49671 > 38386 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38321","18.123828","172.30.1.205","172.30.1.104","TCP","54","38386 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38322","18.123855","172.30.1.104","172.30.1.205","TCP","54","49671 > 38390 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38323","18.123886","172.30.1.104","172.30.1.205","TCP","54","49671 > 38394 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38324","18.123916","172.30.1.104","172.30.1.205","TCP","54","49671 > 38390 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38325","18.123920","172.30.1.205","172.30.1.104","TCP","54","38390 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38326","18.123947","172.30.1.104","172.30.1.205","TCP","54","49671 > 38398 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38327","18.123981","172.30.1.104","172.30.1.205","TCP","54","49671 > 38402 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38328","18.124047","172.30.1.104","172.30.1.205","TCP","54","49671 > 38394 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38329","18.124052","172.30.1.205","172.30.1.104","TCP","54","38394 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38330","18.124054","172.30.1.104","172.30.1.205","TCP","54","49671 > 38398 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38331","18.124056","172.30.1.205","172.30.1.104","TCP","54","38398 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38332","18.124104","172.30.1.104","172.30.1.205","TCP","54","49671 > 38402 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38333","18.124107","172.30.1.205","172.30.1.104","TCP","54","38402 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38334","18.124109","172.30.1.104","172.30.1.205","TCP","54","49671 > 38406 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38335","18.124123","172.30.1.104","172.30.1.205","TCP","54","49671 > 38410 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38336","18.124154","172.30.1.104","172.30.1.205","TCP","54","49671 > 38406 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38337","18.124157","172.30.1.205","172.30.1.104","TCP","54","38406 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38338","18.124184","172.30.1.104","172.30.1.205","TCP","54","49671 > 38414 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38339","18.124216","172.30.1.104","172.30.1.205","TCP","54","49671 > 38418 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38340","18.124248","172.30.1.104","172.30.1.205","TCP","54","49671 > 38418 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38341","18.124252","172.30.1.205","172.30.1.104","TCP","54","38418 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38342","18.124278","172.30.1.104","172.30.1.205","TCP","54","49671 > 38410 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38343","18.124281","172.30.1.205","172.30.1.104","TCP","54","38410 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38344","18.124321","172.30.1.104","172.30.1.205","TCP","54","49671 > 38414 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38345","18.124325","172.30.1.205","172.30.1.104","TCP","54","38414 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38346","18.124738","172.30.1.104","172.30.1.205","TCP","54","49671 > 38374 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38347","18.124768","172.30.1.104","172.30.1.205","TCP","54","49671 > 38374 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38348","18.124773","172.30.1.205","172.30.1.104","TCP","54","38374 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38349","18.125198","172.30.1.205","172.30.1.104","TCP","54","45784 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38350","18.125315","172.30.1.205","172.30.1.104","TCP","74","38422 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921351 TSecr=0 WS=128" "38351","18.125495","172.30.1.104","172.30.1.205","TCP","54","135 > 45784 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38352","18.125524","172.30.1.104","172.30.1.205","TCP","54","135 > 45784 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38353","18.125529","172.30.1.205","172.30.1.104","TCP","54","45784 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38354","18.125626","172.30.1.104","172.30.1.205","TCP","66","49671 > 38422 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38355","18.125634","172.30.1.205","172.30.1.104","TCP","54","38422 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38356","18.125989","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38357","18.126332","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38358","18.126341","172.30.1.205","172.30.1.104","TCP","54","38422 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38359","18.128219","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38360","18.128657","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38361","18.128663","172.30.1.205","172.30.1.104","TCP","54","38422 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38362","18.130049","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38363","18.133192","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38364","18.133203","172.30.1.205","172.30.1.104","TCP","54","38422 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38365","18.134178","172.30.1.205","172.30.1.104","TCP","74","45788 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921360 TSecr=0 WS=128" "38366","18.134513","172.30.1.104","172.30.1.205","TCP","66","135 > 45788 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38367","18.134524","172.30.1.205","172.30.1.104","TCP","54","45788 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38368","18.134881","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38369","18.135266","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38370","18.135275","172.30.1.205","172.30.1.104","TCP","54","45788 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38371","18.137493","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38372","18.137930","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38373","18.137937","172.30.1.205","172.30.1.104","TCP","54","45788 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38374","18.139761","172.30.1.205","172.30.1.104","TCP","54","45788 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38375","18.139877","172.30.1.205","172.30.1.104","TCP","74","38426 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921366 TSecr=0 WS=128" "38376","18.140040","172.30.1.104","172.30.1.205","TCP","54","135 > 45788 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38377","18.140051","172.30.1.104","172.30.1.205","TCP","54","135 > 45788 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38378","18.140057","172.30.1.205","172.30.1.104","TCP","54","45788 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38379","18.140192","172.30.1.104","172.30.1.205","TCP","66","49671 > 38426 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38380","18.140200","172.30.1.205","172.30.1.104","TCP","54","38426 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38381","18.140554","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38382","18.140841","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38383","18.140850","172.30.1.205","172.30.1.104","TCP","54","38426 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38384","18.142742","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38385","18.143112","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38386","18.143118","172.30.1.205","172.30.1.104","TCP","54","38426 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38387","18.144474","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38388","18.147556","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38389","18.147566","172.30.1.205","172.30.1.104","TCP","54","38426 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38390","18.148546","172.30.1.205","172.30.1.104","TCP","74","45792 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921374 TSecr=0 WS=128" "38391","18.148897","172.30.1.104","172.30.1.205","TCP","66","135 > 45792 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38392","18.148908","172.30.1.205","172.30.1.104","TCP","54","45792 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38393","18.149269","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38394","18.149583","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38395","18.149592","172.30.1.205","172.30.1.104","TCP","54","45792 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38396","18.151796","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38397","18.152200","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38398","18.152207","172.30.1.205","172.30.1.104","TCP","54","45792 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38399","18.154059","172.30.1.205","172.30.1.104","TCP","54","45792 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38400","18.154176","172.30.1.205","172.30.1.104","TCP","74","38430 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921380 TSecr=0 WS=128" "38401","18.154419","172.30.1.104","172.30.1.205","TCP","54","135 > 45792 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38402","18.154428","172.30.1.104","172.30.1.205","TCP","54","135 > 45792 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38403","18.154434","172.30.1.205","172.30.1.104","TCP","54","45792 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38404","18.154456","172.30.1.104","172.30.1.205","TCP","66","49671 > 38430 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38405","18.154464","172.30.1.205","172.30.1.104","TCP","54","38430 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38406","18.154826","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38407","18.155109","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38408","18.155118","172.30.1.205","172.30.1.104","TCP","54","38430 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38409","18.157022","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38410","18.157466","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38411","18.157472","172.30.1.205","172.30.1.104","TCP","54","38430 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38412","18.158828","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38413","18.161964","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38414","18.161974","172.30.1.205","172.30.1.104","TCP","54","38430 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38415","18.162969","172.30.1.205","172.30.1.104","TCP","74","45796 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921389 TSecr=0 WS=128" "38416","18.163316","172.30.1.104","172.30.1.205","TCP","66","135 > 45796 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38417","18.163327","172.30.1.205","172.30.1.104","TCP","54","45796 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38418","18.163688","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38419","18.164159","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38420","18.164168","172.30.1.205","172.30.1.104","TCP","54","45796 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38421","18.166436","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38422","18.166905","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38423","18.166911","172.30.1.205","172.30.1.104","TCP","54","45796 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38424","18.168757","172.30.1.205","172.30.1.104","TCP","54","45796 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38425","18.168910","172.30.1.205","172.30.1.104","TCP","74","38434 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921395 TSecr=0 WS=128" "38426","18.169092","172.30.1.104","172.30.1.205","TCP","54","135 > 45796 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38427","18.169130","172.30.1.104","172.30.1.205","TCP","54","135 > 45796 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38428","18.169137","172.30.1.205","172.30.1.104","TCP","54","45796 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38429","18.169211","172.30.1.104","172.30.1.205","TCP","66","49671 > 38434 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38430","18.169220","172.30.1.205","172.30.1.104","TCP","54","38434 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38431","18.169586","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38432","18.169900","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38433","18.169909","172.30.1.205","172.30.1.104","TCP","54","38434 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38434","18.171793","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38435","18.172170","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38436","18.172176","172.30.1.205","172.30.1.104","TCP","54","38434 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38437","18.173574","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38438","18.176784","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38439","18.176794","172.30.1.205","172.30.1.104","TCP","54","38434 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38440","18.177802","172.30.1.205","172.30.1.104","TCP","74","45800 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921404 TSecr=0 WS=128" "38441","18.178120","172.30.1.104","172.30.1.205","TCP","66","135 > 45800 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38442","18.178132","172.30.1.205","172.30.1.104","TCP","54","45800 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38443","18.178492","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38444","18.178781","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38445","18.178790","172.30.1.205","172.30.1.104","TCP","54","45800 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38446","18.181028","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38447","18.181461","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38448","18.181468","172.30.1.205","172.30.1.104","TCP","54","45800 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38449","18.183293","172.30.1.205","172.30.1.104","TCP","54","45800 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38450","18.183417","172.30.1.205","172.30.1.104","TCP","74","38438 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921409 TSecr=0 WS=128" "38451","18.183591","172.30.1.104","172.30.1.205","TCP","54","135 > 45800 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38452","18.183604","172.30.1.104","172.30.1.205","TCP","54","135 > 45800 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38453","18.183611","172.30.1.205","172.30.1.104","TCP","54","45800 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38454","18.183759","172.30.1.104","172.30.1.205","TCP","66","49671 > 38438 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38455","18.183768","172.30.1.205","172.30.1.104","TCP","54","38438 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38456","18.184133","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38457","18.184433","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38458","18.184442","172.30.1.205","172.30.1.104","TCP","54","38438 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38459","18.186353","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38460","18.186792","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38461","18.186798","172.30.1.205","172.30.1.104","TCP","54","38438 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38462","18.188153","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38463","18.191207","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38464","18.191217","172.30.1.205","172.30.1.104","TCP","54","38438 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38465","18.192218","172.30.1.205","172.30.1.104","TCP","74","45804 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921418 TSecr=0 WS=128" "38466","18.192534","172.30.1.104","172.30.1.205","TCP","66","135 > 45804 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38467","18.192547","172.30.1.205","172.30.1.104","TCP","54","45804 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38468","18.192935","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38469","18.193240","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38470","18.193249","172.30.1.205","172.30.1.104","TCP","54","45804 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38471","18.195447","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38472","18.195834","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38473","18.195841","172.30.1.205","172.30.1.104","TCP","54","45804 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38474","18.197697","172.30.1.205","172.30.1.104","TCP","54","45804 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38475","18.197811","172.30.1.205","172.30.1.104","TCP","74","38442 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921424 TSecr=0 WS=128" "38476","18.198675","172.30.1.104","172.30.1.205","TCP","66","49671 > 38442 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38477","18.198684","172.30.1.205","172.30.1.104","TCP","54","38442 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38478","18.198704","172.30.1.104","172.30.1.205","TCP","54","135 > 45804 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38479","18.198728","172.30.1.104","172.30.1.205","TCP","54","135 > 45804 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38480","18.198735","172.30.1.205","172.30.1.104","TCP","54","45804 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38481","18.199064","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38482","18.199341","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38483","18.199350","172.30.1.205","172.30.1.104","TCP","54","38442 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38484","18.201258","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38485","18.201713","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38486","18.201720","172.30.1.205","172.30.1.104","TCP","54","38442 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38487","18.203081","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38488","18.206177","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38489","18.206187","172.30.1.205","172.30.1.104","TCP","54","38442 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38490","18.207177","172.30.1.205","172.30.1.104","TCP","74","45808 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921433 TSecr=0 WS=128" "38491","18.207592","172.30.1.104","172.30.1.205","TCP","66","135 > 45808 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38492","18.207603","172.30.1.205","172.30.1.104","TCP","54","45808 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38493","18.207951","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38494","18.208271","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38495","18.208280","172.30.1.205","172.30.1.104","TCP","54","45808 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38496","18.210507","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38497","18.210942","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38498","18.210948","172.30.1.205","172.30.1.104","TCP","54","45808 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38499","18.212758","172.30.1.205","172.30.1.104","TCP","54","45808 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38500","18.212897","172.30.1.205","172.30.1.104","TCP","74","38446 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921439 TSecr=0 WS=128" "38501","18.213085","172.30.1.104","172.30.1.205","TCP","54","135 > 45808 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38502","18.213095","172.30.1.104","172.30.1.205","TCP","54","135 > 45808 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38503","18.213101","172.30.1.205","172.30.1.104","TCP","54","45808 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38504","18.213225","172.30.1.104","172.30.1.205","TCP","66","49671 > 38446 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38505","18.213233","172.30.1.205","172.30.1.104","TCP","54","38446 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38506","18.213579","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38507","18.213874","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38508","18.213886","172.30.1.205","172.30.1.104","TCP","54","38446 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38509","18.216071","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38510","18.216430","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38511","18.216436","172.30.1.205","172.30.1.104","TCP","54","38446 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38512","18.217818","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38513","18.220827","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38514","18.220837","172.30.1.205","172.30.1.104","TCP","54","38446 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38515","18.221858","172.30.1.205","172.30.1.104","TCP","74","45812 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921448 TSecr=0 WS=128" "38516","18.222166","172.30.1.104","172.30.1.205","TCP","66","135 > 45812 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38517","18.222177","172.30.1.205","172.30.1.104","TCP","54","45812 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38518","18.222543","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38519","18.222807","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38520","18.222816","172.30.1.205","172.30.1.104","TCP","54","45812 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38521","18.225067","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38522","18.225448","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38523","18.225455","172.30.1.205","172.30.1.104","TCP","54","45812 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38524","18.227259","172.30.1.205","172.30.1.104","TCP","54","45812 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38525","18.227372","172.30.1.205","172.30.1.104","TCP","74","38450 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921453 TSecr=0 WS=128" "38526","18.227579","172.30.1.104","172.30.1.205","TCP","54","135 > 45812 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38527","18.227592","172.30.1.104","172.30.1.205","TCP","54","135 > 45812 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38528","18.227599","172.30.1.205","172.30.1.104","TCP","54","45812 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38529","18.227672","172.30.1.104","172.30.1.205","TCP","66","49671 > 38450 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38530","18.227681","172.30.1.205","172.30.1.104","TCP","54","38450 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38531","18.228021","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38532","18.228974","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38533","18.228983","172.30.1.205","172.30.1.104","TCP","54","38450 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38534","18.230859","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38535","18.231266","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38536","18.231273","172.30.1.205","172.30.1.104","TCP","54","38450 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38537","18.232633","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38538","18.235770","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38539","18.235780","172.30.1.205","172.30.1.104","TCP","54","38450 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38540","18.236769","172.30.1.205","172.30.1.104","TCP","74","45816 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921463 TSecr=0 WS=128" "38541","18.237160","172.30.1.104","172.30.1.205","TCP","66","135 > 45816 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38542","18.237171","172.30.1.205","172.30.1.104","TCP","54","45816 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38543","18.237526","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38544","18.237864","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38545","18.237873","172.30.1.205","172.30.1.104","TCP","54","45816 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38546","18.240075","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38547","18.240532","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38548","18.240539","172.30.1.205","172.30.1.104","TCP","54","45816 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38549","18.242375","172.30.1.205","172.30.1.104","TCP","54","45816 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38550","18.242493","172.30.1.205","172.30.1.104","TCP","74","38454 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921468 TSecr=0 WS=128" "38551","18.242668","172.30.1.104","172.30.1.205","TCP","54","135 > 45816 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38552","18.242716","172.30.1.104","172.30.1.205","TCP","54","135 > 45816 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38553","18.242723","172.30.1.205","172.30.1.104","TCP","54","45816 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38554","18.242808","172.30.1.104","172.30.1.205","TCP","66","49671 > 38454 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38555","18.242817","172.30.1.205","172.30.1.104","TCP","54","38454 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38556","18.243161","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38557","18.244737","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38558","18.244745","172.30.1.205","172.30.1.104","TCP","54","38454 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38559","18.246616","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38560","18.247055","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38561","18.247062","172.30.1.205","172.30.1.104","TCP","54","38454 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38562","18.248415","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38563","18.251495","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38564","18.251505","172.30.1.205","172.30.1.104","TCP","54","38454 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38565","18.252463","172.30.1.205","172.30.1.104","TCP","74","45820 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921478 TSecr=0 WS=128" "38566","18.252772","172.30.1.104","172.30.1.205","TCP","66","135 > 45820 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38567","18.252793","172.30.1.205","172.30.1.104","TCP","54","45820 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38568","18.253153","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38569","18.253423","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38570","18.253432","172.30.1.205","172.30.1.104","TCP","54","45820 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38571","18.255625","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38572","18.256049","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38573","18.256055","172.30.1.205","172.30.1.104","TCP","54","45820 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38574","18.257881","172.30.1.205","172.30.1.104","TCP","54","45820 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38575","18.257994","172.30.1.205","172.30.1.104","TCP","74","38458 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921484 TSecr=0 WS=128" "38576","18.258173","172.30.1.104","172.30.1.205","TCP","54","135 > 45820 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38577","18.258183","172.30.1.104","172.30.1.205","TCP","54","135 > 45820 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38578","18.258190","172.30.1.205","172.30.1.104","TCP","54","45820 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38579","18.258280","172.30.1.104","172.30.1.205","TCP","66","49671 > 38458 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38580","18.258289","172.30.1.205","172.30.1.104","TCP","54","38458 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38581","18.258634","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38582","18.258926","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38583","18.258935","172.30.1.205","172.30.1.104","TCP","54","38458 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38584","18.260834","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38585","18.261200","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38586","18.261206","172.30.1.205","172.30.1.104","TCP","54","38458 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38587","18.262554","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38588","18.265587","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38589","18.265597","172.30.1.205","172.30.1.104","TCP","54","38458 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38590","18.266539","172.30.1.205","172.30.1.104","TCP","74","45824 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921492 TSecr=0 WS=128" "38591","18.266812","172.30.1.104","172.30.1.205","TCP","66","135 > 45824 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38592","18.266823","172.30.1.205","172.30.1.104","TCP","54","45824 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38593","18.267174","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38594","18.267473","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38595","18.267482","172.30.1.205","172.30.1.104","TCP","54","45824 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38596","18.269690","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38597","18.270090","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38598","18.270097","172.30.1.205","172.30.1.104","TCP","54","45824 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38599","18.271908","172.30.1.205","172.30.1.104","TCP","54","45824 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38600","18.272021","172.30.1.205","172.30.1.104","TCP","74","38462 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921498 TSecr=0 WS=128" "38601","18.272178","172.30.1.104","172.30.1.205","TCP","54","135 > 45824 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38602","18.272188","172.30.1.104","172.30.1.205","TCP","54","135 > 45824 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38603","18.272194","172.30.1.205","172.30.1.104","TCP","54","45824 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38604","18.274544","172.30.1.104","172.30.1.205","TCP","66","49671 > 38462 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38605","18.274552","172.30.1.205","172.30.1.104","TCP","54","38462 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38606","18.274903","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38607","18.275242","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38608","18.275252","172.30.1.205","172.30.1.104","TCP","54","38462 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38609","18.277162","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38610","18.277534","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38611","18.277541","172.30.1.205","172.30.1.104","TCP","54","38462 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38612","18.278897","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38613","18.282013","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38614","18.282024","172.30.1.205","172.30.1.104","TCP","54","38462 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38615","18.282982","172.30.1.205","172.30.1.104","TCP","74","45828 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921509 TSecr=0 WS=128" "38616","18.283296","172.30.1.104","172.30.1.205","TCP","66","135 > 45828 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38617","18.283307","172.30.1.205","172.30.1.104","TCP","54","45828 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38618","18.283663","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38619","18.283979","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38620","18.283988","172.30.1.205","172.30.1.104","TCP","54","45828 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38621","18.286196","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38622","18.286606","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38623","18.286613","172.30.1.205","172.30.1.104","TCP","54","45828 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38624","18.288419","172.30.1.205","172.30.1.104","TCP","54","45828 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38625","18.288531","172.30.1.205","172.30.1.104","TCP","74","38466 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921514 TSecr=0 WS=128" "38626","18.288703","172.30.1.104","172.30.1.205","TCP","54","135 > 45828 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38627","18.288742","172.30.1.104","172.30.1.205","TCP","54","135 > 45828 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38628","18.288748","172.30.1.205","172.30.1.104","TCP","54","45828 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38629","18.288852","172.30.1.104","172.30.1.205","TCP","66","49671 > 38466 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38630","18.288861","172.30.1.205","172.30.1.104","TCP","54","38466 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38631","18.289219","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38632","18.289530","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38633","18.289538","172.30.1.205","172.30.1.104","TCP","54","38466 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38634","18.291398","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38635","18.291806","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38636","18.291812","172.30.1.205","172.30.1.104","TCP","54","38466 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38637","18.293185","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38638","18.296358","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38639","18.296368","172.30.1.205","172.30.1.104","TCP","54","38466 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38640","18.297323","172.30.1.205","172.30.1.104","TCP","74","45832 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921523 TSecr=0 WS=128" "38641","18.297679","172.30.1.104","172.30.1.205","TCP","66","135 > 45832 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38642","18.297689","172.30.1.205","172.30.1.104","TCP","54","45832 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38643","18.298052","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38644","18.298382","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38645","18.298391","172.30.1.205","172.30.1.104","TCP","54","45832 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38646","18.300561","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38647","18.301023","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38648","18.301031","172.30.1.205","172.30.1.104","TCP","54","45832 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38649","18.301876","172.30.1.205","172.30.1.104","TCP","54","38426 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38650","18.301931","172.30.1.205","172.30.1.104","TCP","54","38430 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38651","18.301961","172.30.1.205","172.30.1.104","TCP","54","38434 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38652","18.301985","172.30.1.205","172.30.1.104","TCP","54","38438 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38653","18.302012","172.30.1.205","172.30.1.104","TCP","54","38442 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38654","18.302038","172.30.1.205","172.30.1.104","TCP","54","38446 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38655","18.302063","172.30.1.205","172.30.1.104","TCP","54","38450 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38656","18.302089","172.30.1.205","172.30.1.104","TCP","54","38454 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38657","18.302117","172.30.1.205","172.30.1.104","TCP","54","38458 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38658","18.302143","172.30.1.205","172.30.1.104","TCP","54","38462 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38659","18.302170","172.30.1.205","172.30.1.104","TCP","54","38466 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38660","18.302239","172.30.1.205","172.30.1.104","TCP","54","38422 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38661","18.302243","172.30.1.104","172.30.1.205","TCP","54","49671 > 38426 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38662","18.302270","172.30.1.104","172.30.1.205","TCP","54","49671 > 38430 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38663","18.302500","172.30.1.104","172.30.1.205","TCP","54","49671 > 38426 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38664","18.302508","172.30.1.205","172.30.1.104","TCP","54","38426 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38665","18.302547","172.30.1.104","172.30.1.205","TCP","54","49671 > 38430 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38666","18.302552","172.30.1.205","172.30.1.104","TCP","54","38430 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38667","18.302576","172.30.1.104","172.30.1.205","TCP","54","49671 > 38434 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38668","18.302608","172.30.1.104","172.30.1.205","TCP","54","49671 > 38438 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38669","18.302637","172.30.1.104","172.30.1.205","TCP","54","49671 > 38442 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38670","18.302667","172.30.1.104","172.30.1.205","TCP","54","49671 > 38446 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38671","18.302695","172.30.1.104","172.30.1.205","TCP","54","49671 > 38450 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38672","18.302725","172.30.1.104","172.30.1.205","TCP","54","49671 > 38450 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38673","18.302731","172.30.1.205","172.30.1.104","TCP","54","38450 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38674","18.302755","172.30.1.104","172.30.1.205","TCP","54","49671 > 38446 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38675","18.302757","172.30.1.205","172.30.1.104","TCP","54","38446 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38676","18.302794","172.30.1.104","172.30.1.205","TCP","54","49671 > 38434 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38677","18.302796","172.30.1.205","172.30.1.104","TCP","54","38434 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38678","18.302821","172.30.1.104","172.30.1.205","TCP","54","49671 > 38438 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38679","18.302824","172.30.1.205","172.30.1.104","TCP","54","38438 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38680","18.302852","172.30.1.104","172.30.1.205","TCP","54","49671 > 38442 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38681","18.302855","172.30.1.205","172.30.1.104","TCP","54","38442 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38682","18.302882","172.30.1.104","172.30.1.205","TCP","54","49671 > 38454 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38683","18.302911","172.30.1.104","172.30.1.205","TCP","54","49671 > 38458 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38684","18.302951","172.30.1.104","172.30.1.205","TCP","54","49671 > 38462 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38685","18.302978","172.30.1.104","172.30.1.205","TCP","54","49671 > 38422 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38686","18.303015","172.30.1.104","172.30.1.205","TCP","54","49671 > 38466 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38687","18.303052","172.30.1.104","172.30.1.205","TCP","54","49671 > 38466 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38688","18.303056","172.30.1.205","172.30.1.104","TCP","54","38466 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38689","18.303088","172.30.1.104","172.30.1.205","TCP","54","49671 > 38422 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38690","18.303091","172.30.1.205","172.30.1.104","TCP","54","38422 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38691","18.303125","172.30.1.104","172.30.1.205","TCP","54","49671 > 38454 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38692","18.303127","172.30.1.205","172.30.1.104","TCP","54","38454 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38693","18.303161","172.30.1.104","172.30.1.205","TCP","54","49671 > 38458 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38694","18.303164","172.30.1.205","172.30.1.104","TCP","54","38458 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38695","18.303197","172.30.1.104","172.30.1.205","TCP","54","49671 > 38462 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "38696","18.303200","172.30.1.205","172.30.1.104","TCP","54","38462 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "38697","18.303856","172.30.1.205","172.30.1.104","TCP","54","45832 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38698","18.303968","172.30.1.205","172.30.1.104","TCP","74","38470 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921530 TSecr=0 WS=128" "38699","18.304138","172.30.1.104","172.30.1.205","TCP","54","135 > 45832 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38700","18.304175","172.30.1.104","172.30.1.205","TCP","54","135 > 45832 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38701","18.304180","172.30.1.205","172.30.1.104","TCP","54","45832 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38702","18.304294","172.30.1.104","172.30.1.205","TCP","66","49671 > 38470 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38703","18.304302","172.30.1.205","172.30.1.104","TCP","54","38470 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38704","18.304660","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38705","18.304977","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38706","18.304985","172.30.1.205","172.30.1.104","TCP","54","38470 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38707","18.306867","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38708","18.307257","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38709","18.307263","172.30.1.205","172.30.1.104","TCP","54","38470 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38710","18.308618","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38711","18.311764","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38712","18.311773","172.30.1.205","172.30.1.104","TCP","54","38470 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38713","18.312707","172.30.1.205","172.30.1.104","TCP","74","45836 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921539 TSecr=0 WS=128" "38714","18.313048","172.30.1.104","172.30.1.205","TCP","66","135 > 45836 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38715","18.313059","172.30.1.205","172.30.1.104","TCP","54","45836 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38716","18.313413","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38717","18.313711","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38718","18.313720","172.30.1.205","172.30.1.104","TCP","54","45836 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38719","18.315895","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38720","18.316358","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38721","18.316365","172.30.1.205","172.30.1.104","TCP","54","45836 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38722","18.318178","172.30.1.205","172.30.1.104","TCP","54","45836 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38723","18.318289","172.30.1.205","172.30.1.104","TCP","74","38474 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921544 TSecr=0 WS=128" "38724","18.318439","172.30.1.104","172.30.1.205","TCP","54","135 > 45836 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38725","18.318467","172.30.1.104","172.30.1.205","TCP","54","135 > 45836 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38726","18.318472","172.30.1.205","172.30.1.104","TCP","54","45836 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38727","18.318565","172.30.1.104","172.30.1.205","TCP","66","49671 > 38474 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38728","18.318573","172.30.1.205","172.30.1.104","TCP","54","38474 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38729","18.318915","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38730","18.319199","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38731","18.319208","172.30.1.205","172.30.1.104","TCP","54","38474 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38732","18.321095","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38733","18.321748","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38734","18.321752","172.30.1.205","172.30.1.104","TCP","54","38474 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38735","18.323094","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38736","18.326220","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38737","18.326231","172.30.1.205","172.30.1.104","TCP","54","38474 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38738","18.327184","172.30.1.205","172.30.1.104","TCP","74","45840 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921553 TSecr=0 WS=128" "38739","18.327513","172.30.1.104","172.30.1.205","TCP","66","135 > 45840 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38740","18.327524","172.30.1.205","172.30.1.104","TCP","54","45840 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38741","18.327881","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38742","18.328191","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38743","18.328200","172.30.1.205","172.30.1.104","TCP","54","45840 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38744","18.330419","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38745","18.330851","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38746","18.330857","172.30.1.205","172.30.1.104","TCP","54","45840 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38747","18.332667","172.30.1.205","172.30.1.104","TCP","54","45840 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38748","18.332805","172.30.1.205","172.30.1.104","TCP","74","38478 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921559 TSecr=0 WS=128" "38749","18.332956","172.30.1.104","172.30.1.205","TCP","54","135 > 45840 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38750","18.332992","172.30.1.104","172.30.1.205","TCP","54","135 > 45840 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38751","18.332998","172.30.1.205","172.30.1.104","TCP","54","45840 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38752","18.333107","172.30.1.104","172.30.1.205","TCP","66","49671 > 38478 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38753","18.333115","172.30.1.205","172.30.1.104","TCP","54","38478 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38754","18.333475","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38755","18.333807","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38756","18.333816","172.30.1.205","172.30.1.104","TCP","54","38478 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38757","18.335678","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38758","18.336094","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38759","18.336100","172.30.1.205","172.30.1.104","TCP","54","38478 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38760","18.337475","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38761","18.340772","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38762","18.340793","172.30.1.205","172.30.1.104","TCP","54","38478 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38763","18.341767","172.30.1.205","172.30.1.104","TCP","74","45844 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921568 TSecr=0 WS=128" "38764","18.342090","172.30.1.104","172.30.1.205","TCP","66","135 > 45844 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38765","18.342102","172.30.1.205","172.30.1.104","TCP","54","45844 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38766","18.342464","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38767","18.342750","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38768","18.342758","172.30.1.205","172.30.1.104","TCP","54","45844 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38769","18.344980","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38770","18.345375","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38771","18.345381","172.30.1.205","172.30.1.104","TCP","54","45844 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38772","18.347208","172.30.1.205","172.30.1.104","TCP","54","45844 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38773","18.347320","172.30.1.205","172.30.1.104","TCP","74","38482 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921573 TSecr=0 WS=128" "38774","18.347475","172.30.1.104","172.30.1.205","TCP","54","135 > 45844 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38775","18.347486","172.30.1.104","172.30.1.205","TCP","54","135 > 45844 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38776","18.347493","172.30.1.205","172.30.1.104","TCP","54","45844 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38777","18.347584","172.30.1.104","172.30.1.205","TCP","66","49671 > 38482 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38778","18.347593","172.30.1.205","172.30.1.104","TCP","54","38482 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38779","18.347939","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38780","18.348225","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38781","18.348234","172.30.1.205","172.30.1.104","TCP","54","38482 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38782","18.350160","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38783","18.350516","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38784","18.350522","172.30.1.205","172.30.1.104","TCP","54","38482 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38785","18.351873","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38786","18.355043","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38787","18.355053","172.30.1.205","172.30.1.104","TCP","54","38482 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38788","18.355995","172.30.1.205","172.30.1.104","TCP","74","45848 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921582 TSecr=0 WS=128" "38789","18.356308","172.30.1.104","172.30.1.205","TCP","66","135 > 45848 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38790","18.356319","172.30.1.205","172.30.1.104","TCP","54","45848 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38791","18.356665","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38792","18.356945","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38793","18.356955","172.30.1.205","172.30.1.104","TCP","54","45848 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38794","18.359144","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38795","18.359594","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38796","18.359601","172.30.1.205","172.30.1.104","TCP","54","45848 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38797","18.361441","172.30.1.205","172.30.1.104","TCP","54","45848 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38798","18.361553","172.30.1.205","172.30.1.104","TCP","74","38486 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921587 TSecr=0 WS=128" "38799","18.361697","172.30.1.104","172.30.1.205","TCP","54","135 > 45848 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38800","18.361708","172.30.1.104","172.30.1.205","TCP","54","135 > 45848 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38801","18.361713","172.30.1.205","172.30.1.104","TCP","54","45848 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38802","18.361843","172.30.1.104","172.30.1.205","TCP","66","49671 > 38486 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38803","18.361851","172.30.1.205","172.30.1.104","TCP","54","38486 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38804","18.362202","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38805","18.362499","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38806","18.362507","172.30.1.205","172.30.1.104","TCP","54","38486 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38807","18.364371","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38808","18.364723","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38809","18.364729","172.30.1.205","172.30.1.104","TCP","54","38486 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38810","18.366113","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38811","18.369213","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38812","18.369223","172.30.1.205","172.30.1.104","TCP","54","38486 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38813","18.370274","172.30.1.205","172.30.1.104","TCP","74","45852 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921596 TSecr=0 WS=128" "38814","18.370569","172.30.1.104","172.30.1.205","TCP","66","135 > 45852 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38815","18.370586","172.30.1.205","172.30.1.104","TCP","54","45852 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38816","18.370991","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38817","18.371339","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38818","18.371348","172.30.1.205","172.30.1.104","TCP","54","45852 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38819","18.373602","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38820","18.374020","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38821","18.374026","172.30.1.205","172.30.1.104","TCP","54","45852 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38822","18.375864","172.30.1.205","172.30.1.104","TCP","54","45852 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38823","18.375981","172.30.1.205","172.30.1.104","TCP","74","38490 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921602 TSecr=0 WS=128" "38824","18.376112","172.30.1.104","172.30.1.205","TCP","54","135 > 45852 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38825","18.376163","172.30.1.104","172.30.1.205","TCP","54","135 > 45852 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38826","18.376169","172.30.1.205","172.30.1.104","TCP","54","45852 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38827","18.376237","172.30.1.104","172.30.1.205","TCP","66","49671 > 38490 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38828","18.376245","172.30.1.205","172.30.1.104","TCP","54","38490 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38829","18.376591","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38830","18.376868","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38831","18.376878","172.30.1.205","172.30.1.104","TCP","54","38490 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38832","18.378785","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38833","18.379152","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38834","18.379159","172.30.1.205","172.30.1.104","TCP","54","38490 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38835","18.380522","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38836","18.383580","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38837","18.383590","172.30.1.205","172.30.1.104","TCP","54","38490 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38838","18.384562","172.30.1.205","172.30.1.104","TCP","74","45856 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921610 TSecr=0 WS=128" "38839","18.384844","172.30.1.104","172.30.1.205","TCP","66","135 > 45856 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38840","18.384855","172.30.1.205","172.30.1.104","TCP","54","45856 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38841","18.385216","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38842","18.385501","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38843","18.385510","172.30.1.205","172.30.1.104","TCP","54","45856 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38844","18.387706","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38845","18.388106","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38846","18.388113","172.30.1.205","172.30.1.104","TCP","54","45856 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38847","18.389957","172.30.1.205","172.30.1.104","TCP","54","45856 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38848","18.390069","172.30.1.205","172.30.1.104","TCP","74","38494 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921616 TSecr=0 WS=128" "38849","18.390214","172.30.1.104","172.30.1.205","TCP","54","135 > 45856 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38850","18.390258","172.30.1.104","172.30.1.205","TCP","54","135 > 45856 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38851","18.390264","172.30.1.205","172.30.1.104","TCP","54","45856 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38852","18.390355","172.30.1.104","172.30.1.205","TCP","66","49671 > 38494 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38853","18.390364","172.30.1.205","172.30.1.104","TCP","54","38494 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38854","18.390725","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38855","18.391039","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38856","18.391048","172.30.1.205","172.30.1.104","TCP","54","38494 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38857","18.392944","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38858","18.393380","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38859","18.393387","172.30.1.205","172.30.1.104","TCP","54","38494 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38860","18.394752","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38861","18.398094","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38862","18.398104","172.30.1.205","172.30.1.104","TCP","54","38494 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38863","18.399051","172.30.1.205","172.30.1.104","TCP","74","45860 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921625 TSecr=0 WS=128" "38864","18.399404","172.30.1.104","172.30.1.205","TCP","66","135 > 45860 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38865","18.399415","172.30.1.205","172.30.1.104","TCP","54","45860 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38866","18.399765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38867","18.400076","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38868","18.400085","172.30.1.205","172.30.1.104","TCP","54","45860 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38869","18.402341","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38870","18.402842","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38871","18.402849","172.30.1.205","172.30.1.104","TCP","54","45860 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38872","18.404670","172.30.1.205","172.30.1.104","TCP","54","45860 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38873","18.404808","172.30.1.205","172.30.1.104","TCP","74","38498 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921631 TSecr=0 WS=128" "38874","18.404968","172.30.1.104","172.30.1.205","TCP","54","135 > 45860 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38875","18.404979","172.30.1.104","172.30.1.205","TCP","54","135 > 45860 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38876","18.404984","172.30.1.205","172.30.1.104","TCP","54","45860 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38877","18.405124","172.30.1.104","172.30.1.205","TCP","66","49671 > 38498 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38878","18.405133","172.30.1.205","172.30.1.104","TCP","54","38498 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38879","18.405487","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38880","18.405880","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38881","18.405889","172.30.1.205","172.30.1.104","TCP","54","38498 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38882","18.407776","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38883","18.408186","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38884","18.408192","172.30.1.205","172.30.1.104","TCP","54","38498 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38885","18.409592","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38886","18.412740","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38887","18.412750","172.30.1.205","172.30.1.104","TCP","54","38498 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38888","18.413703","172.30.1.205","172.30.1.104","TCP","74","45864 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921640 TSecr=0 WS=128" "38889","18.414059","172.30.1.104","172.30.1.205","TCP","66","135 > 45864 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38890","18.414070","172.30.1.205","172.30.1.104","TCP","54","45864 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38891","18.414423","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38892","18.414756","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38893","18.414766","172.30.1.205","172.30.1.104","TCP","54","45864 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38894","18.416968","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38895","18.417444","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38896","18.417451","172.30.1.205","172.30.1.104","TCP","54","45864 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38897","18.419255","172.30.1.205","172.30.1.104","TCP","54","45864 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38898","18.419367","172.30.1.205","172.30.1.104","TCP","74","38502 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921645 TSecr=0 WS=128" "38899","18.419561","172.30.1.104","172.30.1.205","TCP","54","135 > 45864 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38900","18.419590","172.30.1.104","172.30.1.205","TCP","54","135 > 45864 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38901","18.419596","172.30.1.205","172.30.1.104","TCP","54","45864 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38902","18.419706","172.30.1.104","172.30.1.205","TCP","66","49671 > 38502 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38903","18.419714","172.30.1.205","172.30.1.104","TCP","54","38502 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38904","18.420060","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38905","18.421539","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38906","18.421547","172.30.1.205","172.30.1.104","TCP","54","38502 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38907","18.423417","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38908","18.423832","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38909","18.423838","172.30.1.205","172.30.1.104","TCP","54","38502 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38910","18.425228","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38911","18.428423","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38912","18.428433","172.30.1.205","172.30.1.104","TCP","54","38502 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38913","18.429397","172.30.1.205","172.30.1.104","TCP","74","45868 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921655 TSecr=0 WS=128" "38914","18.429755","172.30.1.104","172.30.1.205","TCP","66","135 > 45868 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38915","18.429766","172.30.1.205","172.30.1.104","TCP","54","45868 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38916","18.430130","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38917","18.430452","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38918","18.430469","172.30.1.205","172.30.1.104","TCP","54","45868 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38919","18.432654","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38920","18.433100","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38921","18.433106","172.30.1.205","172.30.1.104","TCP","54","45868 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38922","18.434924","172.30.1.205","172.30.1.104","TCP","54","45868 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38923","18.435035","172.30.1.205","172.30.1.104","TCP","74","38506 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921661 TSecr=0 WS=128" "38924","18.435209","172.30.1.104","172.30.1.205","TCP","54","135 > 45868 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38925","18.435236","172.30.1.104","172.30.1.205","TCP","54","135 > 45868 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38926","18.435241","172.30.1.205","172.30.1.104","TCP","54","45868 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38927","18.435339","172.30.1.104","172.30.1.205","TCP","66","49671 > 38506 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38928","18.435347","172.30.1.205","172.30.1.104","TCP","54","38506 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38929","18.435693","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38930","18.435998","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38931","18.436006","172.30.1.205","172.30.1.104","TCP","54","38506 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38932","18.437904","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38933","18.438333","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38934","18.438338","172.30.1.205","172.30.1.104","TCP","54","38506 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38935","18.439692","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38936","18.443816","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38937","18.443835","172.30.1.205","172.30.1.104","TCP","54","38506 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38938","18.444909","172.30.1.205","172.30.1.104","TCP","74","45872 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921671 TSecr=0 WS=128" "38939","18.445338","172.30.1.104","172.30.1.205","TCP","66","135 > 45872 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38940","18.445350","172.30.1.205","172.30.1.104","TCP","54","45872 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38941","18.445711","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38942","18.446037","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38943","18.446047","172.30.1.205","172.30.1.104","TCP","54","45872 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38944","18.448244","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38945","18.448709","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38946","18.448715","172.30.1.205","172.30.1.104","TCP","54","45872 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38947","18.450525","172.30.1.205","172.30.1.104","TCP","54","45872 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38948","18.450639","172.30.1.205","172.30.1.104","TCP","74","38510 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921677 TSecr=0 WS=128" "38949","18.450820","172.30.1.104","172.30.1.205","TCP","54","135 > 45872 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38950","18.450847","172.30.1.104","172.30.1.205","TCP","54","135 > 45872 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38951","18.450853","172.30.1.205","172.30.1.104","TCP","54","45872 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38952","18.450953","172.30.1.104","172.30.1.205","TCP","66","49671 > 38510 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38953","18.450961","172.30.1.205","172.30.1.104","TCP","54","38510 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38954","18.451312","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38955","18.451632","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38956","18.451640","172.30.1.205","172.30.1.104","TCP","54","38510 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38957","18.453547","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38958","18.453956","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38959","18.453962","172.30.1.205","172.30.1.104","TCP","54","38510 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38960","18.455308","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38961","18.458386","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38962","18.458396","172.30.1.205","172.30.1.104","TCP","54","38510 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38963","18.459343","172.30.1.205","172.30.1.104","TCP","74","45876 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921685 TSecr=0 WS=128" "38964","18.459628","172.30.1.104","172.30.1.205","TCP","66","135 > 45876 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38965","18.459639","172.30.1.205","172.30.1.104","TCP","54","45876 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38966","18.459985","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38967","18.460264","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38968","18.460273","172.30.1.205","172.30.1.104","TCP","54","45876 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38969","18.462501","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38970","18.462904","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38971","18.462911","172.30.1.205","172.30.1.104","TCP","54","45876 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38972","18.464718","172.30.1.205","172.30.1.104","TCP","54","45876 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "38973","18.464864","172.30.1.205","172.30.1.104","TCP","74","38514 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921691 TSecr=0 WS=128" "38974","18.465001","172.30.1.104","172.30.1.205","TCP","54","135 > 45876 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38975","18.465011","172.30.1.104","172.30.1.205","TCP","54","135 > 45876 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "38976","18.465016","172.30.1.205","172.30.1.104","TCP","54","45876 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "38977","18.465154","172.30.1.104","172.30.1.205","TCP","66","49671 > 38514 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38978","18.465162","172.30.1.205","172.30.1.104","TCP","54","38514 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38979","18.465508","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "38980","18.465786","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38981","18.465795","172.30.1.205","172.30.1.104","TCP","54","38514 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38982","18.467656","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "38983","18.468030","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "38984","18.468036","172.30.1.205","172.30.1.104","TCP","54","38514 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "38985","18.469416","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "38986","18.472439","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "38987","18.472448","172.30.1.205","172.30.1.104","TCP","54","38514 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "38988","18.473428","172.30.1.205","172.30.1.104","TCP","74","45880 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921699 TSecr=0 WS=128" "38989","18.473738","172.30.1.104","172.30.1.205","TCP","66","135 > 45880 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "38990","18.473748","172.30.1.205","172.30.1.104","TCP","54","45880 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "38991","18.474121","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "38992","18.474437","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "38993","18.474446","172.30.1.205","172.30.1.104","TCP","54","45880 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "38994","18.476638","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "38995","18.477053","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "38996","18.477060","172.30.1.205","172.30.1.104","TCP","54","45880 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "38997","18.477920","172.30.1.205","172.30.1.104","TCP","54","38474 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38998","18.477971","172.30.1.205","172.30.1.104","TCP","54","38478 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "38999","18.478009","172.30.1.205","172.30.1.104","TCP","54","38482 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39000","18.478044","172.30.1.205","172.30.1.104","TCP","54","38486 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39001","18.478079","172.30.1.205","172.30.1.104","TCP","54","38490 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39002","18.478107","172.30.1.205","172.30.1.104","TCP","54","38494 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39003","18.478136","172.30.1.205","172.30.1.104","TCP","54","38498 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39004","18.478169","172.30.1.205","172.30.1.104","TCP","54","38502 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39005","18.478201","172.30.1.205","172.30.1.104","TCP","54","38506 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39006","18.478233","172.30.1.205","172.30.1.104","TCP","54","38510 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39007","18.478266","172.30.1.205","172.30.1.104","TCP","54","38514 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39008","18.478341","172.30.1.205","172.30.1.104","TCP","54","38470 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39009","18.478447","172.30.1.104","172.30.1.205","TCP","54","49671 > 38474 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39010","18.478475","172.30.1.104","172.30.1.205","TCP","54","49671 > 38478 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39011","18.478506","172.30.1.104","172.30.1.205","TCP","54","49671 > 38474 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39012","18.478514","172.30.1.205","172.30.1.104","TCP","54","38474 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39013","18.478526","172.30.1.104","172.30.1.205","TCP","54","49671 > 38482 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39014","18.478549","172.30.1.104","172.30.1.205","TCP","54","49671 > 38486 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39015","18.478568","172.30.1.104","172.30.1.205","TCP","54","49671 > 38490 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39016","18.478588","172.30.1.104","172.30.1.205","TCP","54","49671 > 38486 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39017","18.478592","172.30.1.205","172.30.1.104","TCP","54","38486 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39018","18.478607","172.30.1.104","172.30.1.205","TCP","54","49671 > 38494 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39019","18.478627","172.30.1.104","172.30.1.205","TCP","54","49671 > 38498 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39020","18.478646","172.30.1.104","172.30.1.205","TCP","54","49671 > 38498 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39021","18.478650","172.30.1.205","172.30.1.104","TCP","54","38498 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39022","18.478666","172.30.1.104","172.30.1.205","TCP","54","49671 > 38502 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39023","18.478685","172.30.1.104","172.30.1.205","TCP","54","49671 > 38494 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39024","18.478690","172.30.1.205","172.30.1.104","TCP","54","38494 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39025","18.478708","172.30.1.104","172.30.1.205","TCP","54","49671 > 38506 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39026","18.478813","172.30.1.104","172.30.1.205","TCP","54","49671 > 38490 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39027","18.478818","172.30.1.205","172.30.1.104","TCP","54","38490 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39028","18.478833","172.30.1.104","172.30.1.205","TCP","54","49671 > 38510 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39029","18.478855","172.30.1.104","172.30.1.205","TCP","54","49671 > 38510 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39030","18.478859","172.30.1.205","172.30.1.104","TCP","54","38510 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39031","18.478875","172.30.1.104","172.30.1.205","TCP","54","49671 > 38506 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39032","18.478878","172.30.1.205","172.30.1.104","TCP","54","38506 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39033","18.478898","172.30.1.104","172.30.1.205","TCP","54","49671 > 38502 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39034","18.478901","172.30.1.205","172.30.1.104","TCP","54","38502 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39035","18.478919","172.30.1.104","172.30.1.205","TCP","54","49671 > 38478 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39036","18.478923","172.30.1.205","172.30.1.104","TCP","54","38478 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39037","18.478936","172.30.1.104","172.30.1.205","TCP","54","49671 > 38482 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39038","18.478939","172.30.1.205","172.30.1.104","TCP","54","38482 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39039","18.479128","172.30.1.104","172.30.1.205","TCP","54","49671 > 38514 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39040","18.479135","172.30.1.104","172.30.1.205","TCP","54","49671 > 38470 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39041","18.479140","172.30.1.104","172.30.1.205","TCP","54","49671 > 38514 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39042","18.479145","172.30.1.205","172.30.1.104","TCP","54","38514 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39043","18.479150","172.30.1.104","172.30.1.205","TCP","54","49671 > 38470 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39044","18.479152","172.30.1.205","172.30.1.104","TCP","54","38470 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39045","18.479950","172.30.1.205","172.30.1.104","TCP","54","45880 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39046","18.480068","172.30.1.205","172.30.1.104","TCP","74","38518 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921706 TSecr=0 WS=128" "39047","18.480197","172.30.1.104","172.30.1.205","TCP","54","135 > 45880 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39048","18.480208","172.30.1.104","172.30.1.205","TCP","54","135 > 45880 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39049","18.480213","172.30.1.205","172.30.1.104","TCP","54","45880 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39050","18.480346","172.30.1.104","172.30.1.205","TCP","66","49671 > 38518 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39051","18.480355","172.30.1.205","172.30.1.104","TCP","54","38518 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39052","18.480711","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39053","18.481090","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39054","18.481106","172.30.1.205","172.30.1.104","TCP","54","38518 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39055","18.482988","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39056","18.483414","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39057","18.483421","172.30.1.205","172.30.1.104","TCP","54","38518 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39058","18.484805","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39059","18.487890","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39060","18.487900","172.30.1.205","172.30.1.104","TCP","54","38518 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39061","18.488887","172.30.1.205","172.30.1.104","TCP","74","45884 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921715 TSecr=0 WS=128" "39062","18.489173","172.30.1.104","172.30.1.205","TCP","66","135 > 45884 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39063","18.489185","172.30.1.205","172.30.1.104","TCP","54","45884 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39064","18.489544","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39065","18.489829","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39066","18.489846","172.30.1.205","172.30.1.104","TCP","54","45884 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39067","18.492041","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39068","18.492486","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39069","18.492492","172.30.1.205","172.30.1.104","TCP","54","45884 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39070","18.494336","172.30.1.205","172.30.1.104","TCP","54","45884 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39071","18.494450","172.30.1.205","172.30.1.104","TCP","74","38522 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921720 TSecr=0 WS=128" "39072","18.494621","172.30.1.104","172.30.1.205","TCP","54","135 > 45884 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39073","18.494647","172.30.1.104","172.30.1.205","TCP","54","135 > 45884 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39074","18.494654","172.30.1.205","172.30.1.104","TCP","54","45884 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39075","18.494748","172.30.1.104","172.30.1.205","TCP","66","49671 > 38522 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39076","18.494756","172.30.1.205","172.30.1.104","TCP","54","38522 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39077","18.495103","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39078","18.495510","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39079","18.495520","172.30.1.205","172.30.1.104","TCP","54","38522 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39080","18.497431","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39081","18.497856","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39082","18.497862","172.30.1.205","172.30.1.104","TCP","54","38522 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39083","18.499220","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39084","18.502318","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39085","18.502329","172.30.1.205","172.30.1.104","TCP","54","38522 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39086","18.503325","172.30.1.205","172.30.1.104","TCP","74","45888 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921729 TSecr=0 WS=128" "39087","18.503645","172.30.1.104","172.30.1.205","TCP","66","135 > 45888 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39088","18.503657","172.30.1.205","172.30.1.104","TCP","54","45888 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39089","18.504013","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39090","18.504320","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39091","18.504329","172.30.1.205","172.30.1.104","TCP","54","45888 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39092","18.506588","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39093","18.507006","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39094","18.507013","172.30.1.205","172.30.1.104","TCP","54","45888 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39095","18.508868","172.30.1.205","172.30.1.104","TCP","54","45888 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39096","18.508982","172.30.1.205","172.30.1.104","TCP","74","38526 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921735 TSecr=0 WS=128" "39097","18.509140","172.30.1.104","172.30.1.205","TCP","54","135 > 45888 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39098","18.509153","172.30.1.104","172.30.1.205","TCP","54","135 > 45888 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39099","18.509159","172.30.1.205","172.30.1.104","TCP","54","45888 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39100","18.509241","172.30.1.104","172.30.1.205","TCP","66","49671 > 38526 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39101","18.509250","172.30.1.205","172.30.1.104","TCP","54","38526 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39102","18.509615","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39103","18.509890","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39104","18.509902","172.30.1.205","172.30.1.104","TCP","54","38526 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39105","18.511784","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39106","18.512178","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39107","18.512185","172.30.1.205","172.30.1.104","TCP","54","38526 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39108","18.513580","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39109","18.516709","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39110","18.516721","172.30.1.205","172.30.1.104","TCP","54","38526 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39111","18.517750","172.30.1.205","172.30.1.104","TCP","74","45892 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921744 TSecr=0 WS=128" "39112","18.518064","172.30.1.104","172.30.1.205","TCP","66","135 > 45892 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39113","18.518075","172.30.1.205","172.30.1.104","TCP","54","45892 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39114","18.518436","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39115","18.518740","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39116","18.518749","172.30.1.205","172.30.1.104","TCP","54","45892 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39117","18.520990","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39118","18.521386","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39119","18.521393","172.30.1.205","172.30.1.104","TCP","54","45892 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39120","18.523226","172.30.1.205","172.30.1.104","TCP","54","45892 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39121","18.523342","172.30.1.205","172.30.1.104","TCP","74","38530 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921749 TSecr=0 WS=128" "39122","18.523479","172.30.1.104","172.30.1.205","TCP","54","135 > 45892 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39123","18.523513","172.30.1.104","172.30.1.205","TCP","54","135 > 45892 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39124","18.523519","172.30.1.205","172.30.1.104","TCP","54","45892 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39125","18.523677","172.30.1.104","172.30.1.205","TCP","66","49671 > 38530 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39126","18.523685","172.30.1.205","172.30.1.104","TCP","54","38530 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39127","18.524034","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39128","18.524308","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39129","18.524317","172.30.1.205","172.30.1.104","TCP","54","38530 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39130","18.526242","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39131","18.526644","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39132","18.526651","172.30.1.205","172.30.1.104","TCP","54","38530 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39133","18.528033","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39134","18.531119","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39135","18.531129","172.30.1.205","172.30.1.104","TCP","54","38530 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39136","18.532087","172.30.1.205","172.30.1.104","TCP","74","45896 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921758 TSecr=0 WS=128" "39137","18.532430","172.30.1.104","172.30.1.205","TCP","66","135 > 45896 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39138","18.532441","172.30.1.205","172.30.1.104","TCP","54","45896 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39139","18.532827","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39140","18.533134","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39141","18.533144","172.30.1.205","172.30.1.104","TCP","54","45896 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39142","18.535337","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39143","18.535745","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39144","18.535752","172.30.1.205","172.30.1.104","TCP","54","45896 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39145","18.537580","172.30.1.205","172.30.1.104","TCP","54","45896 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39146","18.537693","172.30.1.205","172.30.1.104","TCP","74","38534 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921764 TSecr=0 WS=128" "39147","18.537886","172.30.1.104","172.30.1.205","TCP","54","135 > 45896 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39148","18.537957","172.30.1.104","172.30.1.205","TCP","54","135 > 45896 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39149","18.537962","172.30.1.205","172.30.1.104","TCP","54","45896 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39150","18.538035","172.30.1.104","172.30.1.205","TCP","66","49671 > 38534 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39151","18.538043","172.30.1.205","172.30.1.104","TCP","54","38534 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39152","18.538404","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39153","18.538706","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39154","18.538714","172.30.1.205","172.30.1.104","TCP","54","38534 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39155","18.540568","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39156","18.540932","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39157","18.540939","172.30.1.205","172.30.1.104","TCP","54","38534 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39158","18.542306","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39159","18.546149","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39160","18.546159","172.30.1.205","172.30.1.104","TCP","54","38534 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39161","18.547102","172.30.1.205","172.30.1.104","TCP","74","45900 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921773 TSecr=0 WS=128" "39162","18.547448","172.30.1.104","172.30.1.205","TCP","66","135 > 45900 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39163","18.547460","172.30.1.205","172.30.1.104","TCP","54","45900 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39164","18.547814","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39165","18.548114","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39166","18.548123","172.30.1.205","172.30.1.104","TCP","54","45900 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39167","18.550334","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39168","18.550707","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39169","18.550713","172.30.1.205","172.30.1.104","TCP","54","45900 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39170","18.552556","172.30.1.205","172.30.1.104","TCP","54","45900 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39171","18.552668","172.30.1.205","172.30.1.104","TCP","74","38538 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921779 TSecr=0 WS=128" "39172","18.552833","172.30.1.104","172.30.1.205","TCP","54","135 > 45900 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39173","18.552864","172.30.1.104","172.30.1.205","TCP","54","135 > 45900 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39174","18.552870","172.30.1.205","172.30.1.104","TCP","54","45900 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39175","18.552936","172.30.1.104","172.30.1.205","TCP","66","49671 > 38538 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39176","18.552944","172.30.1.205","172.30.1.104","TCP","54","38538 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39177","18.553311","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39178","18.553629","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39179","18.553637","172.30.1.205","172.30.1.104","TCP","54","38538 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39180","18.555534","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39181","18.555945","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39182","18.555951","172.30.1.205","172.30.1.104","TCP","54","38538 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39183","18.557343","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39184","18.561588","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39185","18.561598","172.30.1.205","172.30.1.104","TCP","54","38538 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39186","18.562548","172.30.1.205","172.30.1.104","TCP","74","45904 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921788 TSecr=0 WS=128" "39187","18.562939","172.30.1.104","172.30.1.205","TCP","66","135 > 45904 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39188","18.562950","172.30.1.205","172.30.1.104","TCP","54","45904 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39189","18.563300","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39190","18.563593","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39191","18.563603","172.30.1.205","172.30.1.104","TCP","54","45904 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39192","18.565814","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39193","18.566220","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39194","18.566227","172.30.1.205","172.30.1.104","TCP","54","45904 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39195","18.568045","172.30.1.205","172.30.1.104","TCP","54","45904 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39196","18.568160","172.30.1.205","172.30.1.104","TCP","74","38542 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921794 TSecr=0 WS=128" "39197","18.568310","172.30.1.104","172.30.1.205","TCP","54","135 > 45904 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39198","18.568332","172.30.1.104","172.30.1.205","TCP","54","135 > 45904 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39199","18.568338","172.30.1.205","172.30.1.104","TCP","54","45904 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39200","18.568424","172.30.1.104","172.30.1.205","TCP","66","49671 > 38542 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39201","18.568432","172.30.1.205","172.30.1.104","TCP","54","38542 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39202","18.568805","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39203","18.569114","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39204","18.569124","172.30.1.205","172.30.1.104","TCP","54","38542 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39205","18.571020","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39206","18.571410","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39207","18.571418","172.30.1.205","172.30.1.104","TCP","54","38542 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39208","18.572818","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39209","18.576088","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39210","18.576097","172.30.1.205","172.30.1.104","TCP","54","38542 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39211","18.577070","172.30.1.205","172.30.1.104","TCP","74","45908 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921803 TSecr=0 WS=128" "39212","18.577437","172.30.1.104","172.30.1.205","TCP","66","135 > 45908 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39213","18.577448","172.30.1.205","172.30.1.104","TCP","54","45908 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39214","18.577801","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39215","18.578078","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39216","18.578087","172.30.1.205","172.30.1.104","TCP","54","45908 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39217","18.580270","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39218","18.580676","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39219","18.580683","172.30.1.205","172.30.1.104","TCP","54","45908 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39220","18.582503","172.30.1.205","172.30.1.104","TCP","54","45908 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39221","18.582615","172.30.1.205","172.30.1.104","TCP","74","38546 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921809 TSecr=0 WS=128" "39222","18.582860","172.30.1.104","172.30.1.205","TCP","54","135 > 45908 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39223","18.582902","172.30.1.104","172.30.1.205","TCP","54","135 > 45908 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39224","18.582907","172.30.1.205","172.30.1.104","TCP","54","45908 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39225","18.582915","172.30.1.104","172.30.1.205","TCP","66","49671 > 38546 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39226","18.582926","172.30.1.205","172.30.1.104","TCP","54","38546 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39227","18.583273","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39228","18.583572","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39229","18.583581","172.30.1.205","172.30.1.104","TCP","54","38546 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39230","18.585492","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39231","18.585851","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39232","18.585857","172.30.1.205","172.30.1.104","TCP","54","38546 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39233","18.587208","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39234","18.590357","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39235","18.590367","172.30.1.205","172.30.1.104","TCP","54","38546 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39236","18.591328","172.30.1.205","172.30.1.104","TCP","74","45912 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921817 TSecr=0 WS=128" "39237","18.591666","172.30.1.104","172.30.1.205","TCP","66","135 > 45912 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39238","18.591677","172.30.1.205","172.30.1.104","TCP","54","45912 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39239","18.592025","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39240","18.592309","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39241","18.592318","172.30.1.205","172.30.1.104","TCP","54","45912 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39242","18.594524","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39243","18.594984","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39244","18.594991","172.30.1.205","172.30.1.104","TCP","54","45912 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39245","18.596820","172.30.1.205","172.30.1.104","TCP","54","45912 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39246","18.596930","172.30.1.205","172.30.1.104","TCP","74","38550 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921823 TSecr=0 WS=128" "39247","18.597132","172.30.1.104","172.30.1.205","TCP","54","135 > 45912 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39248","18.597158","172.30.1.104","172.30.1.205","TCP","54","135 > 45912 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39249","18.597164","172.30.1.205","172.30.1.104","TCP","54","45912 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39250","18.597257","172.30.1.104","172.30.1.205","TCP","66","49671 > 38550 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39251","18.597265","172.30.1.205","172.30.1.104","TCP","54","38550 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39252","18.597612","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39253","18.597932","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39254","18.597941","172.30.1.205","172.30.1.104","TCP","54","38550 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39255","18.599812","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39256","18.600171","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39257","18.600178","172.30.1.205","172.30.1.104","TCP","54","38550 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39258","18.601546","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39259","18.604667","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39260","18.604676","172.30.1.205","172.30.1.104","TCP","54","38550 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39261","18.605632","172.30.1.205","172.30.1.104","TCP","74","45916 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921832 TSecr=0 WS=128" "39262","18.605939","172.30.1.104","172.30.1.205","TCP","66","135 > 45916 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39263","18.605950","172.30.1.205","172.30.1.104","TCP","54","45916 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39264","18.606303","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39265","18.606592","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39266","18.606602","172.30.1.205","172.30.1.104","TCP","54","45916 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39267","18.608767","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39268","18.609212","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39269","18.609219","172.30.1.205","172.30.1.104","TCP","54","45916 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39270","18.611018","172.30.1.205","172.30.1.104","TCP","54","45916 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39271","18.611130","172.30.1.205","172.30.1.104","TCP","74","38554 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921837 TSecr=0 WS=128" "39272","18.611326","172.30.1.104","172.30.1.205","TCP","54","135 > 45916 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39273","18.611337","172.30.1.104","172.30.1.205","TCP","54","135 > 45916 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39274","18.611343","172.30.1.205","172.30.1.104","TCP","54","45916 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39275","18.611408","172.30.1.104","172.30.1.205","TCP","66","49671 > 38554 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39276","18.611417","172.30.1.205","172.30.1.104","TCP","54","38554 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39277","18.611761","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39278","18.612048","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39279","18.612057","172.30.1.205","172.30.1.104","TCP","54","38554 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39280","18.613953","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39281","18.616520","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39282","18.616527","172.30.1.205","172.30.1.104","TCP","54","38554 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39283","18.617891","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39284","18.621049","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39285","18.621059","172.30.1.205","172.30.1.104","TCP","54","38554 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39286","18.621996","172.30.1.205","172.30.1.104","TCP","74","45920 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921848 TSecr=0 WS=128" "39287","18.622373","172.30.1.104","172.30.1.205","TCP","66","135 > 45920 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39288","18.622385","172.30.1.205","172.30.1.104","TCP","54","45920 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39289","18.622742","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39290","18.623032","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39291","18.623041","172.30.1.205","172.30.1.104","TCP","54","45920 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39292","18.625246","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39293","18.625645","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39294","18.625652","172.30.1.205","172.30.1.104","TCP","54","45920 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39295","18.627463","172.30.1.205","172.30.1.104","TCP","54","45920 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39296","18.627574","172.30.1.205","172.30.1.104","TCP","74","38558 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921853 TSecr=0 WS=128" "39297","18.627719","172.30.1.104","172.30.1.205","TCP","54","135 > 45920 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39298","18.627730","172.30.1.104","172.30.1.205","TCP","54","135 > 45920 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39299","18.627735","172.30.1.205","172.30.1.104","TCP","54","45920 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39300","18.627853","172.30.1.104","172.30.1.205","TCP","66","49671 > 38558 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39301","18.627861","172.30.1.205","172.30.1.104","TCP","54","38558 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39302","18.628207","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39303","18.628739","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39304","18.628746","172.30.1.205","172.30.1.104","TCP","54","38558 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39305","18.630643","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39306","18.631030","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39307","18.631037","172.30.1.205","172.30.1.104","TCP","54","38558 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39308","18.632383","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39309","18.635580","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39310","18.635589","172.30.1.205","172.30.1.104","TCP","54","38558 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39311","18.636549","172.30.1.205","172.30.1.104","TCP","74","45924 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921862 TSecr=0 WS=128" "39312","18.636853","172.30.1.104","172.30.1.205","TCP","66","135 > 45924 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39313","18.636865","172.30.1.205","172.30.1.104","TCP","54","45924 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39314","18.637226","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39315","18.637533","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39316","18.637542","172.30.1.205","172.30.1.104","TCP","54","45924 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39317","18.639735","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39318","18.640174","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39319","18.640181","172.30.1.205","172.30.1.104","TCP","54","45924 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39320","18.642019","172.30.1.205","172.30.1.104","TCP","54","45924 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39321","18.642135","172.30.1.205","172.30.1.104","TCP","74","38562 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921868 TSecr=0 WS=128" "39322","18.642291","172.30.1.104","172.30.1.205","TCP","54","135 > 45924 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39323","18.642302","172.30.1.104","172.30.1.205","TCP","54","135 > 45924 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39324","18.642308","172.30.1.205","172.30.1.104","TCP","54","45924 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39325","18.642409","172.30.1.104","172.30.1.205","TCP","66","49671 > 38562 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39326","18.642418","172.30.1.205","172.30.1.104","TCP","54","38562 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39327","18.642761","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39328","18.643059","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39329","18.643068","172.30.1.205","172.30.1.104","TCP","54","38562 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39330","18.644976","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39331","18.645338","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39332","18.645345","172.30.1.205","172.30.1.104","TCP","54","38562 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39333","18.646692","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39334","18.649824","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39335","18.649833","172.30.1.205","172.30.1.104","TCP","54","38562 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39336","18.650793","172.30.1.205","172.30.1.104","TCP","74","45928 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921877 TSecr=0 WS=128" "39337","18.651179","172.30.1.104","172.30.1.205","TCP","66","135 > 45928 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39338","18.651190","172.30.1.205","172.30.1.104","TCP","54","45928 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39339","18.651553","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39340","18.651843","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39341","18.651852","172.30.1.205","172.30.1.104","TCP","54","45928 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39342","18.654071","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39343","18.654451","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39344","18.654458","172.30.1.205","172.30.1.104","TCP","54","45928 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39345","18.655314","172.30.1.205","172.30.1.104","TCP","54","38522 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39346","18.655363","172.30.1.205","172.30.1.104","TCP","54","38526 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39347","18.655400","172.30.1.205","172.30.1.104","TCP","54","38530 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39348","18.655434","172.30.1.205","172.30.1.104","TCP","54","38534 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39349","18.655462","172.30.1.205","172.30.1.104","TCP","54","38538 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39350","18.655493","172.30.1.205","172.30.1.104","TCP","54","38542 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39351","18.655524","172.30.1.205","172.30.1.104","TCP","54","38546 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39352","18.655552","172.30.1.205","172.30.1.104","TCP","54","38550 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39353","18.655579","172.30.1.205","172.30.1.104","TCP","54","38554 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39354","18.655609","172.30.1.205","172.30.1.104","TCP","54","38558 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39355","18.655636","172.30.1.205","172.30.1.104","TCP","54","38562 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39356","18.655704","172.30.1.205","172.30.1.104","TCP","54","38518 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39357","18.655737","172.30.1.104","172.30.1.205","TCP","54","49671 > 38522 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39358","18.655756","172.30.1.104","172.30.1.205","TCP","54","49671 > 38526 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39359","18.655775","172.30.1.104","172.30.1.205","TCP","54","49671 > 38530 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39360","18.655801","172.30.1.104","172.30.1.205","TCP","54","49671 > 38522 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39361","18.655808","172.30.1.205","172.30.1.104","TCP","54","38522 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39362","18.655819","172.30.1.104","172.30.1.205","TCP","54","49671 > 38534 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39363","18.655838","172.30.1.104","172.30.1.205","TCP","54","49671 > 38538 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39364","18.655858","172.30.1.104","172.30.1.205","TCP","54","49671 > 38542 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39365","18.655877","172.30.1.104","172.30.1.205","TCP","54","49671 > 38546 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39366","18.655970","172.30.1.104","172.30.1.205","TCP","54","49671 > 38546 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39367","18.655976","172.30.1.205","172.30.1.104","TCP","54","38546 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39368","18.655989","172.30.1.104","172.30.1.205","TCP","54","49671 > 38550 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39369","18.656011","172.30.1.104","172.30.1.205","TCP","54","49671 > 38542 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39370","18.656014","172.30.1.205","172.30.1.104","TCP","54","38542 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39371","18.656030","172.30.1.104","172.30.1.205","TCP","54","49671 > 38538 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39372","18.656033","172.30.1.205","172.30.1.104","TCP","54","38538 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39373","18.656050","172.30.1.104","172.30.1.205","TCP","54","49671 > 38534 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39374","18.656053","172.30.1.205","172.30.1.104","TCP","54","38534 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39375","18.656069","172.30.1.104","172.30.1.205","TCP","54","49671 > 38550 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39376","18.656071","172.30.1.205","172.30.1.104","TCP","54","38550 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39377","18.656089","172.30.1.104","172.30.1.205","TCP","54","49671 > 38526 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39378","18.656092","172.30.1.205","172.30.1.104","TCP","54","38526 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39379","18.656108","172.30.1.104","172.30.1.205","TCP","54","49671 > 38530 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39380","18.656111","172.30.1.205","172.30.1.104","TCP","54","38530 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39381","18.656154","172.30.1.104","172.30.1.205","TCP","54","49671 > 38554 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39382","18.656343","172.30.1.104","172.30.1.205","TCP","54","49671 > 38558 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39383","18.656418","172.30.1.104","172.30.1.205","TCP","54","49671 > 38562 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39384","18.656436","172.30.1.104","172.30.1.205","TCP","54","49671 > 38554 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39385","18.656441","172.30.1.205","172.30.1.104","TCP","54","38554 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39386","18.656457","172.30.1.104","172.30.1.205","TCP","54","49671 > 38558 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39387","18.656459","172.30.1.205","172.30.1.104","TCP","54","38558 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39388","18.656480","172.30.1.104","172.30.1.205","TCP","54","49671 > 38562 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39389","18.656483","172.30.1.205","172.30.1.104","TCP","54","38562 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39390","18.656498","172.30.1.104","172.30.1.205","TCP","54","49671 > 38518 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39391","18.656519","172.30.1.104","172.30.1.205","TCP","54","49671 > 38518 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39392","18.656522","172.30.1.205","172.30.1.104","TCP","54","38518 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39393","18.657333","172.30.1.205","172.30.1.104","TCP","54","45928 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39394","18.657445","172.30.1.205","172.30.1.104","TCP","74","38566 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921883 TSecr=0 WS=128" "39395","18.657608","172.30.1.104","172.30.1.205","TCP","54","135 > 45928 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39396","18.657619","172.30.1.104","172.30.1.205","TCP","54","135 > 45928 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39397","18.657624","172.30.1.205","172.30.1.104","TCP","54","45928 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39398","18.657699","172.30.1.104","172.30.1.205","TCP","66","49671 > 38566 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39399","18.657706","172.30.1.205","172.30.1.104","TCP","54","38566 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39400","18.658065","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39401","18.658361","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39402","18.658370","172.30.1.205","172.30.1.104","TCP","54","38566 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39403","18.660238","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39404","18.660620","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39405","18.660626","172.30.1.205","172.30.1.104","TCP","54","38566 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39406","18.662021","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39407","18.665137","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39408","18.665146","172.30.1.205","172.30.1.104","TCP","54","38566 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39409","18.666094","172.30.1.205","172.30.1.104","TCP","74","45932 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921892 TSecr=0 WS=128" "39410","18.666417","172.30.1.104","172.30.1.205","TCP","66","135 > 45932 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39411","18.666428","172.30.1.205","172.30.1.104","TCP","54","45932 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39412","18.666777","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39413","18.667053","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39414","18.667061","172.30.1.205","172.30.1.104","TCP","54","45932 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39415","18.669258","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39416","18.669656","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39417","18.669663","172.30.1.205","172.30.1.104","TCP","54","45932 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39418","18.671458","172.30.1.205","172.30.1.104","TCP","54","45932 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39419","18.671571","172.30.1.205","172.30.1.104","TCP","74","38570 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921897 TSecr=0 WS=128" "39420","18.671782","172.30.1.104","172.30.1.205","TCP","54","135 > 45932 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39421","18.671793","172.30.1.104","172.30.1.205","TCP","54","135 > 45932 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39422","18.671798","172.30.1.205","172.30.1.104","TCP","54","45932 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39423","18.671873","172.30.1.104","172.30.1.205","TCP","66","49671 > 38570 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39424","18.671881","172.30.1.205","172.30.1.104","TCP","54","38570 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39425","18.672224","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39426","18.672497","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39427","18.672506","172.30.1.205","172.30.1.104","TCP","54","38570 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39428","18.674415","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39429","18.674774","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39430","18.674781","172.30.1.205","172.30.1.104","TCP","54","38570 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39431","18.676128","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39432","18.679280","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39433","18.679289","172.30.1.205","172.30.1.104","TCP","54","38570 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39434","18.680228","172.30.1.205","172.30.1.104","TCP","74","45936 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921906 TSecr=0 WS=128" "39435","18.680550","172.30.1.104","172.30.1.205","TCP","66","135 > 45936 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39436","18.680566","172.30.1.205","172.30.1.104","TCP","54","45936 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39437","18.680951","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39438","18.681298","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39439","18.681307","172.30.1.205","172.30.1.104","TCP","54","45936 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39440","18.683512","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39441","18.684010","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39442","18.684016","172.30.1.205","172.30.1.104","TCP","54","45936 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39443","18.685857","172.30.1.205","172.30.1.104","TCP","54","45936 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39444","18.685972","172.30.1.205","172.30.1.104","TCP","74","38574 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921912 TSecr=0 WS=128" "39445","18.686143","172.30.1.104","172.30.1.205","TCP","54","135 > 45936 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39446","18.686228","172.30.1.104","172.30.1.205","TCP","54","135 > 45936 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39447","18.686234","172.30.1.205","172.30.1.104","TCP","54","45936 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39448","18.686278","172.30.1.104","172.30.1.205","TCP","66","49671 > 38574 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39449","18.686286","172.30.1.205","172.30.1.104","TCP","54","38574 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39450","18.686630","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39451","18.686927","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39452","18.686934","172.30.1.205","172.30.1.104","TCP","54","38574 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39453","18.688852","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39454","18.689263","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39455","18.689270","172.30.1.205","172.30.1.104","TCP","54","38574 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39456","18.690629","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39457","18.693922","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39458","18.693932","172.30.1.205","172.30.1.104","TCP","54","38574 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39459","18.694914","172.30.1.205","172.30.1.104","TCP","74","45940 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921921 TSecr=0 WS=128" "39460","18.695299","172.30.1.104","172.30.1.205","TCP","66","135 > 45940 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39461","18.695309","172.30.1.205","172.30.1.104","TCP","54","45940 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39462","18.695661","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39463","18.695967","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39464","18.695976","172.30.1.205","172.30.1.104","TCP","54","45940 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39465","18.698213","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39466","18.698622","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39467","18.698629","172.30.1.205","172.30.1.104","TCP","54","45940 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39468","18.700452","172.30.1.205","172.30.1.104","TCP","54","45940 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39469","18.700566","172.30.1.205","172.30.1.104","TCP","74","38578 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921926 TSecr=0 WS=128" "39470","18.700745","172.30.1.104","172.30.1.205","TCP","54","135 > 45940 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39471","18.700756","172.30.1.104","172.30.1.205","TCP","54","135 > 45940 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39472","18.700762","172.30.1.205","172.30.1.104","TCP","54","45940 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39473","18.700883","172.30.1.104","172.30.1.205","TCP","66","49671 > 38578 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39474","18.700892","172.30.1.205","172.30.1.104","TCP","54","38578 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39475","18.701242","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39476","18.701542","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39477","18.701551","172.30.1.205","172.30.1.104","TCP","54","38578 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39478","18.703420","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39479","18.703829","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39480","18.703835","172.30.1.205","172.30.1.104","TCP","54","38578 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39481","18.705239","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39482","18.708428","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39483","18.708437","172.30.1.205","172.30.1.104","TCP","54","38578 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39484","18.709405","172.30.1.205","172.30.1.104","TCP","74","45944 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921935 TSecr=0 WS=128" "39485","18.709709","172.30.1.104","172.30.1.205","TCP","66","135 > 45944 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39486","18.709722","172.30.1.205","172.30.1.104","TCP","54","45944 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39487","18.710085","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39488","18.710359","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39489","18.710369","172.30.1.205","172.30.1.104","TCP","54","45944 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39490","18.712556","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39491","18.712990","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39492","18.712997","172.30.1.205","172.30.1.104","TCP","54","45944 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39493","18.714828","172.30.1.205","172.30.1.104","TCP","54","45944 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39494","18.714949","172.30.1.205","172.30.1.104","TCP","74","38582 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921941 TSecr=0 WS=128" "39495","18.715161","172.30.1.104","172.30.1.205","TCP","54","135 > 45944 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39496","18.715202","172.30.1.104","172.30.1.205","TCP","54","135 > 45944 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39497","18.715209","172.30.1.205","172.30.1.104","TCP","54","45944 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39498","18.715267","172.30.1.104","172.30.1.205","TCP","66","49671 > 38582 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39499","18.715275","172.30.1.205","172.30.1.104","TCP","54","38582 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39500","18.715620","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39501","18.715902","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39502","18.715909","172.30.1.205","172.30.1.104","TCP","54","38582 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39503","18.717801","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39504","18.718161","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39505","18.718168","172.30.1.205","172.30.1.104","TCP","54","38582 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39506","18.719517","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39507","18.722685","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39508","18.722696","172.30.1.205","172.30.1.104","TCP","54","38582 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39509","18.723671","172.30.1.205","172.30.1.104","TCP","74","45948 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921950 TSecr=0 WS=128" "39510","18.724010","172.30.1.104","172.30.1.205","TCP","66","135 > 45948 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39511","18.724021","172.30.1.205","172.30.1.104","TCP","54","45948 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39512","18.724375","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39513","18.724674","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39514","18.724683","172.30.1.205","172.30.1.104","TCP","54","45948 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39515","18.726893","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39516","18.727353","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39517","18.727360","172.30.1.205","172.30.1.104","TCP","54","45948 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39518","18.729199","172.30.1.205","172.30.1.104","TCP","54","45948 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39519","18.729310","172.30.1.205","172.30.1.104","TCP","74","38586 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921955 TSecr=0 WS=128" "39520","18.729500","172.30.1.104","172.30.1.205","TCP","54","135 > 45948 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39521","18.729541","172.30.1.104","172.30.1.205","TCP","54","135 > 45948 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39522","18.729546","172.30.1.205","172.30.1.104","TCP","54","45948 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39523","18.729633","172.30.1.104","172.30.1.205","TCP","66","49671 > 38586 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39524","18.729641","172.30.1.205","172.30.1.104","TCP","54","38586 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39525","18.730010","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39526","18.730294","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39527","18.730303","172.30.1.205","172.30.1.104","TCP","54","38586 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39528","18.732174","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39529","18.732617","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39530","18.732623","172.30.1.205","172.30.1.104","TCP","54","38586 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39531","18.734001","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39532","18.737247","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39533","18.737257","172.30.1.205","172.30.1.104","TCP","54","38586 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39534","18.738210","172.30.1.205","172.30.1.104","TCP","74","45952 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921964 TSecr=0 WS=128" "39535","18.738565","172.30.1.104","172.30.1.205","TCP","66","135 > 45952 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39536","18.738576","172.30.1.205","172.30.1.104","TCP","54","45952 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39537","18.738924","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39538","18.739221","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39539","18.739230","172.30.1.205","172.30.1.104","TCP","54","45952 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39540","18.741463","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39541","18.741959","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39542","18.741972","172.30.1.205","172.30.1.104","TCP","54","45952 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39543","18.744001","172.30.1.205","172.30.1.104","TCP","54","45952 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39544","18.744111","172.30.1.205","172.30.1.104","TCP","74","38590 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921970 TSecr=0 WS=128" "39545","18.744322","172.30.1.104","172.30.1.205","TCP","54","135 > 45952 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39546","18.744350","172.30.1.104","172.30.1.205","TCP","54","135 > 45952 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39547","18.744356","172.30.1.205","172.30.1.104","TCP","54","45952 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39548","18.744472","172.30.1.104","172.30.1.205","TCP","66","49671 > 38590 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39549","18.744481","172.30.1.205","172.30.1.104","TCP","54","38590 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39550","18.744857","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39551","18.745166","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39552","18.745174","172.30.1.205","172.30.1.104","TCP","54","38590 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39553","18.747090","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39554","18.747530","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39555","18.747537","172.30.1.205","172.30.1.104","TCP","54","38590 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39556","18.748942","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39557","18.751992","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39558","18.752001","172.30.1.205","172.30.1.104","TCP","54","38590 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39559","18.752952","172.30.1.205","172.30.1.104","TCP","74","45956 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921979 TSecr=0 WS=128" "39560","18.753292","172.30.1.104","172.30.1.205","TCP","66","135 > 45956 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39561","18.753304","172.30.1.205","172.30.1.104","TCP","54","45956 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39562","18.753664","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39563","18.753981","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39564","18.753998","172.30.1.205","172.30.1.104","TCP","54","45956 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39565","18.756386","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39566","18.756778","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39567","18.756785","172.30.1.205","172.30.1.104","TCP","54","45956 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39568","18.758645","172.30.1.205","172.30.1.104","TCP","54","45956 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39569","18.758768","172.30.1.205","172.30.1.104","TCP","74","38594 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921985 TSecr=0 WS=128" "39570","18.758970","172.30.1.104","172.30.1.205","TCP","54","135 > 45956 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39571","18.758985","172.30.1.104","172.30.1.205","TCP","54","135 > 45956 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39572","18.758992","172.30.1.205","172.30.1.104","TCP","54","45956 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39573","18.759246","172.30.1.104","172.30.1.205","TCP","66","49671 > 38594 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39574","18.759258","172.30.1.205","172.30.1.104","TCP","54","38594 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39575","18.759662","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39576","18.759990","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39577","18.759999","172.30.1.205","172.30.1.104","TCP","54","38594 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39578","18.761939","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39579","18.762314","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39580","18.762323","172.30.1.205","172.30.1.104","TCP","54","38594 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39581","18.763676","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39582","18.766824","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39583","18.766834","172.30.1.205","172.30.1.104","TCP","54","38594 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39584","18.767782","172.30.1.205","172.30.1.104","TCP","74","45960 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921994 TSecr=0 WS=128" "39585","18.768069","172.30.1.104","172.30.1.205","TCP","66","135 > 45960 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39586","18.768081","172.30.1.205","172.30.1.104","TCP","54","45960 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39587","18.768431","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39588","18.768703","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39589","18.768712","172.30.1.205","172.30.1.104","TCP","54","45960 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39590","18.770920","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39591","18.771348","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39592","18.771355","172.30.1.205","172.30.1.104","TCP","54","45960 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39593","18.773178","172.30.1.205","172.30.1.104","TCP","54","45960 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39594","18.773288","172.30.1.205","172.30.1.104","TCP","74","38598 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499921999 TSecr=0 WS=128" "39595","18.773457","172.30.1.104","172.30.1.205","TCP","54","135 > 45960 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39596","18.773478","172.30.1.104","172.30.1.205","TCP","54","135 > 45960 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39597","18.773487","172.30.1.205","172.30.1.104","TCP","54","45960 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39598","18.773561","172.30.1.104","172.30.1.205","TCP","66","49671 > 38598 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39599","18.773577","172.30.1.205","172.30.1.104","TCP","54","38598 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39600","18.773985","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39601","18.774285","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39602","18.774295","172.30.1.205","172.30.1.104","TCP","54","38598 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39603","18.776190","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39604","18.776602","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39605","18.776615","172.30.1.205","172.30.1.104","TCP","54","38598 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39606","18.778193","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39607","18.781351","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39608","18.781361","172.30.1.205","172.30.1.104","TCP","54","38598 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39609","18.782323","172.30.1.205","172.30.1.104","TCP","74","45964 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922008 TSecr=0 WS=128" "39610","18.782714","172.30.1.104","172.30.1.205","TCP","66","135 > 45964 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39611","18.782735","172.30.1.205","172.30.1.104","TCP","54","45964 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39612","18.783235","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39613","18.783551","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39614","18.783560","172.30.1.205","172.30.1.104","TCP","54","45964 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39615","18.785790","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39616","18.786258","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39617","18.786265","172.30.1.205","172.30.1.104","TCP","54","45964 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39618","18.788100","172.30.1.205","172.30.1.104","TCP","54","45964 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39619","18.788225","172.30.1.205","172.30.1.104","TCP","74","38602 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922014 TSecr=0 WS=128" "39620","18.788424","172.30.1.104","172.30.1.205","TCP","54","135 > 45964 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39621","18.788445","172.30.1.104","172.30.1.205","TCP","54","135 > 45964 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39622","18.788455","172.30.1.205","172.30.1.104","TCP","54","45964 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39623","18.788488","172.30.1.104","172.30.1.205","TCP","66","49671 > 38602 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39624","18.788509","172.30.1.205","172.30.1.104","TCP","54","38602 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39625","18.789068","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39626","18.789333","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39627","18.789342","172.30.1.205","172.30.1.104","TCP","54","38602 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39628","18.791218","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39629","18.792653","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39630","18.792660","172.30.1.205","172.30.1.104","TCP","54","38602 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39631","18.794027","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39632","18.797248","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39633","18.797259","172.30.1.205","172.30.1.104","TCP","54","38602 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39634","18.798203","172.30.1.205","172.30.1.104","TCP","74","45968 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922024 TSecr=0 WS=128" "39635","18.798519","172.30.1.104","172.30.1.205","TCP","66","135 > 45968 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39636","18.798530","172.30.1.205","172.30.1.104","TCP","54","45968 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39637","18.798888","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39638","18.799207","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39639","18.799216","172.30.1.205","172.30.1.104","TCP","54","45968 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39640","18.801433","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39641","18.801902","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39642","18.801908","172.30.1.205","172.30.1.104","TCP","54","45968 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39643","18.803716","172.30.1.205","172.30.1.104","TCP","54","45968 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39644","18.803829","172.30.1.205","172.30.1.104","TCP","74","38606 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922030 TSecr=0 WS=128" "39645","18.804136","172.30.1.104","172.30.1.205","TCP","66","49671 > 38606 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39646","18.804147","172.30.1.205","172.30.1.104","TCP","54","38606 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39647","18.804162","172.30.1.104","172.30.1.205","TCP","54","135 > 45968 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39648","18.804184","172.30.1.104","172.30.1.205","TCP","54","135 > 45968 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39649","18.804189","172.30.1.205","172.30.1.104","TCP","54","45968 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39650","18.804522","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39651","18.804811","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39652","18.804819","172.30.1.205","172.30.1.104","TCP","54","38606 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39653","18.806719","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39654","18.807087","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39655","18.807094","172.30.1.205","172.30.1.104","TCP","54","38606 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39656","18.808434","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39657","18.811681","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39658","18.811692","172.30.1.205","172.30.1.104","TCP","54","38606 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39659","18.812653","172.30.1.205","172.30.1.104","TCP","74","45972 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922039 TSecr=0 WS=128" "39660","18.813053","172.30.1.104","172.30.1.205","TCP","66","135 > 45972 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39661","18.813066","172.30.1.205","172.30.1.104","TCP","54","45972 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39662","18.813426","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39663","18.813796","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39664","18.813805","172.30.1.205","172.30.1.104","TCP","54","45972 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39665","18.816015","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39666","18.816454","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39667","18.816461","172.30.1.205","172.30.1.104","TCP","54","45972 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39668","18.818303","172.30.1.205","172.30.1.104","TCP","54","45972 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39669","18.818416","172.30.1.205","172.30.1.104","TCP","74","38610 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922044 TSecr=0 WS=128" "39670","18.818581","172.30.1.104","172.30.1.205","TCP","54","135 > 45972 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39671","18.818596","172.30.1.104","172.30.1.205","TCP","54","135 > 45972 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39672","18.818603","172.30.1.205","172.30.1.104","TCP","54","45972 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39673","18.818726","172.30.1.104","172.30.1.205","TCP","66","49671 > 38610 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39674","18.818735","172.30.1.205","172.30.1.104","TCP","54","38610 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39675","18.819097","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39676","18.819381","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39677","18.819390","172.30.1.205","172.30.1.104","TCP","54","38610 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39678","18.821281","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39679","18.821672","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39680","18.821678","172.30.1.205","172.30.1.104","TCP","54","38610 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39681","18.823025","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39682","18.826337","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39683","18.826346","172.30.1.205","172.30.1.104","TCP","54","38610 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39684","18.827286","172.30.1.205","172.30.1.104","TCP","74","45976 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922053 TSecr=0 WS=128" "39685","18.827673","172.30.1.104","172.30.1.205","TCP","66","135 > 45976 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39686","18.827691","172.30.1.205","172.30.1.104","TCP","54","45976 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39687","18.828058","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39688","18.828356","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39689","18.828365","172.30.1.205","172.30.1.104","TCP","54","45976 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39690","18.830575","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39691","18.831005","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39692","18.831012","172.30.1.205","172.30.1.104","TCP","54","45976 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39693","18.831862","172.30.1.205","172.30.1.104","TCP","54","38570 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39694","18.831909","172.30.1.205","172.30.1.104","TCP","54","38574 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39695","18.831946","172.30.1.205","172.30.1.104","TCP","54","38578 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39696","18.831979","172.30.1.205","172.30.1.104","TCP","54","38582 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39697","18.832012","172.30.1.205","172.30.1.104","TCP","54","38586 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39698","18.832039","172.30.1.205","172.30.1.104","TCP","54","38590 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39699","18.832071","172.30.1.205","172.30.1.104","TCP","54","38594 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39700","18.832098","172.30.1.205","172.30.1.104","TCP","54","38598 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39701","18.832124","172.30.1.205","172.30.1.104","TCP","54","38602 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39702","18.832139","172.30.1.104","172.30.1.205","TCP","54","49671 > 38570 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39703","18.832158","172.30.1.104","172.30.1.205","TCP","54","49671 > 38574 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39704","18.832224","172.30.1.205","172.30.1.104","TCP","54","38606 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39705","18.832262","172.30.1.205","172.30.1.104","TCP","54","38610 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39706","18.832334","172.30.1.205","172.30.1.104","TCP","54","38566 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "39707","18.832492","172.30.1.104","172.30.1.205","TCP","54","49671 > 38570 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39708","18.832499","172.30.1.205","172.30.1.104","TCP","54","38570 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39709","18.832507","172.30.1.104","172.30.1.205","TCP","54","49671 > 38578 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39710","18.832533","172.30.1.104","172.30.1.205","TCP","54","49671 > 38574 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39711","18.832537","172.30.1.205","172.30.1.104","TCP","54","38574 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39712","18.832560","172.30.1.104","172.30.1.205","TCP","54","49671 > 38578 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39713","18.832563","172.30.1.205","172.30.1.104","TCP","54","38578 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39714","18.832583","172.30.1.104","172.30.1.205","TCP","54","49671 > 38582 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39715","18.832603","172.30.1.104","172.30.1.205","TCP","54","49671 > 38582 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39716","18.832608","172.30.1.205","172.30.1.104","TCP","54","38582 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39717","18.832626","172.30.1.104","172.30.1.205","TCP","54","49671 > 38586 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39718","18.832646","172.30.1.104","172.30.1.205","TCP","54","49671 > 38590 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39719","18.832667","172.30.1.104","172.30.1.205","TCP","54","49671 > 38586 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39720","18.832672","172.30.1.205","172.30.1.104","TCP","54","38586 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39721","18.832687","172.30.1.104","172.30.1.205","TCP","54","49671 > 38594 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39722","18.832706","172.30.1.104","172.30.1.205","TCP","54","49671 > 38590 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39723","18.832710","172.30.1.205","172.30.1.104","TCP","54","38590 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39724","18.832726","172.30.1.104","172.30.1.205","TCP","54","49671 > 38598 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39725","18.832747","172.30.1.104","172.30.1.205","TCP","54","49671 > 38602 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39726","18.832767","172.30.1.104","172.30.1.205","TCP","54","49671 > 38602 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39727","18.832771","172.30.1.205","172.30.1.104","TCP","54","38602 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39728","18.832797","172.30.1.104","172.30.1.205","TCP","54","49671 > 38606 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39729","18.832978","172.30.1.104","172.30.1.205","TCP","54","49671 > 38594 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39730","18.832984","172.30.1.205","172.30.1.104","TCP","54","38594 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39731","18.832997","172.30.1.104","172.30.1.205","TCP","54","49671 > 38610 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39732","18.833017","172.30.1.104","172.30.1.205","TCP","54","49671 > 38610 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39733","18.833020","172.30.1.205","172.30.1.104","TCP","54","38610 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39734","18.833036","172.30.1.104","172.30.1.205","TCP","54","49671 > 38598 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39735","18.833039","172.30.1.205","172.30.1.104","TCP","54","38598 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39736","18.833054","172.30.1.104","172.30.1.205","TCP","54","49671 > 38606 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39737","18.833056","172.30.1.205","172.30.1.104","TCP","54","38606 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39738","18.833165","172.30.1.104","172.30.1.205","TCP","54","49671 > 38566 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39739","18.833184","172.30.1.104","172.30.1.205","TCP","54","49671 > 38566 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "39740","18.833188","172.30.1.205","172.30.1.104","TCP","54","38566 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "39741","18.834029","172.30.1.205","172.30.1.104","TCP","54","45976 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39742","18.834141","172.30.1.205","172.30.1.104","TCP","74","38614 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922060 TSecr=0 WS=128" "39743","18.834277","172.30.1.104","172.30.1.205","TCP","54","135 > 45976 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39744","18.834339","172.30.1.104","172.30.1.205","TCP","54","135 > 45976 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39745","18.834344","172.30.1.205","172.30.1.104","TCP","54","45976 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39746","18.834420","172.30.1.104","172.30.1.205","TCP","66","49671 > 38614 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39747","18.834428","172.30.1.205","172.30.1.104","TCP","54","38614 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39748","18.834795","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39749","18.835102","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39750","18.835114","172.30.1.205","172.30.1.104","TCP","54","38614 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39751","18.837010","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39752","18.837431","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39753","18.837439","172.30.1.205","172.30.1.104","TCP","54","38614 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39754","18.838813","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39755","18.842109","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39756","18.842119","172.30.1.205","172.30.1.104","TCP","54","38614 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39757","18.843061","172.30.1.205","172.30.1.104","TCP","74","45980 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922069 TSecr=0 WS=128" "39758","18.843415","172.30.1.104","172.30.1.205","TCP","66","135 > 45980 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39759","18.843426","172.30.1.205","172.30.1.104","TCP","54","45980 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39760","18.843776","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39761","18.844101","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39762","18.844109","172.30.1.205","172.30.1.104","TCP","54","45980 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39763","18.846300","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39764","18.846713","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39765","18.846720","172.30.1.205","172.30.1.104","TCP","54","45980 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39766","18.848542","172.30.1.205","172.30.1.104","TCP","54","45980 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39767","18.848655","172.30.1.205","172.30.1.104","TCP","74","38618 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922075 TSecr=0 WS=128" "39768","18.848819","172.30.1.104","172.30.1.205","TCP","54","135 > 45980 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39769","18.848830","172.30.1.104","172.30.1.205","TCP","54","135 > 45980 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39770","18.848836","172.30.1.205","172.30.1.104","TCP","54","45980 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39771","18.848964","172.30.1.104","172.30.1.205","TCP","66","49671 > 38618 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39772","18.848972","172.30.1.205","172.30.1.104","TCP","54","38618 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39773","18.849321","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39774","18.849601","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39775","18.849609","172.30.1.205","172.30.1.104","TCP","54","38618 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39776","18.851457","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39777","18.851803","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39778","18.851809","172.30.1.205","172.30.1.104","TCP","54","38618 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39779","18.853210","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39780","18.856443","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39781","18.856452","172.30.1.205","172.30.1.104","TCP","54","38618 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39782","18.857395","172.30.1.205","172.30.1.104","TCP","74","45984 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922083 TSecr=0 WS=128" "39783","18.857714","172.30.1.104","172.30.1.205","TCP","66","135 > 45984 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39784","18.857725","172.30.1.205","172.30.1.104","TCP","54","45984 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39785","18.858084","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39786","18.858395","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39787","18.858404","172.30.1.205","172.30.1.104","TCP","54","45984 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39788","18.860581","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39789","18.860976","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39790","18.860982","172.30.1.205","172.30.1.104","TCP","54","45984 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39791","18.862787","172.30.1.205","172.30.1.104","TCP","54","45984 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39792","18.862895","172.30.1.205","172.30.1.104","TCP","74","38622 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922089 TSecr=0 WS=128" "39793","18.863052","172.30.1.104","172.30.1.205","TCP","54","135 > 45984 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39794","18.863067","172.30.1.104","172.30.1.205","TCP","54","135 > 45984 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39795","18.863072","172.30.1.205","172.30.1.104","TCP","54","45984 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39796","18.863166","172.30.1.104","172.30.1.205","TCP","66","49671 > 38622 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39797","18.863174","172.30.1.205","172.30.1.104","TCP","54","38622 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39798","18.863523","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39799","18.863809","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39800","18.863817","172.30.1.205","172.30.1.104","TCP","54","38622 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39801","18.865718","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39802","18.866108","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39803","18.866114","172.30.1.205","172.30.1.104","TCP","54","38622 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39804","18.867455","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39805","18.870609","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39806","18.870618","172.30.1.205","172.30.1.104","TCP","54","38622 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39807","18.871557","172.30.1.205","172.30.1.104","TCP","74","45988 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922097 TSecr=0 WS=128" "39808","18.871899","172.30.1.104","172.30.1.205","TCP","66","135 > 45988 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39809","18.871910","172.30.1.205","172.30.1.104","TCP","54","45988 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39810","18.872257","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39811","18.872564","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39812","18.872573","172.30.1.205","172.30.1.104","TCP","54","45988 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39813","18.874770","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39814","18.875167","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39815","18.875173","172.30.1.205","172.30.1.104","TCP","54","45988 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39816","18.877008","172.30.1.205","172.30.1.104","TCP","54","45988 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39817","18.877116","172.30.1.205","172.30.1.104","TCP","74","38626 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922103 TSecr=0 WS=128" "39818","18.877264","172.30.1.104","172.30.1.205","TCP","54","135 > 45988 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39819","18.877278","172.30.1.104","172.30.1.205","TCP","54","135 > 45988 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39820","18.877282","172.30.1.205","172.30.1.104","TCP","54","45988 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39821","18.877375","172.30.1.104","172.30.1.205","TCP","66","49671 > 38626 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39822","18.877383","172.30.1.205","172.30.1.104","TCP","54","38626 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39823","18.877727","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39824","18.878018","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39825","18.878027","172.30.1.205","172.30.1.104","TCP","54","38626 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39826","18.879902","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39827","18.880271","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39828","18.880277","172.30.1.205","172.30.1.104","TCP","54","38626 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39829","18.881650","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39830","18.884769","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39831","18.884788","172.30.1.205","172.30.1.104","TCP","54","38626 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39832","18.885717","172.30.1.205","172.30.1.104","TCP","74","45992 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922112 TSecr=0 WS=128" "39833","18.886026","172.30.1.104","172.30.1.205","TCP","66","135 > 45992 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39834","18.886036","172.30.1.205","172.30.1.104","TCP","54","45992 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39835","18.886382","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39836","18.886671","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39837","18.886679","172.30.1.205","172.30.1.104","TCP","54","45992 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39838","18.888873","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39839","18.889306","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39840","18.889312","172.30.1.205","172.30.1.104","TCP","54","45992 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39841","18.891107","172.30.1.205","172.30.1.104","TCP","54","45992 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39842","18.891216","172.30.1.205","172.30.1.104","TCP","74","38630 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922117 TSecr=0 WS=128" "39843","18.891435","172.30.1.104","172.30.1.205","TCP","54","135 > 45992 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39844","18.891497","172.30.1.104","172.30.1.205","TCP","66","49671 > 38630 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39845","18.891506","172.30.1.205","172.30.1.104","TCP","54","38630 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39846","18.891515","172.30.1.104","172.30.1.205","TCP","54","135 > 45992 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39847","18.891522","172.30.1.205","172.30.1.104","TCP","54","45992 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39848","18.891863","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39849","18.892159","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39850","18.892168","172.30.1.205","172.30.1.104","TCP","54","38630 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39851","18.894078","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39852","18.894488","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39853","18.894494","172.30.1.205","172.30.1.104","TCP","54","38630 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39854","18.895835","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39855","18.899027","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39856","18.899036","172.30.1.205","172.30.1.104","TCP","54","38630 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39857","18.899973","172.30.1.205","172.30.1.104","TCP","74","45996 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922126 TSecr=0 WS=128" "39858","18.900305","172.30.1.104","172.30.1.205","TCP","66","135 > 45996 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39859","18.900316","172.30.1.205","172.30.1.104","TCP","54","45996 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39860","18.900670","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39861","18.900964","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39862","18.900973","172.30.1.205","172.30.1.104","TCP","54","45996 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39863","18.903162","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39864","18.903620","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39865","18.903627","172.30.1.205","172.30.1.104","TCP","54","45996 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39866","18.905465","172.30.1.205","172.30.1.104","TCP","54","45996 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39867","18.905575","172.30.1.205","172.30.1.104","TCP","74","38634 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922131 TSecr=0 WS=128" "39868","18.905747","172.30.1.104","172.30.1.205","TCP","54","135 > 45996 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39869","18.905792","172.30.1.104","172.30.1.205","TCP","54","135 > 45996 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39870","18.905797","172.30.1.205","172.30.1.104","TCP","54","45996 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39871","18.905898","172.30.1.104","172.30.1.205","TCP","66","49671 > 38634 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39872","18.905906","172.30.1.205","172.30.1.104","TCP","54","38634 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39873","18.906266","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39874","18.906550","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39875","18.906557","172.30.1.205","172.30.1.104","TCP","54","38634 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39876","18.908410","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39877","18.908822","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39878","18.908829","172.30.1.205","172.30.1.104","TCP","54","38634 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39879","18.910187","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39880","18.913228","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39881","18.913238","172.30.1.205","172.30.1.104","TCP","54","38634 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39882","18.914191","172.30.1.205","172.30.1.104","TCP","74","46000 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922140 TSecr=0 WS=128" "39883","18.914503","172.30.1.104","172.30.1.205","TCP","66","135 > 46000 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39884","18.914515","172.30.1.205","172.30.1.104","TCP","54","46000 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39885","18.914859","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39886","18.915137","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39887","18.915146","172.30.1.205","172.30.1.104","TCP","54","46000 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39888","18.917367","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39889","18.917774","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39890","18.917780","172.30.1.205","172.30.1.104","TCP","54","46000 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39891","18.919586","172.30.1.205","172.30.1.104","TCP","54","46000 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39892","18.919696","172.30.1.205","172.30.1.104","TCP","74","38638 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922146 TSecr=0 WS=128" "39893","18.919840","172.30.1.104","172.30.1.205","TCP","54","135 > 46000 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39894","18.919851","172.30.1.104","172.30.1.205","TCP","54","135 > 46000 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39895","18.919857","172.30.1.205","172.30.1.104","TCP","54","46000 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39896","18.919953","172.30.1.104","172.30.1.205","TCP","66","49671 > 38638 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39897","18.919962","172.30.1.205","172.30.1.104","TCP","54","38638 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39898","18.920313","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39899","18.920609","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39900","18.920618","172.30.1.205","172.30.1.104","TCP","54","38638 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39901","18.922502","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39902","18.922885","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39903","18.922891","172.30.1.205","172.30.1.104","TCP","54","38638 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39904","18.924244","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39905","18.927447","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39906","18.927456","172.30.1.205","172.30.1.104","TCP","54","38638 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39907","18.928413","172.30.1.205","172.30.1.104","TCP","74","46004 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922154 TSecr=0 WS=128" "39908","18.928727","172.30.1.104","172.30.1.205","TCP","66","135 > 46004 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39909","18.928738","172.30.1.205","172.30.1.104","TCP","54","46004 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39910","18.929104","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39911","18.929421","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39912","18.929431","172.30.1.205","172.30.1.104","TCP","54","46004 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39913","18.931624","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39914","18.932038","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39915","18.932045","172.30.1.205","172.30.1.104","TCP","54","46004 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39916","18.933865","172.30.1.205","172.30.1.104","TCP","54","46004 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39917","18.933978","172.30.1.205","172.30.1.104","TCP","74","38642 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922160 TSecr=0 WS=128" "39918","18.934140","172.30.1.104","172.30.1.205","TCP","54","135 > 46004 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39919","18.934155","172.30.1.104","172.30.1.205","TCP","54","135 > 46004 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39920","18.934163","172.30.1.205","172.30.1.104","TCP","54","46004 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39921","18.934280","172.30.1.104","172.30.1.205","TCP","66","49671 > 38642 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39922","18.934291","172.30.1.205","172.30.1.104","TCP","54","38642 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39923","18.934689","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39924","18.934992","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39925","18.935001","172.30.1.205","172.30.1.104","TCP","54","38642 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39926","18.936948","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39927","18.938172","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39928","18.938179","172.30.1.205","172.30.1.104","TCP","54","38642 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39929","18.939564","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39930","18.942847","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39931","18.942858","172.30.1.205","172.30.1.104","TCP","54","38642 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39932","18.943830","172.30.1.205","172.30.1.104","TCP","74","46008 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922170 TSecr=0 WS=128" "39933","18.944136","172.30.1.104","172.30.1.205","TCP","66","135 > 46008 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39934","18.944147","172.30.1.205","172.30.1.104","TCP","54","46008 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39935","18.944492","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39936","18.944814","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39937","18.944823","172.30.1.205","172.30.1.104","TCP","54","46008 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39938","18.947004","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39939","18.947455","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39940","18.947461","172.30.1.205","172.30.1.104","TCP","54","46008 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39941","18.949284","172.30.1.205","172.30.1.104","TCP","54","46008 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39942","18.949394","172.30.1.205","172.30.1.104","TCP","74","38646 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922175 TSecr=0 WS=128" "39943","18.949568","172.30.1.104","172.30.1.205","TCP","54","135 > 46008 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39944","18.949610","172.30.1.104","172.30.1.205","TCP","54","135 > 46008 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39945","18.949616","172.30.1.205","172.30.1.104","TCP","54","46008 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39946","18.949686","172.30.1.104","172.30.1.205","TCP","66","49671 > 38646 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39947","18.949694","172.30.1.205","172.30.1.104","TCP","54","38646 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39948","18.950040","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39949","18.950340","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39950","18.950357","172.30.1.205","172.30.1.104","TCP","54","38646 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39951","18.952507","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39952","18.952881","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39953","18.952888","172.30.1.205","172.30.1.104","TCP","54","38646 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39954","18.954250","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39955","18.957482","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39956","18.957492","172.30.1.205","172.30.1.104","TCP","54","38646 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39957","18.958437","172.30.1.205","172.30.1.104","TCP","74","46012 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922184 TSecr=0 WS=128" "39958","18.958793","172.30.1.104","172.30.1.205","TCP","66","135 > 46012 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39959","18.958807","172.30.1.205","172.30.1.104","TCP","54","46012 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39960","18.959152","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39961","18.959421","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39962","18.959431","172.30.1.205","172.30.1.104","TCP","54","46012 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39963","18.961623","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39964","18.962070","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39965","18.962077","172.30.1.205","172.30.1.104","TCP","54","46012 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39966","18.963874","172.30.1.205","172.30.1.104","TCP","54","46012 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39967","18.963984","172.30.1.205","172.30.1.104","TCP","74","38650 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922190 TSecr=0 WS=128" "39968","18.964175","172.30.1.104","172.30.1.205","TCP","54","135 > 46012 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39969","18.964184","172.30.1.104","172.30.1.205","TCP","54","135 > 46012 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39970","18.964190","172.30.1.205","172.30.1.104","TCP","54","46012 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39971","18.964284","172.30.1.104","172.30.1.205","TCP","66","49671 > 38650 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39972","18.964294","172.30.1.205","172.30.1.104","TCP","54","38650 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39973","18.964649","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39974","18.965063","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39975","18.965071","172.30.1.205","172.30.1.104","TCP","54","38650 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39976","18.966921","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "39977","18.967318","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "39978","18.967328","172.30.1.205","172.30.1.104","TCP","54","38650 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "39979","18.969008","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "39980","18.972329","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "39981","18.972338","172.30.1.205","172.30.1.104","TCP","54","38650 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "39982","18.973290","172.30.1.205","172.30.1.104","TCP","74","46016 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922199 TSecr=0 WS=128" "39983","18.973674","172.30.1.104","172.30.1.205","TCP","66","135 > 46016 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39984","18.973684","172.30.1.205","172.30.1.104","TCP","54","46016 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39985","18.974041","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "39986","18.974387","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "39987","18.974402","172.30.1.205","172.30.1.104","TCP","54","46016 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "39988","18.976715","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "39989","18.977154","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "39990","18.977161","172.30.1.205","172.30.1.104","TCP","54","46016 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "39991","18.978997","172.30.1.205","172.30.1.104","TCP","54","46016 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "39992","18.979121","172.30.1.205","172.30.1.104","TCP","74","38654 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922205 TSecr=0 WS=128" "39993","18.979322","172.30.1.104","172.30.1.205","TCP","54","135 > 46016 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39994","18.979362","172.30.1.104","172.30.1.205","TCP","54","135 > 46016 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "39995","18.979367","172.30.1.205","172.30.1.104","TCP","54","46016 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "39996","18.979444","172.30.1.104","172.30.1.205","TCP","66","49671 > 38654 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "39997","18.979453","172.30.1.205","172.30.1.104","TCP","54","38654 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "39998","18.979805","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "39999","18.980107","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40000","18.980114","172.30.1.205","172.30.1.104","TCP","54","38654 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40001","18.982032","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40002","18.982418","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40003","18.982426","172.30.1.205","172.30.1.104","TCP","54","38654 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40004","18.983795","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40005","18.987092","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40006","18.987103","172.30.1.205","172.30.1.104","TCP","54","38654 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40007","18.988063","172.30.1.205","172.30.1.104","TCP","74","46020 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922214 TSecr=0 WS=128" "40008","18.988452","172.30.1.104","172.30.1.205","TCP","66","135 > 46020 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40009","18.988463","172.30.1.205","172.30.1.104","TCP","54","46020 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40010","18.988841","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40011","18.989158","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40012","18.989169","172.30.1.205","172.30.1.104","TCP","54","46020 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40013","18.991376","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40014","18.991802","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40015","18.991809","172.30.1.205","172.30.1.104","TCP","54","46020 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40016","18.993649","172.30.1.205","172.30.1.104","TCP","54","46020 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40017","18.993767","172.30.1.205","172.30.1.104","TCP","74","38658 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922220 TSecr=0 WS=128" "40018","18.993959","172.30.1.104","172.30.1.205","TCP","54","135 > 46020 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40019","18.993971","172.30.1.104","172.30.1.205","TCP","54","135 > 46020 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40020","18.993976","172.30.1.205","172.30.1.104","TCP","54","46020 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40021","18.994064","172.30.1.104","172.30.1.205","TCP","66","49671 > 38658 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40022","18.994073","172.30.1.205","172.30.1.104","TCP","54","38658 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40023","18.994433","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40024","18.994702","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40025","18.994713","172.30.1.205","172.30.1.104","TCP","54","38658 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40026","18.996590","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40027","18.996998","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40028","18.997012","172.30.1.205","172.30.1.104","TCP","54","38658 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40029","18.998624","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40030","19.001777","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40031","19.001787","172.30.1.205","172.30.1.104","TCP","54","38658 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40032","19.002744","172.30.1.205","172.30.1.104","TCP","74","46024 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922229 TSecr=0 WS=128" "40033","19.003065","172.30.1.104","172.30.1.205","TCP","66","135 > 46024 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40034","19.003076","172.30.1.205","172.30.1.104","TCP","54","46024 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40035","19.003428","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40036","19.003733","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40037","19.003742","172.30.1.205","172.30.1.104","TCP","54","46024 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40038","19.005951","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40039","19.006359","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40040","19.006366","172.30.1.205","172.30.1.104","TCP","54","46024 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40041","19.007215","172.30.1.205","172.30.1.104","TCP","54","38618 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40042","19.007267","172.30.1.205","172.30.1.104","TCP","54","38622 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40043","19.007307","172.30.1.205","172.30.1.104","TCP","54","38626 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40044","19.007340","172.30.1.205","172.30.1.104","TCP","54","38630 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40045","19.007373","172.30.1.205","172.30.1.104","TCP","54","38634 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40046","19.007401","172.30.1.205","172.30.1.104","TCP","54","38638 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40047","19.007429","172.30.1.205","172.30.1.104","TCP","54","38642 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40048","19.007457","172.30.1.205","172.30.1.104","TCP","54","38646 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40049","19.007489","172.30.1.205","172.30.1.104","TCP","54","38650 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40050","19.007517","172.30.1.205","172.30.1.104","TCP","54","38654 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40051","19.007549","172.30.1.205","172.30.1.104","TCP","54","38658 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40052","19.007589","172.30.1.104","172.30.1.205","TCP","54","49671 > 38618 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40053","19.007607","172.30.1.104","172.30.1.205","TCP","54","49671 > 38618 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40054","19.007613","172.30.1.205","172.30.1.104","TCP","54","38618 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40055","19.007627","172.30.1.104","172.30.1.205","TCP","54","49671 > 38622 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40056","19.007648","172.30.1.104","172.30.1.205","TCP","54","49671 > 38626 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40057","19.007675","172.30.1.104","172.30.1.205","TCP","54","49671 > 38630 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40058","19.007691","172.30.1.205","172.30.1.104","TCP","54","38614 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40059","19.007710","172.30.1.104","172.30.1.205","TCP","54","49671 > 38634 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40060","19.007856","172.30.1.104","172.30.1.205","TCP","54","49671 > 38634 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40061","19.007863","172.30.1.205","172.30.1.104","TCP","54","38634 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40062","19.007875","172.30.1.104","172.30.1.205","TCP","54","49671 > 38630 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40063","19.007877","172.30.1.205","172.30.1.104","TCP","54","38630 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40064","19.007897","172.30.1.104","172.30.1.205","TCP","54","49671 > 38622 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40065","19.007900","172.30.1.205","172.30.1.104","TCP","54","38622 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40066","19.007919","172.30.1.104","172.30.1.205","TCP","54","49671 > 38626 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40067","19.007921","172.30.1.205","172.30.1.104","TCP","54","38626 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40068","19.007938","172.30.1.104","172.30.1.205","TCP","54","49671 > 38638 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40069","19.007959","172.30.1.104","172.30.1.205","TCP","54","49671 > 38642 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40070","19.007978","172.30.1.104","172.30.1.205","TCP","54","49671 > 38646 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40071","19.007998","172.30.1.104","172.30.1.205","TCP","54","49671 > 38638 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40072","19.008003","172.30.1.205","172.30.1.104","TCP","54","38638 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40073","19.008020","172.30.1.104","172.30.1.205","TCP","54","49671 > 38650 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40074","19.008043","172.30.1.104","172.30.1.205","TCP","54","49671 > 38654 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40075","19.008171","172.30.1.104","172.30.1.205","TCP","54","49671 > 38654 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40076","19.008176","172.30.1.205","172.30.1.104","TCP","54","38654 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40077","19.008190","172.30.1.104","172.30.1.205","TCP","54","49671 > 38650 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40078","19.008192","172.30.1.205","172.30.1.104","TCP","54","38650 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40079","19.008212","172.30.1.104","172.30.1.205","TCP","54","49671 > 38642 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40080","19.008215","172.30.1.205","172.30.1.104","TCP","54","38642 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40081","19.008232","172.30.1.104","172.30.1.205","TCP","54","49671 > 38646 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40082","19.008235","172.30.1.205","172.30.1.104","TCP","54","38646 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40083","19.008264","172.30.1.104","172.30.1.205","TCP","54","49671 > 38658 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40084","19.008381","172.30.1.104","172.30.1.205","TCP","54","49671 > 38614 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40085","19.008400","172.30.1.104","172.30.1.205","TCP","54","49671 > 38658 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40086","19.008404","172.30.1.205","172.30.1.104","TCP","54","38658 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40087","19.008420","172.30.1.104","172.30.1.205","TCP","54","49671 > 38614 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40088","19.008423","172.30.1.205","172.30.1.104","TCP","54","38614 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40089","19.009243","172.30.1.205","172.30.1.104","TCP","54","46024 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40090","19.009354","172.30.1.205","172.30.1.104","TCP","74","38662 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922235 TSecr=0 WS=128" "40091","19.009562","172.30.1.104","172.30.1.205","TCP","54","135 > 46024 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40092","19.009609","172.30.1.104","172.30.1.205","TCP","66","49671 > 38662 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40093","19.009618","172.30.1.205","172.30.1.104","TCP","54","38662 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40094","19.009629","172.30.1.104","172.30.1.205","TCP","54","135 > 46024 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40095","19.009637","172.30.1.205","172.30.1.104","TCP","54","46024 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40096","19.010008","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40097","19.010288","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40098","19.010297","172.30.1.205","172.30.1.104","TCP","54","38662 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40099","19.012205","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40100","19.012607","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40101","19.012615","172.30.1.205","172.30.1.104","TCP","54","38662 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40102","19.014033","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40103","19.017284","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40104","19.017297","172.30.1.205","172.30.1.104","TCP","54","38662 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40105","19.018350","172.30.1.205","172.30.1.104","TCP","74","46028 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922244 TSecr=0 WS=128" "40106","19.018662","172.30.1.104","172.30.1.205","TCP","66","135 > 46028 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40107","19.018678","172.30.1.205","172.30.1.104","TCP","54","46028 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40108","19.019053","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40109","19.019351","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40110","19.019365","172.30.1.205","172.30.1.104","TCP","54","46028 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40111","19.021703","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40112","19.022178","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40113","19.022185","172.30.1.205","172.30.1.104","TCP","54","46028 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40114","19.024049","172.30.1.205","172.30.1.104","TCP","54","46028 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40115","19.024178","172.30.1.205","172.30.1.104","TCP","74","38666 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922250 TSecr=0 WS=128" "40116","19.024345","172.30.1.104","172.30.1.205","TCP","54","135 > 46028 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40117","19.024358","172.30.1.104","172.30.1.205","TCP","54","135 > 46028 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40118","19.024365","172.30.1.205","172.30.1.104","TCP","54","46028 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40119","19.024526","172.30.1.104","172.30.1.205","TCP","66","49671 > 38666 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40120","19.024536","172.30.1.205","172.30.1.104","TCP","54","38666 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40121","19.024928","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40122","19.025456","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40123","19.025465","172.30.1.205","172.30.1.104","TCP","54","38666 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40124","19.027339","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40125","19.027755","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40126","19.027762","172.30.1.205","172.30.1.104","TCP","54","38666 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40127","19.029148","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40128","19.034602","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40129","19.034613","172.30.1.205","172.30.1.104","TCP","54","38666 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40130","19.035589","172.30.1.205","172.30.1.104","TCP","74","46032 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922262 TSecr=0 WS=128" "40131","19.035906","172.30.1.104","172.30.1.205","TCP","66","135 > 46032 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40132","19.035917","172.30.1.205","172.30.1.104","TCP","54","46032 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40133","19.036272","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40134","19.036542","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40135","19.036552","172.30.1.205","172.30.1.104","TCP","54","46032 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40136","19.038765","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40137","19.039168","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40138","19.039175","172.30.1.205","172.30.1.104","TCP","54","46032 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40139","19.041010","172.30.1.205","172.30.1.104","TCP","54","46032 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40140","19.041127","172.30.1.205","172.30.1.104","TCP","74","38670 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922267 TSecr=0 WS=128" "40141","19.041317","172.30.1.104","172.30.1.205","TCP","54","135 > 46032 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40142","19.041335","172.30.1.104","172.30.1.205","TCP","54","135 > 46032 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40143","19.041342","172.30.1.205","172.30.1.104","TCP","54","46032 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40144","19.041418","172.30.1.104","172.30.1.205","TCP","66","49671 > 38670 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40145","19.041427","172.30.1.205","172.30.1.104","TCP","54","38670 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40146","19.041780","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40147","19.042073","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40148","19.042082","172.30.1.205","172.30.1.104","TCP","54","38670 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40149","19.043965","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40150","19.045757","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40151","19.045764","172.30.1.205","172.30.1.104","TCP","54","38670 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40152","19.047142","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40153","19.050324","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40154","19.050335","172.30.1.205","172.30.1.104","TCP","54","38670 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40155","19.051290","172.30.1.205","172.30.1.104","TCP","74","46036 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922277 TSecr=0 WS=128" "40156","19.051595","172.30.1.104","172.30.1.205","TCP","66","135 > 46036 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40157","19.051605","172.30.1.205","172.30.1.104","TCP","54","46036 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40158","19.051956","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40159","19.052244","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40160","19.052253","172.30.1.205","172.30.1.104","TCP","54","46036 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40161","19.054482","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40162","19.054896","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40163","19.054903","172.30.1.205","172.30.1.104","TCP","54","46036 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40164","19.056728","172.30.1.205","172.30.1.104","TCP","54","46036 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40165","19.056862","172.30.1.205","172.30.1.104","TCP","74","38674 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922283 TSecr=0 WS=128" "40166","19.057012","172.30.1.104","172.30.1.205","TCP","54","135 > 46036 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40167","19.057021","172.30.1.104","172.30.1.205","TCP","54","135 > 46036 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40168","19.057026","172.30.1.205","172.30.1.104","TCP","54","46036 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40169","19.057164","172.30.1.104","172.30.1.205","TCP","66","49671 > 38674 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40170","19.057172","172.30.1.205","172.30.1.104","TCP","54","38674 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40171","19.057521","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40172","19.057798","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40173","19.057805","172.30.1.205","172.30.1.104","TCP","54","38674 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40174","19.059684","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40175","19.060066","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40176","19.060072","172.30.1.205","172.30.1.104","TCP","54","38674 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40177","19.061463","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40178","19.064630","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40179","19.064642","172.30.1.205","172.30.1.104","TCP","54","38674 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40180","19.065653","172.30.1.205","172.30.1.104","TCP","74","46040 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922292 TSecr=0 WS=128" "40181","19.065945","172.30.1.104","172.30.1.205","TCP","66","135 > 46040 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40182","19.065956","172.30.1.205","172.30.1.104","TCP","54","46040 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40183","19.066309","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40184","19.066597","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40185","19.066606","172.30.1.205","172.30.1.104","TCP","54","46040 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40186","19.068816","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40187","19.069244","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40188","19.069250","172.30.1.205","172.30.1.104","TCP","54","46040 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40189","19.071066","172.30.1.205","172.30.1.104","TCP","54","46040 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40190","19.071178","172.30.1.205","172.30.1.104","TCP","74","38678 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922297 TSecr=0 WS=128" "40191","19.071406","172.30.1.104","172.30.1.205","TCP","54","135 > 46040 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40192","19.071414","172.30.1.104","172.30.1.205","TCP","54","135 > 46040 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40193","19.071420","172.30.1.205","172.30.1.104","TCP","54","46040 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40194","19.071471","172.30.1.104","172.30.1.205","TCP","66","49671 > 38678 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40195","19.071479","172.30.1.205","172.30.1.104","TCP","54","38678 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40196","19.071822","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40197","19.072108","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40198","19.072117","172.30.1.205","172.30.1.104","TCP","54","38678 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40199","19.074029","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40200","19.074388","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40201","19.074395","172.30.1.205","172.30.1.104","TCP","54","38678 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40202","19.075769","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40203","19.079695","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40204","19.079706","172.30.1.205","172.30.1.104","TCP","54","38678 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40205","19.080656","172.30.1.205","172.30.1.104","TCP","74","46044 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922307 TSecr=0 WS=128" "40206","19.080955","172.30.1.104","172.30.1.205","TCP","66","135 > 46044 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40207","19.080966","172.30.1.205","172.30.1.104","TCP","54","46044 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40208","19.081328","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40209","19.081634","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40210","19.081644","172.30.1.205","172.30.1.104","TCP","54","46044 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40211","19.083829","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40212","19.084216","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40213","19.084224","172.30.1.205","172.30.1.104","TCP","54","46044 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40214","19.086089","172.30.1.205","172.30.1.104","TCP","54","46044 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40215","19.086201","172.30.1.205","172.30.1.104","TCP","74","38682 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922312 TSecr=0 WS=128" "40216","19.086370","172.30.1.104","172.30.1.205","TCP","54","135 > 46044 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40217","19.086379","172.30.1.104","172.30.1.205","TCP","54","135 > 46044 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40218","19.086384","172.30.1.205","172.30.1.104","TCP","54","46044 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40219","19.086454","172.30.1.104","172.30.1.205","TCP","66","49671 > 38682 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40220","19.086462","172.30.1.205","172.30.1.104","TCP","54","38682 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40221","19.086808","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40222","19.087342","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40223","19.087350","172.30.1.205","172.30.1.104","TCP","54","38682 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40224","19.089270","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40225","19.089618","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40226","19.089624","172.30.1.205","172.30.1.104","TCP","54","38682 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40227","19.090975","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40228","19.094145","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40229","19.094155","172.30.1.205","172.30.1.104","TCP","54","38682 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40230","19.095095","172.30.1.205","172.30.1.104","TCP","74","46048 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922321 TSecr=0 WS=128" "40231","19.095380","172.30.1.104","172.30.1.205","TCP","66","135 > 46048 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40232","19.095390","172.30.1.205","172.30.1.104","TCP","54","46048 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40233","19.095752","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40234","19.096059","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40235","19.096068","172.30.1.205","172.30.1.104","TCP","54","46048 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40236","19.098292","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40237","19.098674","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40238","19.098680","172.30.1.205","172.30.1.104","TCP","54","46048 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40239","19.100498","172.30.1.205","172.30.1.104","TCP","54","46048 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40240","19.100613","172.30.1.205","172.30.1.104","TCP","74","38686 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922327 TSecr=0 WS=128" "40241","19.100793","172.30.1.104","172.30.1.205","TCP","54","135 > 46048 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40242","19.100802","172.30.1.104","172.30.1.205","TCP","54","135 > 46048 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40243","19.100807","172.30.1.205","172.30.1.104","TCP","54","46048 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40244","19.100884","172.30.1.104","172.30.1.205","TCP","66","49671 > 38686 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40245","19.100892","172.30.1.205","172.30.1.104","TCP","54","38686 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40246","19.101267","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40247","19.101563","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40248","19.101572","172.30.1.205","172.30.1.104","TCP","54","38686 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40249","19.103572","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40250","19.103955","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40251","19.103961","172.30.1.205","172.30.1.104","TCP","54","38686 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40252","19.105377","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40253","19.108697","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40254","19.108706","172.30.1.205","172.30.1.104","TCP","54","38686 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40255","19.109663","172.30.1.205","172.30.1.104","TCP","74","46052 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922336 TSecr=0 WS=128" "40256","19.109957","172.30.1.104","172.30.1.205","TCP","66","135 > 46052 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40257","19.109968","172.30.1.205","172.30.1.104","TCP","54","46052 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40258","19.110323","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40259","19.110596","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40260","19.110605","172.30.1.205","172.30.1.104","TCP","54","46052 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40261","19.112817","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40262","19.113262","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40263","19.113268","172.30.1.205","172.30.1.104","TCP","54","46052 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40264","19.115076","172.30.1.205","172.30.1.104","TCP","54","46052 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40265","19.115188","172.30.1.205","172.30.1.104","TCP","74","38690 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922341 TSecr=0 WS=128" "40266","19.115358","172.30.1.104","172.30.1.205","TCP","54","135 > 46052 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40267","19.115369","172.30.1.104","172.30.1.205","TCP","54","135 > 46052 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40268","19.115375","172.30.1.205","172.30.1.104","TCP","54","46052 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40269","19.116076","172.30.1.104","172.30.1.205","TCP","66","49671 > 38690 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40270","19.116085","172.30.1.205","172.30.1.104","TCP","54","38690 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40271","19.116446","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40272","19.116727","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40273","19.116736","172.30.1.205","172.30.1.104","TCP","54","38690 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40274","19.118643","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40275","19.119024","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40276","19.119031","172.30.1.205","172.30.1.104","TCP","54","38690 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40277","19.120387","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40278","19.123736","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40279","19.123746","172.30.1.205","172.30.1.104","TCP","54","38690 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40280","19.124694","172.30.1.205","172.30.1.104","TCP","74","46056 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922351 TSecr=0 WS=128" "40281","19.125041","172.30.1.104","172.30.1.205","TCP","66","135 > 46056 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40282","19.125053","172.30.1.205","172.30.1.104","TCP","54","46056 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40283","19.125411","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40284","19.125758","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40285","19.125767","172.30.1.205","172.30.1.104","TCP","54","46056 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40286","19.127962","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40287","19.128427","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40288","19.128434","172.30.1.205","172.30.1.104","TCP","54","46056 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40289","19.130269","172.30.1.205","172.30.1.104","TCP","54","46056 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40290","19.130379","172.30.1.205","172.30.1.104","TCP","74","38694 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922356 TSecr=0 WS=128" "40291","19.130587","172.30.1.104","172.30.1.205","TCP","54","135 > 46056 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40292","19.130625","172.30.1.104","172.30.1.205","TCP","54","135 > 46056 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40293","19.130630","172.30.1.205","172.30.1.104","TCP","54","46056 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40294","19.130752","172.30.1.104","172.30.1.205","TCP","66","49671 > 38694 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40295","19.130761","172.30.1.205","172.30.1.104","TCP","54","38694 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40296","19.131106","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40297","19.131394","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40298","19.131403","172.30.1.205","172.30.1.104","TCP","54","38694 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40299","19.133304","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40300","19.133706","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40301","19.133713","172.30.1.205","172.30.1.104","TCP","54","38694 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40302","19.135067","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40303","19.138485","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40304","19.138497","172.30.1.205","172.30.1.104","TCP","54","38694 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40305","19.139462","172.30.1.205","172.30.1.104","TCP","74","46060 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922365 TSecr=0 WS=128" "40306","19.139807","172.30.1.104","172.30.1.205","TCP","66","135 > 46060 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40307","19.139817","172.30.1.205","172.30.1.104","TCP","54","46060 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40308","19.140167","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40309","19.140498","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40310","19.140507","172.30.1.205","172.30.1.104","TCP","54","46060 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40311","19.142712","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40312","19.143152","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40313","19.143159","172.30.1.205","172.30.1.104","TCP","54","46060 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40314","19.144999","172.30.1.205","172.30.1.104","TCP","54","46060 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40315","19.145108","172.30.1.205","172.30.1.104","TCP","74","38698 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922371 TSecr=0 WS=128" "40316","19.145264","172.30.1.104","172.30.1.205","TCP","54","135 > 46060 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40317","19.145303","172.30.1.104","172.30.1.205","TCP","54","135 > 46060 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40318","19.145316","172.30.1.205","172.30.1.104","TCP","54","46060 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40319","19.145395","172.30.1.104","172.30.1.205","TCP","66","49671 > 38698 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40320","19.145404","172.30.1.205","172.30.1.104","TCP","54","38698 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40321","19.145750","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40322","19.146051","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40323","19.146059","172.30.1.205","172.30.1.104","TCP","54","38698 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40324","19.147959","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40325","19.148352","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40326","19.148364","172.30.1.205","172.30.1.104","TCP","54","38698 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40327","19.149739","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40328","19.153133","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40329","19.153142","172.30.1.205","172.30.1.104","TCP","54","38698 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40330","19.154128","172.30.1.205","172.30.1.104","TCP","74","46064 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922380 TSecr=0 WS=128" "40331","19.154471","172.30.1.104","172.30.1.205","TCP","66","135 > 46064 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40332","19.154482","172.30.1.205","172.30.1.104","TCP","54","46064 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40333","19.154855","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40334","19.155154","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40335","19.155163","172.30.1.205","172.30.1.104","TCP","54","46064 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40336","19.157380","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40337","19.157780","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40338","19.157787","172.30.1.205","172.30.1.104","TCP","54","46064 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40339","19.159598","172.30.1.205","172.30.1.104","TCP","54","46064 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40340","19.159707","172.30.1.205","172.30.1.104","TCP","74","38702 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922386 TSecr=0 WS=128" "40341","19.159866","172.30.1.104","172.30.1.205","TCP","54","135 > 46064 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40342","19.159879","172.30.1.104","172.30.1.205","TCP","54","135 > 46064 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40343","19.159885","172.30.1.205","172.30.1.104","TCP","54","46064 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40344","19.159996","172.30.1.104","172.30.1.205","TCP","66","49671 > 38702 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40345","19.160005","172.30.1.205","172.30.1.104","TCP","54","38702 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40346","19.160353","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40347","19.160639","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40348","19.160647","172.30.1.205","172.30.1.104","TCP","54","38702 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40349","19.162540","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40350","19.162881","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40351","19.162886","172.30.1.205","172.30.1.104","TCP","54","38702 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40352","19.164232","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40353","19.167382","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40354","19.167392","172.30.1.205","172.30.1.104","TCP","54","38702 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40355","19.168331","172.30.1.205","172.30.1.104","TCP","74","46068 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922394 TSecr=0 WS=128" "40356","19.168636","172.30.1.104","172.30.1.205","TCP","66","135 > 46068 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40357","19.168647","172.30.1.205","172.30.1.104","TCP","54","46068 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40358","19.169027","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40359","19.169325","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40360","19.169334","172.30.1.205","172.30.1.104","TCP","54","46068 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40361","19.171537","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40362","19.171955","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40363","19.171962","172.30.1.205","172.30.1.104","TCP","54","46068 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40364","19.173796","172.30.1.205","172.30.1.104","TCP","54","46068 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40365","19.173910","172.30.1.205","172.30.1.104","TCP","74","38706 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922400 TSecr=0 WS=128" "40366","19.174067","172.30.1.104","172.30.1.205","TCP","54","135 > 46068 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40367","19.174088","172.30.1.104","172.30.1.205","TCP","54","135 > 46068 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40368","19.174093","172.30.1.205","172.30.1.104","TCP","54","46068 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40369","19.174200","172.30.1.104","172.30.1.205","TCP","66","49671 > 38706 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40370","19.174208","172.30.1.205","172.30.1.104","TCP","54","38706 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40371","19.174552","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40372","19.174846","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40373","19.174855","172.30.1.205","172.30.1.104","TCP","54","38706 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40374","19.176753","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40375","19.177126","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40376","19.177133","172.30.1.205","172.30.1.104","TCP","54","38706 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40377","19.178481","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40378","19.181729","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40379","19.181739","172.30.1.205","172.30.1.104","TCP","54","38706 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40380","19.182681","172.30.1.205","172.30.1.104","TCP","74","46072 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922409 TSecr=0 WS=128" "40381","19.183023","172.30.1.104","172.30.1.205","TCP","66","135 > 46072 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40382","19.183033","172.30.1.205","172.30.1.104","TCP","54","46072 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40383","19.183394","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40384","19.183679","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40385","19.183688","172.30.1.205","172.30.1.104","TCP","54","46072 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40386","19.185895","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40387","19.186293","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40388","19.186300","172.30.1.205","172.30.1.104","TCP","54","46072 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40389","19.187143","172.30.1.205","172.30.1.104","TCP","54","38666 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40390","19.187195","172.30.1.205","172.30.1.104","TCP","54","38670 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40391","19.187232","172.30.1.205","172.30.1.104","TCP","54","38674 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40392","19.187261","172.30.1.205","172.30.1.104","TCP","54","38678 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40393","19.187290","172.30.1.205","172.30.1.104","TCP","54","38682 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40394","19.187318","172.30.1.205","172.30.1.104","TCP","54","38686 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40395","19.187350","172.30.1.205","172.30.1.104","TCP","54","38690 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40396","19.187382","172.30.1.205","172.30.1.104","TCP","54","38694 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40397","19.187409","172.30.1.205","172.30.1.104","TCP","54","38698 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40398","19.187436","172.30.1.205","172.30.1.104","TCP","54","38702 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40399","19.187468","172.30.1.205","172.30.1.104","TCP","54","38706 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40400","19.187535","172.30.1.205","172.30.1.104","TCP","54","38662 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40401","19.187624","172.30.1.104","172.30.1.205","TCP","54","49671 > 38666 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40402","19.187640","172.30.1.104","172.30.1.205","TCP","54","49671 > 38670 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40403","19.187660","172.30.1.104","172.30.1.205","TCP","54","49671 > 38666 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40404","19.187666","172.30.1.205","172.30.1.104","TCP","54","38666 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40405","19.187679","172.30.1.104","172.30.1.205","TCP","54","49671 > 38674 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40406","19.187700","172.30.1.104","172.30.1.205","TCP","54","49671 > 38678 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40407","19.187719","172.30.1.104","172.30.1.205","TCP","54","49671 > 38678 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40408","19.187723","172.30.1.205","172.30.1.104","TCP","54","38678 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40409","19.187738","172.30.1.104","172.30.1.205","TCP","54","49671 > 38682 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40410","19.187757","172.30.1.104","172.30.1.205","TCP","54","49671 > 38682 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40411","19.187761","172.30.1.205","172.30.1.104","TCP","54","38682 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40412","19.187788","172.30.1.104","172.30.1.205","TCP","54","49671 > 38686 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40413","19.187807","172.30.1.104","172.30.1.205","TCP","54","49671 > 38690 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40414","19.187827","172.30.1.104","172.30.1.205","TCP","54","49671 > 38694 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40415","19.187847","172.30.1.104","172.30.1.205","TCP","54","49671 > 38698 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40416","19.187944","172.30.1.104","172.30.1.205","TCP","54","49671 > 38698 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40417","19.187949","172.30.1.205","172.30.1.104","TCP","54","38698 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40418","19.187963","172.30.1.104","172.30.1.205","TCP","54","49671 > 38694 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40419","19.187966","172.30.1.205","172.30.1.104","TCP","54","38694 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40420","19.187985","172.30.1.104","172.30.1.205","TCP","54","49671 > 38690 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40421","19.187988","172.30.1.205","172.30.1.104","TCP","54","38690 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40422","19.188004","172.30.1.104","172.30.1.205","TCP","54","49671 > 38686 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40423","19.188007","172.30.1.205","172.30.1.104","TCP","54","38686 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40424","19.188025","172.30.1.104","172.30.1.205","TCP","54","49671 > 38670 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40425","19.188029","172.30.1.205","172.30.1.104","TCP","54","38670 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40426","19.188044","172.30.1.104","172.30.1.205","TCP","54","49671 > 38674 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40427","19.188047","172.30.1.205","172.30.1.104","TCP","54","38674 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40428","19.188076","172.30.1.104","172.30.1.205","TCP","54","49671 > 38702 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40429","19.188095","172.30.1.104","172.30.1.205","TCP","54","49671 > 38706 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40430","19.188236","172.30.1.104","172.30.1.205","TCP","54","49671 > 38662 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40431","19.188268","172.30.1.104","172.30.1.205","TCP","54","49671 > 38702 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40432","19.188273","172.30.1.205","172.30.1.104","TCP","54","38702 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40433","19.188288","172.30.1.104","172.30.1.205","TCP","54","49671 > 38706 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40434","19.188290","172.30.1.205","172.30.1.104","TCP","54","38706 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40435","19.188308","172.30.1.104","172.30.1.205","TCP","54","49671 > 38662 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40436","19.188310","172.30.1.205","172.30.1.104","TCP","54","38662 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40437","19.189151","172.30.1.205","172.30.1.104","TCP","54","46072 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40438","19.189263","172.30.1.205","172.30.1.104","TCP","74","38710 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922415 TSecr=0 WS=128" "40439","19.189393","172.30.1.104","172.30.1.205","TCP","54","135 > 46072 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40440","19.189406","172.30.1.104","172.30.1.205","TCP","54","135 > 46072 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40441","19.189411","172.30.1.205","172.30.1.104","TCP","54","46072 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40442","19.189541","172.30.1.104","172.30.1.205","TCP","66","49671 > 38710 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40443","19.189549","172.30.1.205","172.30.1.104","TCP","54","38710 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40444","19.189936","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40445","19.190217","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40446","19.190226","172.30.1.205","172.30.1.104","TCP","54","38710 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40447","19.192092","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40448","19.192443","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40449","19.192449","172.30.1.205","172.30.1.104","TCP","54","38710 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40450","19.193844","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40451","19.197050","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40452","19.197059","172.30.1.205","172.30.1.104","TCP","54","38710 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40453","19.198002","172.30.1.205","172.30.1.104","TCP","74","46076 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922424 TSecr=0 WS=128" "40454","19.198308","172.30.1.104","172.30.1.205","TCP","66","135 > 46076 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40455","19.198318","172.30.1.205","172.30.1.104","TCP","54","46076 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40456","19.198674","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40457","19.198973","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40458","19.198982","172.30.1.205","172.30.1.104","TCP","54","46076 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40459","19.201189","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40460","19.201688","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40461","19.201694","172.30.1.205","172.30.1.104","TCP","54","46076 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40462","19.203511","172.30.1.205","172.30.1.104","TCP","54","46076 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40463","19.203622","172.30.1.205","172.30.1.104","TCP","74","38714 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922430 TSecr=0 WS=128" "40464","19.203840","172.30.1.104","172.30.1.205","TCP","54","135 > 46076 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40465","19.203862","172.30.1.104","172.30.1.205","TCP","54","135 > 46076 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40466","19.203867","172.30.1.205","172.30.1.104","TCP","54","46076 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40467","19.203957","172.30.1.104","172.30.1.205","TCP","66","49671 > 38714 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40468","19.203966","172.30.1.205","172.30.1.104","TCP","54","38714 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40469","19.204310","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40470","19.204612","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40471","19.204620","172.30.1.205","172.30.1.104","TCP","54","38714 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40472","19.206522","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40473","19.206884","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40474","19.206890","172.30.1.205","172.30.1.104","TCP","54","38714 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40475","19.208244","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40476","19.211536","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40477","19.211545","172.30.1.205","172.30.1.104","TCP","54","38714 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40478","19.212482","172.30.1.205","172.30.1.104","TCP","74","46080 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922438 TSecr=0 WS=128" "40479","19.212806","172.30.1.104","172.30.1.205","TCP","66","135 > 46080 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40480","19.212818","172.30.1.205","172.30.1.104","TCP","54","46080 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40481","19.213180","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40482","19.213465","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40483","19.213474","172.30.1.205","172.30.1.104","TCP","54","46080 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40484","19.215673","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40485","19.216100","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40486","19.216107","172.30.1.205","172.30.1.104","TCP","54","46080 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40487","19.217955","172.30.1.205","172.30.1.104","TCP","54","46080 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40488","19.218065","172.30.1.205","172.30.1.104","TCP","74","38718 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922444 TSecr=0 WS=128" "40489","19.218216","172.30.1.104","172.30.1.205","TCP","54","135 > 46080 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40490","19.218267","172.30.1.104","172.30.1.205","TCP","54","135 > 46080 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40491","19.218272","172.30.1.205","172.30.1.104","TCP","54","46080 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40492","19.218345","172.30.1.104","172.30.1.205","TCP","66","49671 > 38718 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40493","19.218354","172.30.1.205","172.30.1.104","TCP","54","38718 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40494","19.218697","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40495","19.218997","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40496","19.219006","172.30.1.205","172.30.1.104","TCP","54","38718 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40497","19.220897","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40498","19.222581","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40499","19.222587","172.30.1.205","172.30.1.104","TCP","54","38718 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40500","19.223939","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40501","19.227174","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40502","19.227185","172.30.1.205","172.30.1.104","TCP","54","38718 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40503","19.228139","172.30.1.205","172.30.1.104","TCP","74","46084 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922454 TSecr=0 WS=128" "40504","19.228464","172.30.1.104","172.30.1.205","TCP","66","135 > 46084 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40505","19.228475","172.30.1.205","172.30.1.104","TCP","54","46084 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40506","19.228853","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40507","19.229151","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40508","19.229160","172.30.1.205","172.30.1.104","TCP","54","46084 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40509","19.231355","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40510","19.231770","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40511","19.231776","172.30.1.205","172.30.1.104","TCP","54","46084 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40512","19.233627","172.30.1.205","172.30.1.104","TCP","54","46084 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40513","19.233739","172.30.1.205","172.30.1.104","TCP","74","38722 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922460 TSecr=0 WS=128" "40514","19.233892","172.30.1.104","172.30.1.205","TCP","54","135 > 46084 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40515","19.233914","172.30.1.104","172.30.1.205","TCP","54","135 > 46084 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40516","19.233920","172.30.1.205","172.30.1.104","TCP","54","46084 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40517","19.234002","172.30.1.104","172.30.1.205","TCP","66","49671 > 38722 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40518","19.234010","172.30.1.205","172.30.1.104","TCP","54","38722 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40519","19.234357","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40520","19.234642","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40521","19.234650","172.30.1.205","172.30.1.104","TCP","54","38722 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40522","19.236548","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40523","19.236951","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40524","19.236957","172.30.1.205","172.30.1.104","TCP","54","38722 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40525","19.238332","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40526","19.241583","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40527","19.241593","172.30.1.205","172.30.1.104","TCP","54","38722 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40528","19.242554","172.30.1.205","172.30.1.104","TCP","74","46088 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922468 TSecr=0 WS=128" "40529","19.242991","172.30.1.104","172.30.1.205","TCP","66","135 > 46088 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40530","19.243002","172.30.1.205","172.30.1.104","TCP","54","46088 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40531","19.243365","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40532","19.243775","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40533","19.243784","172.30.1.205","172.30.1.104","TCP","54","46088 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40534","19.246006","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40535","19.246497","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40536","19.246504","172.30.1.205","172.30.1.104","TCP","54","46088 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40537","19.248322","172.30.1.205","172.30.1.104","TCP","54","46088 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40538","19.248433","172.30.1.205","172.30.1.104","TCP","74","38726 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922474 TSecr=0 WS=128" "40539","19.248613","172.30.1.104","172.30.1.205","TCP","54","135 > 46088 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40540","19.248671","172.30.1.104","172.30.1.205","TCP","54","135 > 46088 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40541","19.248677","172.30.1.205","172.30.1.104","TCP","54","46088 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40542","19.248748","172.30.1.104","172.30.1.205","TCP","66","49671 > 38726 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40543","19.248757","172.30.1.205","172.30.1.104","TCP","54","38726 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40544","19.249140","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40545","19.249451","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40546","19.249460","172.30.1.205","172.30.1.104","TCP","54","38726 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40547","19.251346","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40548","19.252192","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40549","19.252204","172.30.1.205","172.30.1.104","TCP","54","38726 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40550","19.253671","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40551","19.256922","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40552","19.256938","172.30.1.205","172.30.1.104","TCP","54","38726 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40553","19.257957","172.30.1.205","172.30.1.104","TCP","74","46092 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922484 TSecr=0 WS=128" "40554","19.258386","172.30.1.104","172.30.1.205","TCP","66","135 > 46092 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40555","19.258409","172.30.1.205","172.30.1.104","TCP","54","46092 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40556","19.258998","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40557","19.259322","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40558","19.259331","172.30.1.205","172.30.1.104","TCP","54","46092 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40559","19.261564","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40560","19.262284","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40561","19.262291","172.30.1.205","172.30.1.104","TCP","54","46092 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40562","19.264127","172.30.1.205","172.30.1.104","TCP","54","46092 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40563","19.264249","172.30.1.205","172.30.1.104","TCP","74","38730 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922490 TSecr=0 WS=128" "40564","19.264392","172.30.1.104","172.30.1.205","TCP","54","135 > 46092 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40565","19.264443","172.30.1.104","172.30.1.205","TCP","54","135 > 46092 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40566","19.264449","172.30.1.205","172.30.1.104","TCP","54","46092 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40567","19.264614","172.30.1.104","172.30.1.205","TCP","66","49671 > 38730 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40568","19.264622","172.30.1.205","172.30.1.104","TCP","54","38730 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40569","19.265003","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40570","19.265301","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40571","19.265312","172.30.1.205","172.30.1.104","TCP","54","38730 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40572","19.267216","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40573","19.267572","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40574","19.267576","172.30.1.205","172.30.1.104","TCP","54","38730 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40575","19.268975","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40576","19.272330","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40577","19.272340","172.30.1.205","172.30.1.104","TCP","54","38730 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40578","19.273323","172.30.1.205","172.30.1.104","TCP","74","46096 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922499 TSecr=0 WS=128" "40579","19.273617","172.30.1.104","172.30.1.205","TCP","66","135 > 46096 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40580","19.273627","172.30.1.205","172.30.1.104","TCP","54","46096 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40581","19.273985","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40582","19.274260","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40583","19.274269","172.30.1.205","172.30.1.104","TCP","54","46096 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40584","19.276461","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40585","19.276882","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40586","19.276889","172.30.1.205","172.30.1.104","TCP","54","46096 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40587","19.278738","172.30.1.205","172.30.1.104","TCP","54","46096 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40588","19.278862","172.30.1.205","172.30.1.104","TCP","74","38734 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922505 TSecr=0 WS=128" "40589","19.279026","172.30.1.104","172.30.1.205","TCP","54","135 > 46096 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40590","19.279035","172.30.1.104","172.30.1.205","TCP","54","135 > 46096 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40591","19.279040","172.30.1.205","172.30.1.104","TCP","54","46096 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40592","19.279142","172.30.1.104","172.30.1.205","TCP","66","49671 > 38734 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40593","19.279150","172.30.1.205","172.30.1.104","TCP","54","38734 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40594","19.279495","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40595","19.279799","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40596","19.279808","172.30.1.205","172.30.1.104","TCP","54","38734 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40597","19.281774","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40598","19.282124","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40599","19.282133","172.30.1.205","172.30.1.104","TCP","54","38734 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40600","19.283514","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40601","19.286714","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40602","19.286726","172.30.1.205","172.30.1.104","TCP","54","38734 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40603","19.287697","172.30.1.205","172.30.1.104","TCP","74","46100 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922514 TSecr=0 WS=128" "40604","19.287989","172.30.1.104","172.30.1.205","TCP","66","135 > 46100 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40605","19.288000","172.30.1.205","172.30.1.104","TCP","54","46100 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40606","19.288349","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40607","19.288642","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40608","19.288653","172.30.1.205","172.30.1.104","TCP","54","46100 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40609","19.290871","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40610","19.291298","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40611","19.291305","172.30.1.205","172.30.1.104","TCP","54","46100 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40612","19.293140","172.30.1.205","172.30.1.104","TCP","54","46100 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40613","19.293252","172.30.1.205","172.30.1.104","TCP","74","38738 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922519 TSecr=0 WS=128" "40614","19.293403","172.30.1.104","172.30.1.205","TCP","54","135 > 46100 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40615","19.293432","172.30.1.104","172.30.1.205","TCP","54","135 > 46100 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40616","19.293438","172.30.1.205","172.30.1.104","TCP","54","46100 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40617","19.293544","172.30.1.104","172.30.1.205","TCP","66","49671 > 38738 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40618","19.293552","172.30.1.205","172.30.1.104","TCP","54","38738 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40619","19.293904","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40620","19.294177","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40621","19.294186","172.30.1.205","172.30.1.104","TCP","54","38738 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40622","19.296068","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40623","19.296431","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40624","19.296436","172.30.1.205","172.30.1.104","TCP","54","38738 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40625","19.297820","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40626","19.300873","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40627","19.300883","172.30.1.205","172.30.1.104","TCP","54","38738 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40628","19.301834","172.30.1.205","172.30.1.104","TCP","74","46104 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922528 TSecr=0 WS=128" "40629","19.302156","172.30.1.104","172.30.1.205","TCP","66","135 > 46104 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40630","19.302171","172.30.1.205","172.30.1.104","TCP","54","46104 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40631","19.302519","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40632","19.302814","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40633","19.302823","172.30.1.205","172.30.1.104","TCP","54","46104 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40634","19.305031","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40635","19.305428","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40636","19.305435","172.30.1.205","172.30.1.104","TCP","54","46104 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40637","19.307245","172.30.1.205","172.30.1.104","TCP","54","46104 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40638","19.307356","172.30.1.205","172.30.1.104","TCP","74","38742 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922533 TSecr=0 WS=128" "40639","19.307537","172.30.1.104","172.30.1.205","TCP","54","135 > 46104 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40640","19.307552","172.30.1.104","172.30.1.205","TCP","54","135 > 46104 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40641","19.307557","172.30.1.205","172.30.1.104","TCP","54","46104 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40642","19.307674","172.30.1.104","172.30.1.205","TCP","66","49671 > 38742 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40643","19.307683","172.30.1.205","172.30.1.104","TCP","54","38742 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40644","19.308027","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40645","19.308343","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40646","19.308351","172.30.1.205","172.30.1.104","TCP","54","38742 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40647","19.310237","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40648","19.310626","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40649","19.310633","172.30.1.205","172.30.1.104","TCP","54","38742 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40650","19.311976","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40651","19.315203","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40652","19.315212","172.30.1.205","172.30.1.104","TCP","54","38742 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40653","19.316152","172.30.1.205","172.30.1.104","TCP","74","46108 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922542 TSecr=0 WS=128" "40654","19.316487","172.30.1.104","172.30.1.205","TCP","66","135 > 46108 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40655","19.316500","172.30.1.205","172.30.1.104","TCP","54","46108 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40656","19.316881","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40657","19.317189","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40658","19.317197","172.30.1.205","172.30.1.104","TCP","54","46108 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40659","19.319383","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40660","19.319816","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40661","19.319822","172.30.1.205","172.30.1.104","TCP","54","46108 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40662","19.321671","172.30.1.205","172.30.1.104","TCP","54","46108 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40663","19.321783","172.30.1.205","172.30.1.104","TCP","74","38746 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922548 TSecr=0 WS=128" "40664","19.321978","172.30.1.104","172.30.1.205","TCP","54","135 > 46108 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40665","19.321990","172.30.1.104","172.30.1.205","TCP","54","135 > 46108 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40666","19.321997","172.30.1.205","172.30.1.104","TCP","54","46108 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40667","19.322072","172.30.1.104","172.30.1.205","TCP","66","49671 > 38746 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40668","19.322083","172.30.1.205","172.30.1.104","TCP","54","38746 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40669","19.322489","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40670","19.322778","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40671","19.322788","172.30.1.205","172.30.1.104","TCP","54","38746 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40672","19.324685","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40673","19.325156","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40674","19.325162","172.30.1.205","172.30.1.104","TCP","54","38746 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40675","19.326508","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40676","19.331619","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40677","19.331630","172.30.1.205","172.30.1.104","TCP","54","38746 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40678","19.332582","172.30.1.205","172.30.1.104","TCP","74","46112 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922559 TSecr=0 WS=128" "40679","19.332863","172.30.1.104","172.30.1.205","TCP","66","135 > 46112 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40680","19.332874","172.30.1.205","172.30.1.104","TCP","54","46112 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40681","19.333229","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40682","19.333582","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40683","19.333596","172.30.1.205","172.30.1.104","TCP","54","46112 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40684","19.335859","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40685","19.336314","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40686","19.336321","172.30.1.205","172.30.1.104","TCP","54","46112 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40687","19.338161","172.30.1.205","172.30.1.104","TCP","54","46112 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40688","19.338284","172.30.1.205","172.30.1.104","TCP","74","38750 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922564 TSecr=0 WS=128" "40689","19.338481","172.30.1.104","172.30.1.205","TCP","54","135 > 46112 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40690","19.338516","172.30.1.104","172.30.1.205","TCP","54","135 > 46112 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40691","19.338522","172.30.1.205","172.30.1.104","TCP","54","46112 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40692","19.338625","172.30.1.104","172.30.1.205","TCP","66","49671 > 38750 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40693","19.338634","172.30.1.205","172.30.1.104","TCP","54","38750 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40694","19.338982","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40695","19.339247","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40696","19.339255","172.30.1.205","172.30.1.104","TCP","54","38750 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40697","19.341162","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40698","19.341511","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40699","19.341517","172.30.1.205","172.30.1.104","TCP","54","38750 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40700","19.342861","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40701","19.346028","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40702","19.346039","172.30.1.205","172.30.1.104","TCP","54","38750 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40703","19.347000","172.30.1.205","172.30.1.104","TCP","74","46116 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922573 TSecr=0 WS=128" "40704","19.347303","172.30.1.104","172.30.1.205","TCP","66","135 > 46116 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40705","19.347314","172.30.1.205","172.30.1.104","TCP","54","46116 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40706","19.347658","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40707","19.347943","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40708","19.347952","172.30.1.205","172.30.1.104","TCP","54","46116 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40709","19.350164","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40710","19.350550","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40711","19.350557","172.30.1.205","172.30.1.104","TCP","54","46116 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40712","19.352359","172.30.1.205","172.30.1.104","TCP","54","46116 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40713","19.352468","172.30.1.205","172.30.1.104","TCP","74","38754 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922578 TSecr=0 WS=128" "40714","19.352616","172.30.1.104","172.30.1.205","TCP","54","135 > 46116 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40715","19.352661","172.30.1.104","172.30.1.205","TCP","54","135 > 46116 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40716","19.352667","172.30.1.205","172.30.1.104","TCP","54","46116 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40717","19.352755","172.30.1.104","172.30.1.205","TCP","66","49671 > 38754 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40718","19.352763","172.30.1.205","172.30.1.104","TCP","54","38754 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40719","19.353118","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40720","19.353396","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40721","19.353406","172.30.1.205","172.30.1.104","TCP","54","38754 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40722","19.355266","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40723","19.355636","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40724","19.355642","172.30.1.205","172.30.1.104","TCP","54","38754 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40725","19.357011","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40726","19.360272","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40727","19.360283","172.30.1.205","172.30.1.104","TCP","54","38754 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40728","19.361252","172.30.1.205","172.30.1.104","TCP","74","46120 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922587 TSecr=0 WS=128" "40729","19.361578","172.30.1.104","172.30.1.205","TCP","66","135 > 46120 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40730","19.361589","172.30.1.205","172.30.1.104","TCP","54","46120 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40731","19.361954","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40732","19.366982","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40733","19.366991","172.30.1.205","172.30.1.104","TCP","54","46120 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40734","19.369235","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40735","19.370236","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40736","19.370243","172.30.1.205","172.30.1.104","TCP","54","46120 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40737","19.371150","172.30.1.205","172.30.1.104","TCP","54","38710 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40738","19.371198","172.30.1.205","172.30.1.104","TCP","54","38714 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40739","19.371244","172.30.1.205","172.30.1.104","TCP","54","38718 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40740","19.371280","172.30.1.205","172.30.1.104","TCP","54","38722 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40741","19.371312","172.30.1.205","172.30.1.104","TCP","54","38726 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40742","19.371344","172.30.1.205","172.30.1.104","TCP","54","38730 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40743","19.371377","172.30.1.205","172.30.1.104","TCP","54","38734 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40744","19.371400","172.30.1.205","172.30.1.104","TCP","54","38738 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40745","19.371414","172.30.1.104","172.30.1.205","TCP","54","49671 > 38710 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40746","19.371450","172.30.1.205","172.30.1.104","TCP","54","38742 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40747","19.371484","172.30.1.205","172.30.1.104","TCP","54","38746 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40748","19.371510","172.30.1.205","172.30.1.104","TCP","54","38750 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40749","19.371520","172.30.1.104","172.30.1.205","TCP","54","49671 > 38714 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40750","19.371539","172.30.1.104","172.30.1.205","TCP","54","49671 > 38710 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40751","19.371545","172.30.1.205","172.30.1.104","TCP","54","38710 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40752","19.371559","172.30.1.104","172.30.1.205","TCP","54","49671 > 38714 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40753","19.371561","172.30.1.205","172.30.1.104","TCP","54","38714 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40754","19.371573","172.30.1.205","172.30.1.104","TCP","54","38754 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "40755","19.371579","172.30.1.104","172.30.1.205","TCP","54","49671 > 38718 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40756","19.371601","172.30.1.104","172.30.1.205","TCP","54","49671 > 38722 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40757","19.371726","172.30.1.104","172.30.1.205","TCP","54","49671 > 38726 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40758","19.371745","172.30.1.104","172.30.1.205","TCP","54","49671 > 38718 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40759","19.371750","172.30.1.205","172.30.1.104","TCP","54","38718 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40760","19.371764","172.30.1.104","172.30.1.205","TCP","54","49671 > 38722 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40761","19.371767","172.30.1.205","172.30.1.104","TCP","54","38722 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40762","19.371809","172.30.1.104","172.30.1.205","TCP","54","49671 > 38726 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40763","19.371811","172.30.1.205","172.30.1.104","TCP","54","38726 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40764","19.371814","172.30.1.104","172.30.1.205","TCP","54","49671 > 38730 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40765","19.371835","172.30.1.104","172.30.1.205","TCP","54","49671 > 38734 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40766","19.371939","172.30.1.104","172.30.1.205","TCP","54","49671 > 38738 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40767","19.371958","172.30.1.104","172.30.1.205","TCP","54","49671 > 38742 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40768","19.371978","172.30.1.104","172.30.1.205","TCP","54","49671 > 38738 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40769","19.371982","172.30.1.205","172.30.1.104","TCP","54","38738 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40770","19.372054","172.30.1.104","172.30.1.205","TCP","54","49671 > 38730 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40771","19.372058","172.30.1.205","172.30.1.104","TCP","54","38730 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40772","19.372072","172.30.1.104","172.30.1.205","TCP","54","49671 > 38734 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40773","19.372073","172.30.1.205","172.30.1.104","TCP","54","38734 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40774","19.372075","172.30.1.104","172.30.1.205","TCP","54","49671 > 38742 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40775","19.372076","172.30.1.205","172.30.1.104","TCP","54","38742 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40776","19.372081","172.30.1.104","172.30.1.205","TCP","54","49671 > 38746 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40777","19.372091","172.30.1.104","172.30.1.205","TCP","54","49671 > 38750 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40778","19.372200","172.30.1.104","172.30.1.205","TCP","54","49671 > 38746 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40779","19.372204","172.30.1.205","172.30.1.104","TCP","54","38746 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40780","19.372216","172.30.1.104","172.30.1.205","TCP","54","49671 > 38754 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40781","19.372237","172.30.1.104","172.30.1.205","TCP","54","49671 > 38750 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40782","19.372240","172.30.1.205","172.30.1.104","TCP","54","38750 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40783","19.372256","172.30.1.104","172.30.1.205","TCP","54","49671 > 38754 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "40784","19.372258","172.30.1.205","172.30.1.104","TCP","54","38754 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "40785","19.373179","172.30.1.205","172.30.1.104","TCP","54","46120 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40786","19.373289","172.30.1.205","172.30.1.104","TCP","74","38758 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922599 TSecr=0 WS=128" "40787","19.373432","172.30.1.104","172.30.1.205","TCP","54","135 > 46120 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40788","19.373441","172.30.1.104","172.30.1.205","TCP","54","135 > 46120 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40789","19.373446","172.30.1.205","172.30.1.104","TCP","54","46120 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40790","19.373549","172.30.1.104","172.30.1.205","TCP","66","49671 > 38758 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40791","19.373556","172.30.1.205","172.30.1.104","TCP","54","38758 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40792","19.373950","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40793","19.374224","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40794","19.374233","172.30.1.205","172.30.1.104","TCP","54","38758 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40795","19.376331","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40796","19.376810","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40797","19.376818","172.30.1.205","172.30.1.104","TCP","54","38758 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40798","19.378222","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40799","19.381492","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40800","19.381503","172.30.1.205","172.30.1.104","TCP","54","38758 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40801","19.382507","172.30.1.205","172.30.1.104","TCP","74","46124 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922608 TSecr=0 WS=128" "40802","19.382833","172.30.1.104","172.30.1.205","TCP","66","135 > 46124 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40803","19.382844","172.30.1.205","172.30.1.104","TCP","54","46124 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40804","19.383207","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40805","19.383577","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40806","19.383586","172.30.1.205","172.30.1.104","TCP","54","46124 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40807","19.385825","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40808","19.386279","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40809","19.386285","172.30.1.205","172.30.1.104","TCP","54","46124 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40810","19.388110","172.30.1.205","172.30.1.104","TCP","54","46124 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40811","19.388225","172.30.1.205","172.30.1.104","TCP","74","38762 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922614 TSecr=0 WS=128" "40812","19.388397","172.30.1.104","172.30.1.205","TCP","54","135 > 46124 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40813","19.388420","172.30.1.104","172.30.1.205","TCP","54","135 > 46124 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40814","19.388426","172.30.1.205","172.30.1.104","TCP","54","46124 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40815","19.388506","172.30.1.104","172.30.1.205","TCP","66","49671 > 38762 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40816","19.388514","172.30.1.205","172.30.1.104","TCP","54","38762 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40817","19.388909","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40818","19.389219","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40819","19.389228","172.30.1.205","172.30.1.104","TCP","54","38762 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40820","19.391102","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40821","19.391487","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40822","19.391494","172.30.1.205","172.30.1.104","TCP","54","38762 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40823","19.392889","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40824","19.396142","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40825","19.396154","172.30.1.205","172.30.1.104","TCP","54","38762 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40826","19.397133","172.30.1.205","172.30.1.104","TCP","74","46128 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922623 TSecr=0 WS=128" "40827","19.397451","172.30.1.104","172.30.1.205","TCP","66","135 > 46128 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40828","19.397462","172.30.1.205","172.30.1.104","TCP","54","46128 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40829","19.397821","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40830","19.398100","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40831","19.398109","172.30.1.205","172.30.1.104","TCP","54","46128 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40832","19.400306","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40833","19.400736","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40834","19.400749","172.30.1.205","172.30.1.104","TCP","54","46128 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40835","19.402695","172.30.1.205","172.30.1.104","TCP","54","46128 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40836","19.402808","172.30.1.205","172.30.1.104","TCP","74","38766 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922629 TSecr=0 WS=128" "40837","19.402971","172.30.1.104","172.30.1.205","TCP","54","135 > 46128 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40838","19.403036","172.30.1.104","172.30.1.205","TCP","54","135 > 46128 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40839","19.403046","172.30.1.205","172.30.1.104","TCP","54","46128 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40840","19.403120","172.30.1.104","172.30.1.205","TCP","66","49671 > 38766 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40841","19.403129","172.30.1.205","172.30.1.104","TCP","54","38766 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40842","19.403475","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40843","19.404272","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40844","19.404281","172.30.1.205","172.30.1.104","TCP","54","38766 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40845","19.406210","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40846","19.406635","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40847","19.406642","172.30.1.205","172.30.1.104","TCP","54","38766 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40848","19.407994","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40849","19.411247","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40850","19.411257","172.30.1.205","172.30.1.104","TCP","54","38766 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40851","19.412199","172.30.1.205","172.30.1.104","TCP","74","46132 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922638 TSecr=0 WS=128" "40852","19.412543","172.30.1.104","172.30.1.205","TCP","66","135 > 46132 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40853","19.412555","172.30.1.205","172.30.1.104","TCP","54","46132 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40854","19.412943","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40855","19.413227","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40856","19.413236","172.30.1.205","172.30.1.104","TCP","54","46132 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40857","19.415432","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40858","19.415887","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40859","19.415894","172.30.1.205","172.30.1.104","TCP","54","46132 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40860","19.417738","172.30.1.205","172.30.1.104","TCP","54","46132 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40861","19.417854","172.30.1.205","172.30.1.104","TCP","74","38770 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922644 TSecr=0 WS=128" "40862","19.418051","172.30.1.104","172.30.1.205","TCP","54","135 > 46132 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40863","19.418061","172.30.1.104","172.30.1.205","TCP","54","135 > 46132 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40864","19.418066","172.30.1.205","172.30.1.104","TCP","54","46132 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40865","19.418146","172.30.1.104","172.30.1.205","TCP","66","49671 > 38770 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40866","19.418155","172.30.1.205","172.30.1.104","TCP","54","38770 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40867","19.418521","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40868","19.418835","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40869","19.418843","172.30.1.205","172.30.1.104","TCP","54","38770 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40870","19.420728","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40871","19.421087","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40872","19.421094","172.30.1.205","172.30.1.104","TCP","54","38770 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40873","19.422462","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40874","19.425705","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40875","19.425720","172.30.1.205","172.30.1.104","TCP","54","38770 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40876","19.426741","172.30.1.205","172.30.1.104","TCP","74","46136 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922653 TSecr=0 WS=128" "40877","19.427058","172.30.1.104","172.30.1.205","TCP","66","135 > 46136 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40878","19.427071","172.30.1.205","172.30.1.104","TCP","54","46136 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40879","19.427428","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40880","19.427747","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40881","19.427758","172.30.1.205","172.30.1.104","TCP","54","46136 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40882","19.429991","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40883","19.430426","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40884","19.430434","172.30.1.205","172.30.1.104","TCP","54","46136 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40885","19.432249","172.30.1.205","172.30.1.104","TCP","54","46136 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40886","19.432373","172.30.1.205","172.30.1.104","TCP","74","38774 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922658 TSecr=0 WS=128" "40887","19.432523","172.30.1.104","172.30.1.205","TCP","54","135 > 46136 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40888","19.432551","172.30.1.104","172.30.1.205","TCP","54","135 > 46136 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40889","19.432556","172.30.1.205","172.30.1.104","TCP","54","46136 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40890","19.432637","172.30.1.104","172.30.1.205","TCP","66","49671 > 38774 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40891","19.432645","172.30.1.205","172.30.1.104","TCP","54","38774 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40892","19.433020","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40893","19.433304","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40894","19.433313","172.30.1.205","172.30.1.104","TCP","54","38774 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40895","19.435171","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40896","19.435555","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40897","19.435561","172.30.1.205","172.30.1.104","TCP","54","38774 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40898","19.436930","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40899","19.440103","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40900","19.440116","172.30.1.205","172.30.1.104","TCP","54","38774 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40901","19.441100","172.30.1.205","172.30.1.104","TCP","74","46140 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922667 TSecr=0 WS=128" "40902","19.441460","172.30.1.104","172.30.1.205","TCP","66","135 > 46140 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40903","19.441471","172.30.1.205","172.30.1.104","TCP","54","46140 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40904","19.441830","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40905","19.442189","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40906","19.442201","172.30.1.205","172.30.1.104","TCP","54","46140 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40907","19.444410","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40908","19.444798","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40909","19.444804","172.30.1.205","172.30.1.104","TCP","54","46140 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40910","19.446631","172.30.1.205","172.30.1.104","TCP","54","46140 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40911","19.446747","172.30.1.205","172.30.1.104","TCP","74","38778 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922673 TSecr=0 WS=128" "40912","19.446903","172.30.1.104","172.30.1.205","TCP","54","135 > 46140 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40913","19.446943","172.30.1.104","172.30.1.205","TCP","54","135 > 46140 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40914","19.446949","172.30.1.205","172.30.1.104","TCP","54","46140 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40915","19.447023","172.30.1.104","172.30.1.205","TCP","66","49671 > 38778 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40916","19.447035","172.30.1.205","172.30.1.104","TCP","54","38778 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40917","19.447384","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40918","19.449422","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40919","19.449430","172.30.1.205","172.30.1.104","TCP","54","38778 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40920","19.451320","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40921","19.451734","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40922","19.451741","172.30.1.205","172.30.1.104","TCP","54","38778 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40923","19.453126","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40924","19.456350","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40925","19.456360","172.30.1.205","172.30.1.104","TCP","54","38778 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40926","19.457323","172.30.1.205","172.30.1.104","TCP","74","46144 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922683 TSecr=0 WS=128" "40927","19.457622","172.30.1.104","172.30.1.205","TCP","66","135 > 46144 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40928","19.457633","172.30.1.205","172.30.1.104","TCP","54","46144 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40929","19.457993","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40930","19.458276","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40931","19.458285","172.30.1.205","172.30.1.104","TCP","54","46144 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40932","19.460492","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40933","19.460910","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40934","19.460925","172.30.1.205","172.30.1.104","TCP","54","46144 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40935","19.462730","172.30.1.205","172.30.1.104","TCP","54","46144 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40936","19.462841","172.30.1.205","172.30.1.104","TCP","74","38782 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922689 TSecr=0 WS=128" "40937","19.463060","172.30.1.104","172.30.1.205","TCP","54","135 > 46144 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40938","19.463068","172.30.1.104","172.30.1.205","TCP","54","135 > 46144 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40939","19.463073","172.30.1.205","172.30.1.104","TCP","54","46144 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40940","19.463142","172.30.1.104","172.30.1.205","TCP","66","49671 > 38782 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40941","19.463151","172.30.1.205","172.30.1.104","TCP","54","38782 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40942","19.463504","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40943","19.463802","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40944","19.463811","172.30.1.205","172.30.1.104","TCP","54","38782 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40945","19.465774","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40946","19.466211","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40947","19.466217","172.30.1.205","172.30.1.104","TCP","54","38782 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40948","19.467611","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40949","19.470850","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40950","19.470860","172.30.1.205","172.30.1.104","TCP","54","38782 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40951","19.471802","172.30.1.205","172.30.1.104","TCP","74","46148 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922698 TSecr=0 WS=128" "40952","19.472090","172.30.1.104","172.30.1.205","TCP","66","135 > 46148 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40953","19.472110","172.30.1.205","172.30.1.104","TCP","54","46148 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40954","19.472651","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40955","19.472950","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40956","19.472959","172.30.1.205","172.30.1.104","TCP","54","46148 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40957","19.475207","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40958","19.475622","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40959","19.475629","172.30.1.205","172.30.1.104","TCP","54","46148 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40960","19.477500","172.30.1.205","172.30.1.104","TCP","54","46148 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40961","19.477609","172.30.1.205","172.30.1.104","TCP","74","38786 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922704 TSecr=0 WS=128" "40962","19.477749","172.30.1.104","172.30.1.205","TCP","54","135 > 46148 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40963","19.477798","172.30.1.104","172.30.1.205","TCP","54","135 > 46148 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40964","19.477803","172.30.1.205","172.30.1.104","TCP","54","46148 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40965","19.477913","172.30.1.104","172.30.1.205","TCP","66","49671 > 38786 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40966","19.477922","172.30.1.205","172.30.1.104","TCP","54","38786 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40967","19.478288","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40968","19.478550","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40969","19.478559","172.30.1.205","172.30.1.104","TCP","54","38786 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40970","19.480521","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40971","19.480918","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40972","19.480924","172.30.1.205","172.30.1.104","TCP","54","38786 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40973","19.482356","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40974","19.485705","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "40975","19.485715","172.30.1.205","172.30.1.104","TCP","54","38786 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "40976","19.486649","172.30.1.205","172.30.1.104","TCP","74","46152 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922713 TSecr=0 WS=128" "40977","19.486966","172.30.1.104","172.30.1.205","TCP","66","135 > 46152 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40978","19.486987","172.30.1.205","172.30.1.104","TCP","54","46152 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40979","19.487474","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "40980","19.491112","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40981","19.491123","172.30.1.205","172.30.1.104","TCP","54","46152 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40982","19.493432","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "40983","19.493860","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "40984","19.493866","172.30.1.205","172.30.1.104","TCP","54","46152 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "40985","19.495714","172.30.1.205","172.30.1.104","TCP","54","46152 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "40986","19.495820","172.30.1.205","172.30.1.104","TCP","74","38790 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922722 TSecr=0 WS=128" "40987","19.495972","172.30.1.104","172.30.1.205","TCP","54","135 > 46152 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40988","19.495994","172.30.1.104","172.30.1.205","TCP","54","135 > 46152 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "40989","19.496010","172.30.1.205","172.30.1.104","TCP","54","46152 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "40990","19.496112","172.30.1.104","172.30.1.205","TCP","66","49671 > 38790 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "40991","19.496120","172.30.1.205","172.30.1.104","TCP","54","38790 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "40992","19.496466","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "40993","19.496791","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "40994","19.496812","172.30.1.205","172.30.1.104","TCP","54","38790 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "40995","19.498730","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "40996","19.499140","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "40997","19.499152","172.30.1.205","172.30.1.104","TCP","54","38790 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "40998","19.500681","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "40999","19.503830","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41000","19.503839","172.30.1.205","172.30.1.104","TCP","54","38790 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41001","19.504802","172.30.1.205","172.30.1.104","TCP","74","46156 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922731 TSecr=0 WS=128" "41002","19.505106","172.30.1.104","172.30.1.205","TCP","66","135 > 46156 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41003","19.505117","172.30.1.205","172.30.1.104","TCP","54","46156 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41004","19.505469","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41005","19.505789","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41006","19.505798","172.30.1.205","172.30.1.104","TCP","54","46156 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41007","19.507997","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41008","19.508426","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41009","19.508433","172.30.1.205","172.30.1.104","TCP","54","46156 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41010","19.510246","172.30.1.205","172.30.1.104","TCP","54","46156 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41011","19.510355","172.30.1.205","172.30.1.104","TCP","74","38794 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922736 TSecr=0 WS=128" "41012","19.510524","172.30.1.104","172.30.1.205","TCP","54","135 > 46156 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41013","19.510547","172.30.1.104","172.30.1.205","TCP","54","135 > 46156 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41014","19.510552","172.30.1.205","172.30.1.104","TCP","54","46156 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41015","19.510664","172.30.1.104","172.30.1.205","TCP","66","49671 > 38794 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41016","19.510672","172.30.1.205","172.30.1.104","TCP","54","38794 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41017","19.511033","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41018","19.511351","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41019","19.511360","172.30.1.205","172.30.1.104","TCP","54","38794 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41020","19.513245","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41021","19.513615","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41022","19.513621","172.30.1.205","172.30.1.104","TCP","54","38794 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41023","19.514958","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41024","19.518230","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41025","19.518241","172.30.1.205","172.30.1.104","TCP","54","38794 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41026","19.519184","172.30.1.205","172.30.1.104","TCP","74","46160 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922745 TSecr=0 WS=128" "41027","19.519534","172.30.1.104","172.30.1.205","TCP","66","135 > 46160 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41028","19.519554","172.30.1.205","172.30.1.104","TCP","54","46160 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41029","19.520034","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41030","19.520349","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41031","19.520358","172.30.1.205","172.30.1.104","TCP","54","46160 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41032","19.522571","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41033","19.522994","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41034","19.523001","172.30.1.205","172.30.1.104","TCP","54","46160 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41035","19.524818","172.30.1.205","172.30.1.104","TCP","54","46160 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41036","19.524929","172.30.1.205","172.30.1.104","TCP","74","38798 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922751 TSecr=0 WS=128" "41037","19.525099","172.30.1.104","172.30.1.205","TCP","54","135 > 46160 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41038","19.525154","172.30.1.104","172.30.1.205","TCP","54","135 > 46160 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41039","19.525160","172.30.1.205","172.30.1.104","TCP","54","46160 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41040","19.525231","172.30.1.104","172.30.1.205","TCP","66","49671 > 38798 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41041","19.525239","172.30.1.205","172.30.1.104","TCP","54","38798 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41042","19.525583","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41043","19.525894","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41044","19.525903","172.30.1.205","172.30.1.104","TCP","54","38798 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41045","19.527790","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41046","19.528161","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41047","19.528168","172.30.1.205","172.30.1.104","TCP","54","38798 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41048","19.529554","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41049","19.532745","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41050","19.532755","172.30.1.205","172.30.1.104","TCP","54","38798 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41051","19.533716","172.30.1.205","172.30.1.104","TCP","74","46164 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922760 TSecr=0 WS=128" "41052","19.534018","172.30.1.104","172.30.1.205","TCP","66","135 > 46164 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41053","19.534028","172.30.1.205","172.30.1.104","TCP","54","46164 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41054","19.534375","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41055","19.534707","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41056","19.534716","172.30.1.205","172.30.1.104","TCP","54","46164 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41057","19.536923","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41058","19.537306","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41059","19.537312","172.30.1.205","172.30.1.104","TCP","54","46164 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41060","19.539109","172.30.1.205","172.30.1.104","TCP","54","46164 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41061","19.539223","172.30.1.205","172.30.1.104","TCP","74","38802 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922765 TSecr=0 WS=128" "41062","19.539377","172.30.1.104","172.30.1.205","TCP","54","135 > 46164 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41063","19.539419","172.30.1.104","172.30.1.205","TCP","54","135 > 46164 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41064","19.539424","172.30.1.205","172.30.1.104","TCP","54","46164 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41065","19.539538","172.30.1.104","172.30.1.205","TCP","66","49671 > 38802 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41066","19.539545","172.30.1.205","172.30.1.104","TCP","54","38802 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41067","19.539906","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41068","19.540182","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41069","19.540190","172.30.1.205","172.30.1.104","TCP","54","38802 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41070","19.542072","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41071","19.542438","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41072","19.542446","172.30.1.205","172.30.1.104","TCP","54","38802 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41073","19.543779","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41074","19.547123","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41075","19.547133","172.30.1.205","172.30.1.104","TCP","54","38802 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41076","19.548103","172.30.1.205","172.30.1.104","TCP","74","46168 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922774 TSecr=0 WS=128" "41077","19.548494","172.30.1.104","172.30.1.205","TCP","66","135 > 46168 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41078","19.548504","172.30.1.205","172.30.1.104","TCP","54","46168 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41079","19.548888","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41080","19.549206","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41081","19.549216","172.30.1.205","172.30.1.104","TCP","54","46168 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41082","19.551437","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41083","19.551867","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41084","19.551880","172.30.1.205","172.30.1.104","TCP","54","46168 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41085","19.552974","172.30.1.205","172.30.1.104","TCP","54","38762 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41086","19.553031","172.30.1.205","172.30.1.104","TCP","54","38766 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41087","19.553068","172.30.1.205","172.30.1.104","TCP","54","38770 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41088","19.553096","172.30.1.205","172.30.1.104","TCP","54","38774 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41089","19.553123","172.30.1.205","172.30.1.104","TCP","54","38778 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41090","19.553149","172.30.1.205","172.30.1.104","TCP","54","38782 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41091","19.553182","172.30.1.205","172.30.1.104","TCP","54","38786 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41092","19.553208","172.30.1.205","172.30.1.104","TCP","54","38790 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41093","19.553240","172.30.1.205","172.30.1.104","TCP","54","38794 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41094","19.553266","172.30.1.205","172.30.1.104","TCP","54","38798 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41095","19.553298","172.30.1.205","172.30.1.104","TCP","54","38802 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41096","19.553364","172.30.1.205","172.30.1.104","TCP","54","38758 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41097","19.553436","172.30.1.104","172.30.1.205","TCP","54","49671 > 38762 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41098","19.553452","172.30.1.104","172.30.1.205","TCP","54","49671 > 38766 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41099","19.553486","172.30.1.104","172.30.1.205","TCP","54","49671 > 38770 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41100","19.553490","172.30.1.104","172.30.1.205","TCP","54","49671 > 38762 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41101","19.553496","172.30.1.205","172.30.1.104","TCP","54","38762 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41102","19.553529","172.30.1.104","172.30.1.205","TCP","54","49671 > 38774 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41103","19.553551","172.30.1.104","172.30.1.205","TCP","54","49671 > 38778 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41104","19.553571","172.30.1.104","172.30.1.205","TCP","54","49671 > 38774 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41105","19.553576","172.30.1.205","172.30.1.104","TCP","54","38774 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41106","19.553596","172.30.1.104","172.30.1.205","TCP","54","49671 > 38782 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41107","19.553623","172.30.1.104","172.30.1.205","TCP","54","49671 > 38782 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41108","19.553626","172.30.1.205","172.30.1.104","TCP","54","38782 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41109","19.553642","172.30.1.104","172.30.1.205","TCP","54","49671 > 38786 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41110","19.553663","172.30.1.104","172.30.1.205","TCP","54","49671 > 38778 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41111","19.553665","172.30.1.205","172.30.1.104","TCP","54","38778 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41112","19.553789","172.30.1.104","172.30.1.205","TCP","54","49671 > 38790 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41113","19.553819","172.30.1.104","172.30.1.205","TCP","54","49671 > 38790 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41114","19.553823","172.30.1.205","172.30.1.104","TCP","54","38790 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41115","19.553839","172.30.1.104","172.30.1.205","TCP","54","49671 > 38786 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41116","19.553841","172.30.1.205","172.30.1.104","TCP","54","38786 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41117","19.553862","172.30.1.104","172.30.1.205","TCP","54","49671 > 38766 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41118","19.553864","172.30.1.205","172.30.1.104","TCP","54","38766 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41119","19.553884","172.30.1.104","172.30.1.205","TCP","54","49671 > 38770 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41120","19.553887","172.30.1.205","172.30.1.104","TCP","54","38770 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41121","19.553919","172.30.1.104","172.30.1.205","TCP","54","49671 > 38798 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41122","19.553937","172.30.1.104","172.30.1.205","TCP","54","49671 > 38802 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41123","19.553956","172.30.1.104","172.30.1.205","TCP","54","49671 > 38758 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41124","19.554053","172.30.1.104","172.30.1.205","TCP","54","49671 > 38798 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41125","19.554058","172.30.1.205","172.30.1.104","TCP","54","38798 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41126","19.554088","172.30.1.104","172.30.1.205","TCP","54","49671 > 38794 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41127","19.554106","172.30.1.104","172.30.1.205","TCP","54","49671 > 38794 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41128","19.554109","172.30.1.205","172.30.1.104","TCP","54","38794 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41129","19.554124","172.30.1.104","172.30.1.205","TCP","54","49671 > 38802 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41130","19.554127","172.30.1.205","172.30.1.104","TCP","54","38802 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41131","19.554143","172.30.1.104","172.30.1.205","TCP","54","49671 > 38758 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41132","19.554145","172.30.1.205","172.30.1.104","TCP","54","38758 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41133","19.554972","172.30.1.205","172.30.1.104","TCP","54","46168 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41134","19.555079","172.30.1.205","172.30.1.104","TCP","74","38806 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922781 TSecr=0 WS=128" "41135","19.555244","172.30.1.104","172.30.1.205","TCP","54","135 > 46168 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41136","19.555254","172.30.1.104","172.30.1.205","TCP","54","135 > 46168 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41137","19.555258","172.30.1.205","172.30.1.104","TCP","54","46168 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41138","19.555328","172.30.1.104","172.30.1.205","TCP","66","49671 > 38806 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41139","19.555336","172.30.1.205","172.30.1.104","TCP","54","38806 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41140","19.555707","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41141","19.555996","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41142","19.556005","172.30.1.205","172.30.1.104","TCP","54","38806 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41143","19.557991","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41144","19.558344","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41145","19.558351","172.30.1.205","172.30.1.104","TCP","54","38806 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41146","19.559734","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41147","19.563067","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41148","19.563078","172.30.1.205","172.30.1.104","TCP","54","38806 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41149","19.564026","172.30.1.205","172.30.1.104","TCP","74","46172 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922790 TSecr=0 WS=128" "41150","19.564390","172.30.1.104","172.30.1.205","TCP","66","135 > 46172 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41151","19.564410","172.30.1.205","172.30.1.104","TCP","54","46172 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41152","19.565001","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41153","19.565320","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41154","19.565329","172.30.1.205","172.30.1.104","TCP","54","46172 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41155","19.567501","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41156","19.567900","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41157","19.567912","172.30.1.205","172.30.1.104","TCP","54","46172 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41158","19.569944","172.30.1.205","172.30.1.104","TCP","54","46172 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41159","19.570052","172.30.1.205","172.30.1.104","TCP","74","38810 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922796 TSecr=0 WS=128" "41160","19.570228","172.30.1.104","172.30.1.205","TCP","54","135 > 46172 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41161","19.570259","172.30.1.104","172.30.1.205","TCP","54","135 > 46172 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41162","19.570265","172.30.1.205","172.30.1.104","TCP","54","46172 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41163","19.570343","172.30.1.104","172.30.1.205","TCP","66","49671 > 38810 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41164","19.570351","172.30.1.205","172.30.1.104","TCP","54","38810 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41165","19.570691","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41166","19.570975","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41167","19.570982","172.30.1.205","172.30.1.104","TCP","54","38810 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41168","19.572917","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41169","19.573340","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41170","19.573347","172.30.1.205","172.30.1.104","TCP","54","38810 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41171","19.574690","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41172","19.578004","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41173","19.578014","172.30.1.205","172.30.1.104","TCP","54","38810 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41174","19.578972","172.30.1.205","172.30.1.104","TCP","74","46176 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922805 TSecr=0 WS=128" "41175","19.579335","172.30.1.104","172.30.1.205","TCP","66","135 > 46176 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41176","19.579358","172.30.1.205","172.30.1.104","TCP","54","46176 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41177","19.579973","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41178","19.580325","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41179","19.580340","172.30.1.205","172.30.1.104","TCP","54","46176 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41180","19.582689","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41181","19.583163","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41182","19.583176","172.30.1.205","172.30.1.104","TCP","54","46176 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41183","19.585080","172.30.1.205","172.30.1.104","TCP","54","46176 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41184","19.585196","172.30.1.205","172.30.1.104","TCP","74","38814 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922811 TSecr=0 WS=128" "41185","19.585396","172.30.1.104","172.30.1.205","TCP","54","135 > 46176 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41186","19.585405","172.30.1.104","172.30.1.205","TCP","54","135 > 46176 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41187","19.585410","172.30.1.205","172.30.1.104","TCP","54","46176 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41188","19.585509","172.30.1.104","172.30.1.205","TCP","66","49671 > 38814 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41189","19.585518","172.30.1.205","172.30.1.104","TCP","54","38814 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41190","19.585877","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41191","19.586223","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41192","19.586232","172.30.1.205","172.30.1.104","TCP","54","38814 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41193","19.588106","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41194","19.588485","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41195","19.588491","172.30.1.205","172.30.1.104","TCP","54","38814 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41196","19.589876","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41197","19.593124","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41198","19.593134","172.30.1.205","172.30.1.104","TCP","54","38814 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41199","19.594120","172.30.1.205","172.30.1.104","TCP","74","46180 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922820 TSecr=0 WS=128" "41200","19.594463","172.30.1.104","172.30.1.205","TCP","66","135 > 46180 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41201","19.594473","172.30.1.205","172.30.1.104","TCP","54","46180 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41202","19.594880","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41203","19.595245","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41204","19.595254","172.30.1.205","172.30.1.104","TCP","54","46180 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41205","19.597486","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41206","19.597936","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41207","19.597943","172.30.1.205","172.30.1.104","TCP","54","46180 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41208","19.599757","172.30.1.205","172.30.1.104","TCP","54","46180 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41209","19.599868","172.30.1.205","172.30.1.104","TCP","74","38818 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922826 TSecr=0 WS=128" "41210","19.600011","172.30.1.104","172.30.1.205","TCP","54","135 > 46180 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41211","19.600065","172.30.1.104","172.30.1.205","TCP","54","135 > 46180 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41212","19.600070","172.30.1.205","172.30.1.104","TCP","54","46180 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41213","19.600141","172.30.1.104","172.30.1.205","TCP","66","49671 > 38818 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41214","19.600150","172.30.1.205","172.30.1.104","TCP","54","38818 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41215","19.600503","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41216","19.600783","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41217","19.600791","172.30.1.205","172.30.1.104","TCP","54","38818 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41218","19.602708","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41219","19.603116","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41220","19.603128","172.30.1.205","172.30.1.104","TCP","54","38818 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41221","19.604653","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41222","19.608031","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41223","19.608042","172.30.1.205","172.30.1.104","TCP","54","38818 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41224","19.609011","172.30.1.205","172.30.1.104","TCP","74","46184 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922835 TSecr=0 WS=128" "41225","19.609327","172.30.1.104","172.30.1.205","TCP","66","135 > 46184 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41226","19.609340","172.30.1.205","172.30.1.104","TCP","54","46184 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41227","19.609704","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41228","19.610012","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41229","19.610022","172.30.1.205","172.30.1.104","TCP","54","46184 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41230","19.612232","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41231","19.612708","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41232","19.612716","172.30.1.205","172.30.1.104","TCP","54","46184 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41233","19.614557","172.30.1.205","172.30.1.104","TCP","54","46184 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41234","19.614670","172.30.1.205","172.30.1.104","TCP","74","38822 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922841 TSecr=0 WS=128" "41235","19.614850","172.30.1.104","172.30.1.205","TCP","54","135 > 46184 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41236","19.614875","172.30.1.104","172.30.1.205","TCP","54","135 > 46184 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41237","19.614881","172.30.1.205","172.30.1.104","TCP","54","46184 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41238","19.614970","172.30.1.104","172.30.1.205","TCP","66","49671 > 38822 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41239","19.614978","172.30.1.205","172.30.1.104","TCP","54","38822 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41240","19.615337","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41241","19.615656","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41242","19.615673","172.30.1.205","172.30.1.104","TCP","54","38822 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41243","19.617597","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41244","19.618030","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41245","19.618036","172.30.1.205","172.30.1.104","TCP","54","38822 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41246","19.619392","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41247","19.622722","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41248","19.622734","172.30.1.205","172.30.1.104","TCP","54","38822 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41249","19.623690","172.30.1.205","172.30.1.104","TCP","74","46188 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922850 TSecr=0 WS=128" "41250","19.624003","172.30.1.104","172.30.1.205","TCP","66","135 > 46188 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41251","19.624014","172.30.1.205","172.30.1.104","TCP","54","46188 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41252","19.624363","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41253","19.624673","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41254","19.624683","172.30.1.205","172.30.1.104","TCP","54","46188 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41255","19.626892","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41256","19.627329","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41257","19.627336","172.30.1.205","172.30.1.104","TCP","54","46188 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41258","19.629178","172.30.1.205","172.30.1.104","TCP","54","46188 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41259","19.629291","172.30.1.205","172.30.1.104","TCP","74","38826 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922855 TSecr=0 WS=128" "41260","19.629465","172.30.1.104","172.30.1.205","TCP","54","135 > 46188 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41261","19.629474","172.30.1.104","172.30.1.205","TCP","54","135 > 46188 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41262","19.629479","172.30.1.205","172.30.1.104","TCP","54","46188 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41263","19.629549","172.30.1.104","172.30.1.205","TCP","66","49671 > 38826 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41264","19.629557","172.30.1.205","172.30.1.104","TCP","54","38826 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41265","19.629915","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41266","19.630181","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41267","19.630188","172.30.1.205","172.30.1.104","TCP","54","38826 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41268","19.632062","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41269","19.632427","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41270","19.632434","172.30.1.205","172.30.1.104","TCP","54","38826 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41271","19.633817","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41272","19.637201","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41273","19.637211","172.30.1.205","172.30.1.104","TCP","54","38826 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41274","19.638171","172.30.1.205","172.30.1.104","TCP","74","46192 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922864 TSecr=0 WS=128" "41275","19.638499","172.30.1.104","172.30.1.205","TCP","66","135 > 46192 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41276","19.638509","172.30.1.205","172.30.1.104","TCP","54","46192 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41277","19.638854","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41278","19.639136","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41279","19.639145","172.30.1.205","172.30.1.104","TCP","54","46192 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41280","19.641359","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41281","19.641790","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41282","19.641800","172.30.1.205","172.30.1.104","TCP","54","46192 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41283","19.643677","172.30.1.205","172.30.1.104","TCP","54","46192 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41284","19.643796","172.30.1.205","172.30.1.104","TCP","74","38830 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922870 TSecr=0 WS=128" "41285","19.643949","172.30.1.104","172.30.1.205","TCP","54","135 > 46192 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41286","19.643983","172.30.1.104","172.30.1.205","TCP","54","135 > 46192 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41287","19.643988","172.30.1.205","172.30.1.104","TCP","54","46192 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41288","19.645933","172.30.1.104","172.30.1.205","TCP","66","49671 > 38830 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41289","19.645944","172.30.1.205","172.30.1.104","TCP","54","38830 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41290","19.646301","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41291","19.646617","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41292","19.646626","172.30.1.205","172.30.1.104","TCP","54","38830 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41293","19.648491","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41294","19.648923","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41295","19.648933","172.30.1.205","172.30.1.104","TCP","54","38830 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41296","19.650372","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41297","19.654057","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41298","19.654069","172.30.1.205","172.30.1.104","TCP","54","38830 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41299","19.655063","172.30.1.205","172.30.1.104","TCP","74","46196 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922881 TSecr=0 WS=128" "41300","19.655385","172.30.1.104","172.30.1.205","TCP","66","135 > 46196 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41301","19.655398","172.30.1.205","172.30.1.104","TCP","54","46196 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41302","19.655758","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41303","19.656095","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41304","19.656104","172.30.1.205","172.30.1.104","TCP","54","46196 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41305","19.658345","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41306","19.658871","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41307","19.658878","172.30.1.205","172.30.1.104","TCP","54","46196 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41308","19.660719","172.30.1.205","172.30.1.104","TCP","54","46196 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41309","19.660854","172.30.1.205","172.30.1.104","TCP","74","38834 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922887 TSecr=0 WS=128" "41310","19.660982","172.30.1.104","172.30.1.205","TCP","54","135 > 46196 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41311","19.661008","172.30.1.104","172.30.1.205","TCP","54","135 > 46196 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41312","19.661026","172.30.1.205","172.30.1.104","TCP","54","46196 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41313","19.661131","172.30.1.104","172.30.1.205","TCP","66","49671 > 38834 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41314","19.661139","172.30.1.205","172.30.1.104","TCP","54","38834 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41315","19.661489","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41316","19.661782","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41317","19.661791","172.30.1.205","172.30.1.104","TCP","54","38834 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41318","19.663700","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41319","19.664084","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41320","19.664091","172.30.1.205","172.30.1.104","TCP","54","38834 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41321","19.665492","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41322","19.668712","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41323","19.668722","172.30.1.205","172.30.1.104","TCP","54","38834 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41324","19.669669","172.30.1.205","172.30.1.104","TCP","74","46200 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922896 TSecr=0 WS=128" "41325","19.669953","172.30.1.104","172.30.1.205","TCP","66","135 > 46200 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41326","19.669964","172.30.1.205","172.30.1.104","TCP","54","46200 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41327","19.670318","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41328","19.670618","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41329","19.670626","172.30.1.205","172.30.1.104","TCP","54","46200 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41330","19.672816","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41331","19.673188","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41332","19.673194","172.30.1.205","172.30.1.104","TCP","54","46200 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41333","19.675001","172.30.1.205","172.30.1.104","TCP","54","46200 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41334","19.675117","172.30.1.205","172.30.1.104","TCP","74","38838 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922901 TSecr=0 WS=128" "41335","19.675275","172.30.1.104","172.30.1.205","TCP","54","135 > 46200 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41336","19.675286","172.30.1.104","172.30.1.205","TCP","54","135 > 46200 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41337","19.675291","172.30.1.205","172.30.1.104","TCP","54","46200 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41338","19.675392","172.30.1.104","172.30.1.205","TCP","66","49671 > 38838 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41339","19.675401","172.30.1.205","172.30.1.104","TCP","54","38838 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41340","19.675759","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41341","19.676052","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41342","19.676060","172.30.1.205","172.30.1.104","TCP","54","38838 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41343","19.677960","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41344","19.678327","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41345","19.678333","172.30.1.205","172.30.1.104","TCP","54","38838 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41346","19.679676","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41347","19.682938","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41348","19.682947","172.30.1.205","172.30.1.104","TCP","54","38838 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41349","19.683888","172.30.1.205","172.30.1.104","TCP","74","46204 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922910 TSecr=0 WS=128" "41350","19.684275","172.30.1.104","172.30.1.205","TCP","66","135 > 46204 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41351","19.684285","172.30.1.205","172.30.1.104","TCP","54","46204 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41352","19.684638","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41353","19.684932","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41354","19.684942","172.30.1.205","172.30.1.104","TCP","54","46204 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41355","19.687128","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41356","19.687572","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41357","19.687582","172.30.1.205","172.30.1.104","TCP","54","46204 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41358","19.689517","172.30.1.205","172.30.1.104","TCP","54","46204 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41359","19.689635","172.30.1.205","172.30.1.104","TCP","74","38842 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922916 TSecr=0 WS=128" "41360","19.689800","172.30.1.104","172.30.1.205","TCP","54","135 > 46204 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41361","19.689831","172.30.1.104","172.30.1.205","TCP","54","135 > 46204 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41362","19.689837","172.30.1.205","172.30.1.104","TCP","54","46204 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41363","19.689932","172.30.1.104","172.30.1.205","TCP","66","49671 > 38842 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41364","19.689941","172.30.1.205","172.30.1.104","TCP","54","38842 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41365","19.690291","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41366","19.690580","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41367","19.690587","172.30.1.205","172.30.1.104","TCP","54","38842 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41368","19.692462","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41369","19.692830","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41370","19.692837","172.30.1.205","172.30.1.104","TCP","54","38842 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41371","19.694213","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41372","19.697400","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41373","19.697411","172.30.1.205","172.30.1.104","TCP","54","38842 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41374","19.698370","172.30.1.205","172.30.1.104","TCP","74","46208 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922924 TSecr=0 WS=128" "41375","19.698704","172.30.1.104","172.30.1.205","TCP","66","135 > 46208 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41376","19.698715","172.30.1.205","172.30.1.104","TCP","54","46208 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41377","19.699069","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41378","19.699374","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41379","19.699383","172.30.1.205","172.30.1.104","TCP","54","46208 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41380","19.701607","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41381","19.702016","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41382","19.702023","172.30.1.205","172.30.1.104","TCP","54","46208 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41383","19.703832","172.30.1.205","172.30.1.104","TCP","54","46208 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41384","19.703943","172.30.1.205","172.30.1.104","TCP","74","38846 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922930 TSecr=0 WS=128" "41385","19.704192","172.30.1.104","172.30.1.205","TCP","54","135 > 46208 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41386","19.704201","172.30.1.104","172.30.1.205","TCP","54","135 > 46208 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41387","19.704207","172.30.1.205","172.30.1.104","TCP","54","46208 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41388","19.704262","172.30.1.104","172.30.1.205","TCP","66","49671 > 38846 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41389","19.704271","172.30.1.205","172.30.1.104","TCP","54","38846 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41390","19.704624","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41391","19.704955","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41392","19.704964","172.30.1.205","172.30.1.104","TCP","54","38846 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41393","19.706872","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41394","19.707230","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41395","19.707237","172.30.1.205","172.30.1.104","TCP","54","38846 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41396","19.708580","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41397","19.711935","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41398","19.711945","172.30.1.205","172.30.1.104","TCP","54","38846 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41399","19.712906","172.30.1.205","172.30.1.104","TCP","74","46212 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922939 TSecr=0 WS=128" "41400","19.713288","172.30.1.104","172.30.1.205","TCP","66","135 > 46212 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41401","19.713300","172.30.1.205","172.30.1.104","TCP","54","46212 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41402","19.713653","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41403","19.713945","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41404","19.713954","172.30.1.205","172.30.1.104","TCP","54","46212 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41405","19.716140","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41406","19.716569","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41407","19.716576","172.30.1.205","172.30.1.104","TCP","54","46212 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41408","19.718405","172.30.1.205","172.30.1.104","TCP","54","46212 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41409","19.718518","172.30.1.205","172.30.1.104","TCP","74","38850 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922944 TSecr=0 WS=128" "41410","19.718738","172.30.1.104","172.30.1.205","TCP","54","135 > 46212 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41411","19.718794","172.30.1.104","172.30.1.205","TCP","54","135 > 46212 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41412","19.718799","172.30.1.205","172.30.1.104","TCP","54","46212 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41413","19.718833","172.30.1.104","172.30.1.205","TCP","66","49671 > 38850 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41414","19.718841","172.30.1.205","172.30.1.104","TCP","54","38850 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41415","19.719208","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41416","19.719501","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41417","19.719510","172.30.1.205","172.30.1.104","TCP","54","38850 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41418","19.721405","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41419","19.721790","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41420","19.721797","172.30.1.205","172.30.1.104","TCP","54","38850 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41421","19.723146","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41422","19.726479","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41423","19.726489","172.30.1.205","172.30.1.104","TCP","54","38850 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41424","19.727465","172.30.1.205","172.30.1.104","TCP","74","46216 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922953 TSecr=0 WS=128" "41425","19.727811","172.30.1.104","172.30.1.205","TCP","66","135 > 46216 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41426","19.727822","172.30.1.205","172.30.1.104","TCP","54","46216 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41427","19.728178","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41428","19.728464","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41429","19.728473","172.30.1.205","172.30.1.104","TCP","54","46216 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41430","19.730673","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41431","19.731128","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41432","19.731134","172.30.1.205","172.30.1.104","TCP","54","46216 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41433","19.731981","172.30.1.205","172.30.1.104","TCP","54","38810 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41434","19.732031","172.30.1.205","172.30.1.104","TCP","54","38814 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41435","19.732069","172.30.1.205","172.30.1.104","TCP","54","38818 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41436","19.732103","172.30.1.205","172.30.1.104","TCP","54","38822 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41437","19.732134","172.30.1.205","172.30.1.104","TCP","54","38826 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41438","19.732167","172.30.1.205","172.30.1.104","TCP","54","38830 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41439","19.732195","172.30.1.205","172.30.1.104","TCP","54","38834 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41440","19.732227","172.30.1.205","172.30.1.104","TCP","54","38838 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41441","19.732250","172.30.1.205","172.30.1.104","TCP","54","38842 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41442","19.732262","172.30.1.104","172.30.1.205","TCP","54","49671 > 38810 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41443","19.732300","172.30.1.205","172.30.1.104","TCP","54","38846 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41444","19.732332","172.30.1.104","172.30.1.205","TCP","54","49671 > 38814 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41445","19.732341","172.30.1.205","172.30.1.104","TCP","54","38850 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41446","19.732351","172.30.1.104","172.30.1.205","TCP","54","49671 > 38818 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41447","19.732371","172.30.1.104","172.30.1.205","TCP","54","49671 > 38810 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41448","19.732378","172.30.1.205","172.30.1.104","TCP","54","38810 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41449","19.732393","172.30.1.104","172.30.1.205","TCP","54","49671 > 38822 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41450","19.732458","172.30.1.205","172.30.1.104","TCP","54","38806 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41451","19.732494","172.30.1.104","172.30.1.205","TCP","54","49671 > 38826 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41452","19.732512","172.30.1.104","172.30.1.205","TCP","54","49671 > 38830 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41453","19.732534","172.30.1.104","172.30.1.205","TCP","54","49671 > 38826 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41454","19.732539","172.30.1.205","172.30.1.104","TCP","54","38826 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41455","19.732553","172.30.1.104","172.30.1.205","TCP","54","49671 > 38822 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41456","19.732555","172.30.1.205","172.30.1.104","TCP","54","38822 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41457","19.732572","172.30.1.104","172.30.1.205","TCP","54","49671 > 38830 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41458","19.732575","172.30.1.205","172.30.1.104","TCP","54","38830 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41459","19.732592","172.30.1.104","172.30.1.205","TCP","54","49671 > 38814 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41460","19.732594","172.30.1.205","172.30.1.104","TCP","54","38814 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41461","19.732611","172.30.1.104","172.30.1.205","TCP","54","49671 > 38818 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41462","19.732613","172.30.1.205","172.30.1.104","TCP","54","38818 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41463","19.732630","172.30.1.104","172.30.1.205","TCP","54","49671 > 38834 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41464","19.732788","172.30.1.104","172.30.1.205","TCP","54","49671 > 38838 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41465","19.732804","172.30.1.104","172.30.1.205","TCP","54","49671 > 38842 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41466","19.732818","172.30.1.104","172.30.1.205","TCP","54","49671 > 38834 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41467","19.732822","172.30.1.205","172.30.1.104","TCP","54","38834 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41468","19.732839","172.30.1.104","172.30.1.205","TCP","54","49671 > 38838 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41469","19.732841","172.30.1.205","172.30.1.104","TCP","54","38838 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41470","19.732860","172.30.1.104","172.30.1.205","TCP","54","49671 > 38842 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41471","19.732863","172.30.1.205","172.30.1.104","TCP","54","38842 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41472","19.732880","172.30.1.104","172.30.1.205","TCP","54","49671 > 38846 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41473","19.732965","172.30.1.104","172.30.1.205","TCP","54","49671 > 38850 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41474","19.732985","172.30.1.104","172.30.1.205","TCP","54","49671 > 38846 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41475","19.732989","172.30.1.205","172.30.1.104","TCP","54","38846 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41476","19.733005","172.30.1.104","172.30.1.205","TCP","54","49671 > 38850 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41477","19.733007","172.30.1.205","172.30.1.104","TCP","54","38850 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41478","19.733027","172.30.1.104","172.30.1.205","TCP","54","49671 > 38806 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41479","19.733101","172.30.1.104","172.30.1.205","TCP","54","49671 > 38806 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41480","19.733105","172.30.1.205","172.30.1.104","TCP","54","38806 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41481","19.734280","172.30.1.205","172.30.1.104","TCP","54","46216 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41482","19.734394","172.30.1.205","172.30.1.104","TCP","74","38854 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922960 TSecr=0 WS=128" "41483","19.734525","172.30.1.104","172.30.1.205","TCP","54","135 > 46216 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41484","19.734535","172.30.1.104","172.30.1.205","TCP","54","135 > 46216 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41485","19.734547","172.30.1.205","172.30.1.104","TCP","54","46216 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41486","19.734669","172.30.1.104","172.30.1.205","TCP","66","49671 > 38854 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41487","19.734677","172.30.1.205","172.30.1.104","TCP","54","38854 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41488","19.735063","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41489","19.735340","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41490","19.735349","172.30.1.205","172.30.1.104","TCP","54","38854 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41491","19.737296","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41492","19.737769","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41493","19.737775","172.30.1.205","172.30.1.104","TCP","54","38854 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41494","19.739140","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41495","19.742400","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41496","19.742410","172.30.1.205","172.30.1.104","TCP","54","38854 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41497","19.743381","172.30.1.205","172.30.1.104","TCP","74","46220 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922969 TSecr=0 WS=128" "41498","19.743698","172.30.1.104","172.30.1.205","TCP","66","135 > 46220 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41499","19.743708","172.30.1.205","172.30.1.104","TCP","54","46220 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41500","19.744068","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41501","19.744371","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41502","19.744380","172.30.1.205","172.30.1.104","TCP","54","46220 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41503","19.746584","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41504","19.747076","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41505","19.747082","172.30.1.205","172.30.1.104","TCP","54","46220 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41506","19.748902","172.30.1.205","172.30.1.104","TCP","54","46220 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41507","19.749012","172.30.1.205","172.30.1.104","TCP","74","38858 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922975 TSecr=0 WS=128" "41508","19.749160","172.30.1.104","172.30.1.205","TCP","54","135 > 46220 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41509","19.749198","172.30.1.104","172.30.1.205","TCP","54","135 > 46220 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41510","19.749204","172.30.1.205","172.30.1.104","TCP","54","46220 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41511","19.749284","172.30.1.104","172.30.1.205","TCP","66","49671 > 38858 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41512","19.749292","172.30.1.205","172.30.1.104","TCP","54","38858 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41513","19.749658","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41514","19.749921","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41515","19.749930","172.30.1.205","172.30.1.104","TCP","54","38858 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41516","19.751791","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41517","19.752142","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41518","19.752148","172.30.1.205","172.30.1.104","TCP","54","38858 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41519","19.753517","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41520","19.756762","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41521","19.756772","172.30.1.205","172.30.1.104","TCP","54","38858 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41522","19.757737","172.30.1.205","172.30.1.104","TCP","74","46224 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922984 TSecr=0 WS=128" "41523","19.758032","172.30.1.104","172.30.1.205","TCP","66","135 > 46224 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41524","19.758043","172.30.1.205","172.30.1.104","TCP","54","46224 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41525","19.758391","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41526","19.758735","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41527","19.758744","172.30.1.205","172.30.1.104","TCP","54","46224 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41528","19.760982","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41529","19.761396","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41530","19.761403","172.30.1.205","172.30.1.104","TCP","54","46224 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41531","19.763224","172.30.1.205","172.30.1.104","TCP","54","46224 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41532","19.763337","172.30.1.205","172.30.1.104","TCP","74","38862 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922989 TSecr=0 WS=128" "41533","19.763491","172.30.1.104","172.30.1.205","TCP","54","135 > 46224 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41534","19.763622","172.30.1.104","172.30.1.205","TCP","66","49671 > 38862 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41535","19.763632","172.30.1.205","172.30.1.104","TCP","54","38862 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41536","19.763975","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41537","19.764313","172.30.1.104","172.30.1.205","TCP","54","135 > 46224 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41538","19.764320","172.30.1.205","172.30.1.104","TCP","54","46224 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41539","19.764429","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41540","19.764437","172.30.1.205","172.30.1.104","TCP","54","38862 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41541","19.766351","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41542","19.766759","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41543","19.766765","172.30.1.205","172.30.1.104","TCP","54","38862 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41544","19.768114","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41545","19.771357","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41546","19.771366","172.30.1.205","172.30.1.104","TCP","54","38862 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41547","19.772309","172.30.1.205","172.30.1.104","TCP","74","46228 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499922998 TSecr=0 WS=128" "41548","19.772601","172.30.1.104","172.30.1.205","TCP","66","135 > 46228 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41549","19.772612","172.30.1.205","172.30.1.104","TCP","54","46228 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41550","19.773002","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41551","19.773268","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41552","19.773277","172.30.1.205","172.30.1.104","TCP","54","46228 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41553","19.775508","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41554","19.775990","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41555","19.775997","172.30.1.205","172.30.1.104","TCP","54","46228 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41556","19.777849","172.30.1.205","172.30.1.104","TCP","54","46228 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41557","19.777960","172.30.1.205","172.30.1.104","TCP","74","38866 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923004 TSecr=0 WS=128" "41558","19.778128","172.30.1.104","172.30.1.205","TCP","54","135 > 46228 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41559","19.778232","172.30.1.104","172.30.1.205","TCP","66","49671 > 38866 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41560","19.778241","172.30.1.205","172.30.1.104","TCP","54","38866 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41561","19.778586","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41562","19.781837","172.30.1.104","172.30.1.205","TCP","54","135 > 46228 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41563","19.781843","172.30.1.205","172.30.1.104","TCP","54","46228 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41564","19.781958","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41565","19.781965","172.30.1.205","172.30.1.104","TCP","54","38866 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41566","19.783890","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41567","19.784313","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41568","19.784320","172.30.1.205","172.30.1.104","TCP","54","38866 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41569","19.785704","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41570","19.789998","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41571","19.790009","172.30.1.205","172.30.1.104","TCP","54","38866 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41572","19.790961","172.30.1.205","172.30.1.104","TCP","74","46232 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923017 TSecr=0 WS=128" "41573","19.791574","172.30.1.104","172.30.1.205","TCP","66","135 > 46232 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41574","19.791586","172.30.1.205","172.30.1.104","TCP","54","46232 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41575","19.791943","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41576","19.792243","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41577","19.792251","172.30.1.205","172.30.1.104","TCP","54","46232 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41578","19.794456","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41579","19.794890","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41580","19.794896","172.30.1.205","172.30.1.104","TCP","54","46232 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41581","19.796742","172.30.1.205","172.30.1.104","TCP","54","46232 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41582","19.796901","172.30.1.205","172.30.1.104","TCP","74","38870 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923023 TSecr=0 WS=128" "41583","19.797050","172.30.1.104","172.30.1.205","TCP","54","135 > 46232 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41584","19.797071","172.30.1.104","172.30.1.205","TCP","54","135 > 46232 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41585","19.797076","172.30.1.205","172.30.1.104","TCP","54","46232 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41586","19.797220","172.30.1.104","172.30.1.205","TCP","66","49671 > 38870 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41587","19.797229","172.30.1.205","172.30.1.104","TCP","54","38870 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41588","19.797575","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41589","19.797933","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41590","19.797941","172.30.1.205","172.30.1.104","TCP","54","38870 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41591","19.799807","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41592","19.800605","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41593","19.800612","172.30.1.205","172.30.1.104","TCP","54","38870 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41594","19.801984","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41595","19.805667","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41596","19.805677","172.30.1.205","172.30.1.104","TCP","54","38870 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41597","19.806628","172.30.1.205","172.30.1.104","TCP","74","46236 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923033 TSecr=0 WS=128" "41598","19.806967","172.30.1.104","172.30.1.205","TCP","66","135 > 46236 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41599","19.806979","172.30.1.205","172.30.1.104","TCP","54","46236 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41600","19.807342","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41601","19.809005","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41602","19.809014","172.30.1.205","172.30.1.104","TCP","54","46236 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41603","19.811205","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41604","19.811715","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41605","19.811729","172.30.1.205","172.30.1.104","TCP","54","46236 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41606","19.813651","172.30.1.205","172.30.1.104","TCP","54","46236 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41607","19.813775","172.30.1.205","172.30.1.104","TCP","74","38874 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923040 TSecr=0 WS=128" "41608","19.813926","172.30.1.104","172.30.1.205","TCP","54","135 > 46236 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41609","19.814047","172.30.1.104","172.30.1.205","TCP","66","49671 > 38874 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41610","19.814056","172.30.1.205","172.30.1.104","TCP","54","38874 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41611","19.814412","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41612","19.814651","172.30.1.104","172.30.1.205","TCP","54","135 > 46236 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41613","19.814657","172.30.1.205","172.30.1.104","TCP","54","46236 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41614","19.814727","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41615","19.814733","172.30.1.205","172.30.1.104","TCP","54","38874 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41616","19.816599","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41617","19.816996","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41618","19.817009","172.30.1.205","172.30.1.104","TCP","54","38874 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41619","19.818631","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41620","19.822552","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41621","19.822562","172.30.1.205","172.30.1.104","TCP","54","38874 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41622","19.823510","172.30.1.205","172.30.1.104","TCP","74","46240 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923049 TSecr=0 WS=128" "41623","19.823835","172.30.1.104","172.30.1.205","TCP","66","135 > 46240 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41624","19.823846","172.30.1.205","172.30.1.104","TCP","54","46240 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41625","19.824196","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41626","19.824604","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41627","19.824613","172.30.1.205","172.30.1.104","TCP","54","46240 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41628","19.826828","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41629","19.827215","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41630","19.827222","172.30.1.205","172.30.1.104","TCP","54","46240 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41631","19.829062","172.30.1.205","172.30.1.104","TCP","54","46240 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41632","19.829173","172.30.1.205","172.30.1.104","TCP","74","38878 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923055 TSecr=0 WS=128" "41633","19.829374","172.30.1.104","172.30.1.205","TCP","54","135 > 46240 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41634","19.829383","172.30.1.104","172.30.1.205","TCP","54","135 > 46240 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41635","19.829388","172.30.1.205","172.30.1.104","TCP","54","46240 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41636","19.829468","172.30.1.104","172.30.1.205","TCP","66","49671 > 38878 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41637","19.829476","172.30.1.205","172.30.1.104","TCP","54","38878 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41638","19.829828","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41639","19.830136","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41640","19.830146","172.30.1.205","172.30.1.104","TCP","54","38878 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41641","19.832030","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41642","19.832395","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41643","19.832402","172.30.1.205","172.30.1.104","TCP","54","38878 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41644","19.833784","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41645","19.838129","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41646","19.838139","172.30.1.205","172.30.1.104","TCP","54","38878 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41647","19.839088","172.30.1.205","172.30.1.104","TCP","74","46244 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923065 TSecr=0 WS=128" "41648","19.839411","172.30.1.104","172.30.1.205","TCP","66","135 > 46244 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41649","19.839422","172.30.1.205","172.30.1.104","TCP","54","46244 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41650","19.839773","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41651","19.840051","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41652","19.840060","172.30.1.205","172.30.1.104","TCP","54","46244 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41653","19.842287","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41654","19.842678","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41655","19.842685","172.30.1.205","172.30.1.104","TCP","54","46244 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41656","19.844518","172.30.1.205","172.30.1.104","TCP","54","46244 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41657","19.844630","172.30.1.205","172.30.1.104","TCP","74","38882 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923071 TSecr=0 WS=128" "41658","19.844788","172.30.1.104","172.30.1.205","TCP","54","135 > 46244 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41659","19.844838","172.30.1.104","172.30.1.205","TCP","54","135 > 46244 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41660","19.844845","172.30.1.205","172.30.1.104","TCP","54","46244 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41661","19.844917","172.30.1.104","172.30.1.205","TCP","66","49671 > 38882 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41662","19.844924","172.30.1.205","172.30.1.104","TCP","54","38882 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41663","19.845276","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41664","19.845588","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41665","19.845597","172.30.1.205","172.30.1.104","TCP","54","38882 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41666","19.847478","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41667","19.847838","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41668","19.847845","172.30.1.205","172.30.1.104","TCP","54","38882 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41669","19.849233","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41670","19.852525","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41671","19.852534","172.30.1.205","172.30.1.104","TCP","54","38882 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41672","19.853492","172.30.1.205","172.30.1.104","TCP","74","46248 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923079 TSecr=0 WS=128" "41673","19.853805","172.30.1.104","172.30.1.205","TCP","66","135 > 46248 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41674","19.853815","172.30.1.205","172.30.1.104","TCP","54","46248 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41675","19.854168","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41676","19.854478","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41677","19.854487","172.30.1.205","172.30.1.104","TCP","54","46248 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41678","19.856696","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41679","19.857100","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41680","19.857107","172.30.1.205","172.30.1.104","TCP","54","46248 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41681","19.858918","172.30.1.205","172.30.1.104","TCP","54","46248 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41682","19.859030","172.30.1.205","172.30.1.104","TCP","74","38886 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923085 TSecr=0 WS=128" "41683","19.859197","172.30.1.104","172.30.1.205","TCP","54","135 > 46248 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41684","19.859208","172.30.1.104","172.30.1.205","TCP","54","135 > 46248 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41685","19.859214","172.30.1.205","172.30.1.104","TCP","54","46248 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41686","19.859357","172.30.1.104","172.30.1.205","TCP","66","49671 > 38886 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41687","19.859366","172.30.1.205","172.30.1.104","TCP","54","38886 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41688","19.859734","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41689","19.860017","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41690","19.860026","172.30.1.205","172.30.1.104","TCP","54","38886 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41691","19.861929","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41692","19.862287","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41693","19.862294","172.30.1.205","172.30.1.104","TCP","54","38886 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41694","19.863648","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41695","19.866927","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41696","19.866938","172.30.1.205","172.30.1.104","TCP","54","38886 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41697","19.867897","172.30.1.205","172.30.1.104","TCP","74","46252 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923094 TSecr=0 WS=128" "41698","19.868246","172.30.1.104","172.30.1.205","TCP","66","135 > 46252 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41699","19.868257","172.30.1.205","172.30.1.104","TCP","54","46252 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41700","19.868609","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41701","19.868970","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41702","19.868980","172.30.1.205","172.30.1.104","TCP","54","46252 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41703","19.871180","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41704","19.871674","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41705","19.871681","172.30.1.205","172.30.1.104","TCP","54","46252 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41706","19.873524","172.30.1.205","172.30.1.104","TCP","54","46252 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41707","19.873638","172.30.1.205","172.30.1.104","TCP","74","38890 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923100 TSecr=0 WS=128" "41708","19.873810","172.30.1.104","172.30.1.205","TCP","54","135 > 46252 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41709","19.873831","172.30.1.104","172.30.1.205","TCP","54","135 > 46252 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41710","19.873837","172.30.1.205","172.30.1.104","TCP","54","46252 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41711","19.873943","172.30.1.104","172.30.1.205","TCP","66","49671 > 38890 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41712","19.873951","172.30.1.205","172.30.1.104","TCP","54","38890 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41713","19.874296","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41714","19.874585","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41715","19.874594","172.30.1.205","172.30.1.104","TCP","54","38890 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41716","19.876488","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41717","19.876872","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41718","19.876878","172.30.1.205","172.30.1.104","TCP","54","38890 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41719","19.878248","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41720","19.881673","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41721","19.881692","172.30.1.205","172.30.1.104","TCP","54","38890 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41722","19.882772","172.30.1.205","172.30.1.104","TCP","74","46256 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923109 TSecr=0 WS=128" "41723","19.883073","172.30.1.104","172.30.1.205","TCP","66","135 > 46256 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41724","19.883084","172.30.1.205","172.30.1.104","TCP","54","46256 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41725","19.883436","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41726","19.883773","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41727","19.883784","172.30.1.205","172.30.1.104","TCP","54","46256 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41728","19.886026","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41729","19.886447","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41730","19.886454","172.30.1.205","172.30.1.104","TCP","54","46256 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41731","19.888265","172.30.1.205","172.30.1.104","TCP","54","46256 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41732","19.888381","172.30.1.205","172.30.1.104","TCP","74","38894 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923114 TSecr=0 WS=128" "41733","19.888516","172.30.1.104","172.30.1.205","TCP","54","135 > 46256 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41734","19.888531","172.30.1.104","172.30.1.205","TCP","54","135 > 46256 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41735","19.888536","172.30.1.205","172.30.1.104","TCP","54","46256 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41736","19.888697","172.30.1.104","172.30.1.205","TCP","66","49671 > 38894 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41737","19.888709","172.30.1.205","172.30.1.104","TCP","54","38894 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41738","19.889110","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41739","19.889399","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41740","19.889408","172.30.1.205","172.30.1.104","TCP","54","38894 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41741","19.891289","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41742","19.891713","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41743","19.891725","172.30.1.205","172.30.1.104","TCP","54","38894 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41744","19.893292","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41745","19.896717","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41746","19.896739","172.30.1.205","172.30.1.104","TCP","54","38894 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41747","19.897905","172.30.1.205","172.30.1.104","TCP","74","46260 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923124 TSecr=0 WS=128" "41748","19.898251","172.30.1.104","172.30.1.205","TCP","66","135 > 46260 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41749","19.898263","172.30.1.205","172.30.1.104","TCP","54","46260 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41750","19.898624","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41751","19.898947","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41752","19.898961","172.30.1.205","172.30.1.104","TCP","54","46260 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41753","19.901267","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41754","19.901719","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41755","19.901726","172.30.1.205","172.30.1.104","TCP","54","46260 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41756","19.903543","172.30.1.205","172.30.1.104","TCP","54","46260 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41757","19.903662","172.30.1.205","172.30.1.104","TCP","74","38898 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923130 TSecr=0 WS=128" "41758","19.903800","172.30.1.104","172.30.1.205","TCP","54","135 > 46260 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41759","19.903816","172.30.1.104","172.30.1.205","TCP","54","135 > 46260 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41760","19.903821","172.30.1.205","172.30.1.104","TCP","54","46260 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41761","19.903986","172.30.1.104","172.30.1.205","TCP","66","49671 > 38898 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41762","19.903994","172.30.1.205","172.30.1.104","TCP","54","38898 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41763","19.904343","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41764","19.904692","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41765","19.904701","172.30.1.205","172.30.1.104","TCP","54","38898 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41766","19.906604","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41767","19.906985","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41768","19.906991","172.30.1.205","172.30.1.104","TCP","54","38898 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41769","19.908328","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41770","19.912164","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41771","19.912175","172.30.1.205","172.30.1.104","TCP","54","38898 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41772","19.913165","172.30.1.205","172.30.1.104","TCP","74","46264 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923139 TSecr=0 WS=128" "41773","19.913481","172.30.1.104","172.30.1.205","TCP","66","135 > 46264 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41774","19.913493","172.30.1.205","172.30.1.104","TCP","54","46264 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41775","19.913853","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41776","19.914143","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41777","19.914152","172.30.1.205","172.30.1.104","TCP","54","46264 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41778","19.916413","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41779","19.916827","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41780","19.916834","172.30.1.205","172.30.1.104","TCP","54","46264 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41781","19.917678","172.30.1.205","172.30.1.104","TCP","54","38858 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41782","19.917726","172.30.1.205","172.30.1.104","TCP","54","38862 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41783","19.917762","172.30.1.205","172.30.1.104","TCP","54","38866 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41784","19.917791","172.30.1.205","172.30.1.104","TCP","54","38870 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41785","19.917820","172.30.1.205","172.30.1.104","TCP","54","38874 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41786","19.917848","172.30.1.205","172.30.1.104","TCP","54","38878 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41787","19.917879","172.30.1.205","172.30.1.104","TCP","54","38882 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41788","19.917907","172.30.1.205","172.30.1.104","TCP","54","38886 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41789","19.917933","172.30.1.205","172.30.1.104","TCP","54","38890 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41790","19.917960","172.30.1.205","172.30.1.104","TCP","54","38894 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41791","19.917981","172.30.1.205","172.30.1.104","TCP","54","38898 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41792","19.918002","172.30.1.104","172.30.1.205","TCP","54","49671 > 38858 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41793","19.918073","172.30.1.205","172.30.1.104","TCP","54","38854 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "41794","19.918334","172.30.1.104","172.30.1.205","TCP","54","49671 > 38862 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41795","19.918350","172.30.1.104","172.30.1.205","TCP","54","49671 > 38858 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41796","19.918356","172.30.1.205","172.30.1.104","TCP","54","38858 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41797","19.918371","172.30.1.104","172.30.1.205","TCP","54","49671 > 38862 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41798","19.918374","172.30.1.205","172.30.1.104","TCP","54","38862 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41799","19.918394","172.30.1.104","172.30.1.205","TCP","54","49671 > 38866 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41800","19.918415","172.30.1.104","172.30.1.205","TCP","54","49671 > 38870 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41801","19.918435","172.30.1.104","172.30.1.205","TCP","54","49671 > 38866 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41802","19.918439","172.30.1.205","172.30.1.104","TCP","54","38866 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41803","19.918455","172.30.1.104","172.30.1.205","TCP","54","49671 > 38874 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41804","19.918475","172.30.1.104","172.30.1.205","TCP","54","49671 > 38878 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41805","19.918495","172.30.1.104","172.30.1.205","TCP","54","49671 > 38870 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41806","19.918499","172.30.1.205","172.30.1.104","TCP","54","38870 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41807","19.918515","172.30.1.104","172.30.1.205","TCP","54","49671 > 38882 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41808","19.918536","172.30.1.104","172.30.1.205","TCP","54","49671 > 38882 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41809","19.918539","172.30.1.205","172.30.1.104","TCP","54","38882 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41810","19.918555","172.30.1.104","172.30.1.205","TCP","54","49671 > 38886 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41811","19.918574","172.30.1.104","172.30.1.205","TCP","54","49671 > 38890 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41812","19.918595","172.30.1.104","172.30.1.205","TCP","54","49671 > 38894 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41813","19.918617","172.30.1.104","172.30.1.205","TCP","54","49671 > 38898 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41814","19.918746","172.30.1.104","172.30.1.205","TCP","54","49671 > 38854 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41815","19.918765","172.30.1.104","172.30.1.205","TCP","54","49671 > 38854 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41816","19.918770","172.30.1.205","172.30.1.104","TCP","54","38854 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41817","19.918786","172.30.1.104","172.30.1.205","TCP","54","49671 > 38898 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41818","19.918789","172.30.1.205","172.30.1.104","TCP","54","38898 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41819","19.918809","172.30.1.104","172.30.1.205","TCP","54","49671 > 38894 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41820","19.918815","172.30.1.205","172.30.1.104","TCP","54","38894 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41821","19.918829","172.30.1.104","172.30.1.205","TCP","54","49671 > 38890 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41822","19.918832","172.30.1.205","172.30.1.104","TCP","54","38890 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41823","19.918850","172.30.1.104","172.30.1.205","TCP","54","49671 > 38886 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41824","19.918853","172.30.1.205","172.30.1.104","TCP","54","38886 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41825","19.918907","172.30.1.104","172.30.1.205","TCP","54","49671 > 38874 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41826","19.918910","172.30.1.205","172.30.1.104","TCP","54","38874 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41827","19.918912","172.30.1.104","172.30.1.205","TCP","54","49671 > 38878 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "41828","19.918913","172.30.1.205","172.30.1.104","TCP","54","38878 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "41829","19.919609","172.30.1.205","172.30.1.104","TCP","54","46264 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41830","19.919718","172.30.1.205","172.30.1.104","TCP","74","38902 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923146 TSecr=0 WS=128" "41831","19.919873","172.30.1.104","172.30.1.205","TCP","54","135 > 46264 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41832","19.919924","172.30.1.104","172.30.1.205","TCP","54","135 > 46264 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41833","19.919929","172.30.1.205","172.30.1.104","TCP","54","46264 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41834","19.920027","172.30.1.104","172.30.1.205","TCP","66","49671 > 38902 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41835","19.920035","172.30.1.205","172.30.1.104","TCP","54","38902 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41836","19.920391","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41837","19.920691","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41838","19.920700","172.30.1.205","172.30.1.104","TCP","54","38902 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41839","19.922583","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41840","19.922949","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41841","19.922955","172.30.1.205","172.30.1.104","TCP","54","38902 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41842","19.924350","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41843","19.927554","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41844","19.927565","172.30.1.205","172.30.1.104","TCP","54","38902 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41845","19.928507","172.30.1.205","172.30.1.104","TCP","74","46268 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923154 TSecr=0 WS=128" "41846","19.928849","172.30.1.104","172.30.1.205","TCP","66","135 > 46268 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41847","19.928860","172.30.1.205","172.30.1.104","TCP","54","46268 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41848","19.929221","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41849","19.929614","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41850","19.929622","172.30.1.205","172.30.1.104","TCP","54","46268 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41851","19.931800","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41852","19.932219","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41853","19.932226","172.30.1.205","172.30.1.104","TCP","54","46268 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41854","19.934069","172.30.1.205","172.30.1.104","TCP","54","46268 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41855","19.934179","172.30.1.205","172.30.1.104","TCP","74","38906 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923160 TSecr=0 WS=128" "41856","19.934347","172.30.1.104","172.30.1.205","TCP","54","135 > 46268 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41857","19.934372","172.30.1.104","172.30.1.205","TCP","54","135 > 46268 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41858","19.934378","172.30.1.205","172.30.1.104","TCP","54","46268 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41859","19.934465","172.30.1.104","172.30.1.205","TCP","66","49671 > 38906 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41860","19.934473","172.30.1.205","172.30.1.104","TCP","54","38906 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41861","19.934821","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41862","19.935160","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41863","19.935169","172.30.1.205","172.30.1.104","TCP","54","38906 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41864","19.937074","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41865","19.937454","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41866","19.937460","172.30.1.205","172.30.1.104","TCP","54","38906 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41867","19.938804","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41868","19.941983","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41869","19.941992","172.30.1.205","172.30.1.104","TCP","54","38906 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41870","19.942928","172.30.1.205","172.30.1.104","TCP","74","46272 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923169 TSecr=0 WS=128" "41871","19.943243","172.30.1.104","172.30.1.205","TCP","66","135 > 46272 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41872","19.943253","172.30.1.205","172.30.1.104","TCP","54","46272 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41873","19.943597","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41874","19.943934","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41875","19.943949","172.30.1.205","172.30.1.104","TCP","54","46272 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41876","19.946304","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41877","19.946726","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41878","19.946734","172.30.1.205","172.30.1.104","TCP","54","46272 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41879","19.948577","172.30.1.205","172.30.1.104","TCP","54","46272 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41880","19.948692","172.30.1.205","172.30.1.104","TCP","74","38910 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923175 TSecr=0 WS=128" "41881","19.948915","172.30.1.104","172.30.1.205","TCP","54","135 > 46272 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41882","19.948942","172.30.1.104","172.30.1.205","TCP","54","135 > 46272 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41883","19.948948","172.30.1.205","172.30.1.104","TCP","54","46272 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41884","19.949029","172.30.1.104","172.30.1.205","TCP","66","49671 > 38910 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41885","19.949037","172.30.1.205","172.30.1.104","TCP","54","38910 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41886","19.949394","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41887","19.949702","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41888","19.949711","172.30.1.205","172.30.1.104","TCP","54","38910 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41889","19.951585","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41890","19.953151","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41891","19.953159","172.30.1.205","172.30.1.104","TCP","54","38910 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41892","19.954550","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41893","19.957861","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41894","19.957880","172.30.1.205","172.30.1.104","TCP","54","38910 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41895","19.958995","172.30.1.205","172.30.1.104","TCP","74","46276 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923185 TSecr=0 WS=128" "41896","19.959311","172.30.1.104","172.30.1.205","TCP","66","135 > 46276 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41897","19.959323","172.30.1.205","172.30.1.104","TCP","54","46276 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41898","19.959684","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41899","19.959970","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41900","19.959980","172.30.1.205","172.30.1.104","TCP","54","46276 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41901","19.962202","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41902","19.962620","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41903","19.962627","172.30.1.205","172.30.1.104","TCP","54","46276 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41904","19.964446","172.30.1.205","172.30.1.104","TCP","54","46276 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41905","19.964565","172.30.1.205","172.30.1.104","TCP","74","38914 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923190 TSecr=0 WS=128" "41906","19.964720","172.30.1.104","172.30.1.205","TCP","54","135 > 46276 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41907","19.964789","172.30.1.104","172.30.1.205","TCP","54","135 > 46276 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41908","19.964795","172.30.1.205","172.30.1.104","TCP","54","46276 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41909","19.964894","172.30.1.104","172.30.1.205","TCP","66","49671 > 38914 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41910","19.964902","172.30.1.205","172.30.1.104","TCP","54","38914 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41911","19.965249","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41912","19.965545","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41913","19.965555","172.30.1.205","172.30.1.104","TCP","54","38914 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41914","19.967432","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41915","19.967843","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41916","19.967850","172.30.1.205","172.30.1.104","TCP","54","38914 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41917","19.969258","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41918","19.972560","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41919","19.972569","172.30.1.205","172.30.1.104","TCP","54","38914 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41920","19.973514","172.30.1.205","172.30.1.104","TCP","74","46280 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923199 TSecr=0 WS=128" "41921","19.973804","172.30.1.104","172.30.1.205","TCP","66","135 > 46280 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41922","19.973815","172.30.1.205","172.30.1.104","TCP","54","46280 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41923","19.974166","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41924","19.974474","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41925","19.974484","172.30.1.205","172.30.1.104","TCP","54","46280 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41926","19.976671","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41927","19.977084","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41928","19.977092","172.30.1.205","172.30.1.104","TCP","54","46280 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41929","19.979140","172.30.1.205","172.30.1.104","TCP","54","46280 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41930","19.979251","172.30.1.205","172.30.1.104","TCP","74","38918 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923205 TSecr=0 WS=128" "41931","19.979445","172.30.1.104","172.30.1.205","TCP","54","135 > 46280 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41932","19.979454","172.30.1.104","172.30.1.205","TCP","54","135 > 46280 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41933","19.979459","172.30.1.205","172.30.1.104","TCP","54","46280 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41934","19.979577","172.30.1.104","172.30.1.205","TCP","66","49671 > 38918 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41935","19.979585","172.30.1.205","172.30.1.104","TCP","54","38918 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41936","19.980001","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41937","19.980288","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41938","19.980296","172.30.1.205","172.30.1.104","TCP","54","38918 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41939","19.982406","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41940","19.982781","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41941","19.982787","172.30.1.205","172.30.1.104","TCP","54","38918 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41942","19.984306","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41943","19.987538","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41944","19.987549","172.30.1.205","172.30.1.104","TCP","54","38918 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41945","19.988522","172.30.1.205","172.30.1.104","TCP","74","46284 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923214 TSecr=0 WS=128" "41946","19.988813","172.30.1.104","172.30.1.205","TCP","66","135 > 46284 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41947","19.988836","172.30.1.205","172.30.1.104","TCP","54","46284 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41948","19.989676","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41949","19.989992","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41950","19.990006","172.30.1.205","172.30.1.104","TCP","54","46284 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41951","19.992352","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41952","19.992763","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41953","19.992770","172.30.1.205","172.30.1.104","TCP","54","46284 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41954","19.994607","172.30.1.205","172.30.1.104","TCP","54","46284 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41955","19.994752","172.30.1.205","172.30.1.104","TCP","74","38922 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923221 TSecr=0 WS=128" "41956","19.994901","172.30.1.104","172.30.1.205","TCP","54","135 > 46284 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41957","19.994910","172.30.1.104","172.30.1.205","TCP","54","135 > 46284 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41958","19.994916","172.30.1.205","172.30.1.104","TCP","54","46284 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41959","19.995016","172.30.1.104","172.30.1.205","TCP","66","49671 > 38922 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41960","19.995025","172.30.1.205","172.30.1.104","TCP","54","38922 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41961","19.995372","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41962","19.996036","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41963","19.996051","172.30.1.205","172.30.1.104","TCP","54","38922 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41964","19.998189","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41965","19.998564","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41966","19.998570","172.30.1.205","172.30.1.104","TCP","54","38922 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41967","19.999951","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41968","20.003236","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41969","20.003248","172.30.1.205","172.30.1.104","TCP","54","38922 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41970","20.004232","172.30.1.205","172.30.1.104","TCP","74","46288 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923230 TSecr=0 WS=128" "41971","20.004564","172.30.1.104","172.30.1.205","TCP","66","135 > 46288 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41972","20.004575","172.30.1.205","172.30.1.104","TCP","54","46288 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41973","20.004952","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41974","20.005282","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41975","20.005291","172.30.1.205","172.30.1.104","TCP","54","46288 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41976","20.007500","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "41977","20.007901","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "41978","20.007908","172.30.1.205","172.30.1.104","TCP","54","46288 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "41979","20.009777","172.30.1.205","172.30.1.104","TCP","54","46288 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "41980","20.009903","172.30.1.205","172.30.1.104","TCP","74","38926 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923236 TSecr=0 WS=128" "41981","20.010054","172.30.1.104","172.30.1.205","TCP","54","135 > 46288 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41982","20.010067","172.30.1.104","172.30.1.205","TCP","54","135 > 46288 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "41983","20.010074","172.30.1.205","172.30.1.104","TCP","54","46288 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "41984","20.010196","172.30.1.104","172.30.1.205","TCP","66","49671 > 38926 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41985","20.010208","172.30.1.205","172.30.1.104","TCP","54","38926 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41986","20.010566","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "41987","20.010838","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "41988","20.010849","172.30.1.205","172.30.1.104","TCP","54","38926 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "41989","20.012815","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "41990","20.013186","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "41991","20.013194","172.30.1.205","172.30.1.104","TCP","54","38926 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "41992","20.014588","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "41993","20.017933","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "41994","20.017948","172.30.1.205","172.30.1.104","TCP","54","38926 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "41995","20.019052","172.30.1.205","172.30.1.104","TCP","74","46292 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923245 TSecr=0 WS=128" "41996","20.019445","172.30.1.104","172.30.1.205","TCP","66","135 > 46292 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "41997","20.019458","172.30.1.205","172.30.1.104","TCP","54","46292 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "41998","20.019819","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "41999","20.020115","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42000","20.020125","172.30.1.205","172.30.1.104","TCP","54","46292 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42001","20.022421","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42002","20.022829","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42003","20.022835","172.30.1.205","172.30.1.104","TCP","54","46292 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42004","20.024683","172.30.1.205","172.30.1.104","TCP","54","46292 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42005","20.024830","172.30.1.205","172.30.1.104","TCP","74","38930 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923251 TSecr=0 WS=128" "42006","20.025037","172.30.1.104","172.30.1.205","TCP","54","135 > 46292 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42007","20.025048","172.30.1.104","172.30.1.205","TCP","54","135 > 46292 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42008","20.025056","172.30.1.205","172.30.1.104","TCP","54","46292 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42009","20.025113","172.30.1.104","172.30.1.205","TCP","66","49671 > 38930 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42010","20.025121","172.30.1.205","172.30.1.104","TCP","54","38930 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42011","20.025464","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42012","20.025740","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42013","20.025749","172.30.1.205","172.30.1.104","TCP","54","38930 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42014","20.027619","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42015","20.028003","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42016","20.028009","172.30.1.205","172.30.1.104","TCP","54","38930 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42017","20.029410","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42018","20.032588","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42019","20.032600","172.30.1.205","172.30.1.104","TCP","54","38930 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42020","20.033645","172.30.1.205","172.30.1.104","TCP","74","46296 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923260 TSecr=0 WS=128" "42021","20.034000","172.30.1.104","172.30.1.205","TCP","66","135 > 46296 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42022","20.034012","172.30.1.205","172.30.1.104","TCP","54","46296 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42023","20.034367","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42024","20.034676","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42025","20.034686","172.30.1.205","172.30.1.104","TCP","54","46296 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42026","20.036917","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42027","20.037340","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42028","20.037346","172.30.1.205","172.30.1.104","TCP","54","46296 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42029","20.039168","172.30.1.205","172.30.1.104","TCP","54","46296 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42030","20.039291","172.30.1.205","172.30.1.104","TCP","74","38934 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923265 TSecr=0 WS=128" "42031","20.039426","172.30.1.104","172.30.1.205","TCP","54","135 > 46296 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42032","20.039458","172.30.1.104","172.30.1.205","TCP","54","135 > 46296 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42033","20.039465","172.30.1.205","172.30.1.104","TCP","54","46296 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42034","20.039603","172.30.1.104","172.30.1.205","TCP","66","49671 > 38934 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42035","20.039612","172.30.1.205","172.30.1.104","TCP","54","38934 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42036","20.039974","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42037","20.040277","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42038","20.040285","172.30.1.205","172.30.1.104","TCP","54","38934 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42039","20.042197","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42040","20.042599","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42041","20.042606","172.30.1.205","172.30.1.104","TCP","54","38934 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42042","20.043965","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42043","20.047281","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42044","20.047293","172.30.1.205","172.30.1.104","TCP","54","38934 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42045","20.048320","172.30.1.205","172.30.1.104","TCP","74","46300 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923274 TSecr=0 WS=128" "42046","20.048640","172.30.1.104","172.30.1.205","TCP","66","135 > 46300 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42047","20.048652","172.30.1.205","172.30.1.104","TCP","54","46300 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42048","20.049046","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42049","20.049343","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42050","20.049353","172.30.1.205","172.30.1.104","TCP","54","46300 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42051","20.051566","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42052","20.052008","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42053","20.052015","172.30.1.205","172.30.1.104","TCP","54","46300 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42054","20.053868","172.30.1.205","172.30.1.104","TCP","54","46300 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42055","20.053984","172.30.1.205","172.30.1.104","TCP","74","38938 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923280 TSecr=0 WS=128" "42056","20.054145","172.30.1.104","172.30.1.205","TCP","54","135 > 46300 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42057","20.054185","172.30.1.104","172.30.1.205","TCP","54","135 > 46300 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42058","20.054192","172.30.1.205","172.30.1.104","TCP","54","46300 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42059","20.054291","172.30.1.104","172.30.1.205","TCP","66","49671 > 38938 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42060","20.054300","172.30.1.205","172.30.1.104","TCP","54","38938 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42061","20.054645","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42062","20.054956","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42063","20.054965","172.30.1.205","172.30.1.104","TCP","54","38938 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42064","20.056874","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42065","20.057245","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42066","20.057251","172.30.1.205","172.30.1.104","TCP","54","38938 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42067","20.058602","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42068","20.062062","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42069","20.062072","172.30.1.205","172.30.1.104","TCP","54","38938 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42070","20.063061","172.30.1.205","172.30.1.104","TCP","74","46304 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923289 TSecr=0 WS=128" "42071","20.063380","172.30.1.104","172.30.1.205","TCP","66","135 > 46304 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42072","20.063391","172.30.1.205","172.30.1.104","TCP","54","46304 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42073","20.063743","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42074","20.064042","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42075","20.064051","172.30.1.205","172.30.1.104","TCP","54","46304 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42076","20.066282","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42077","20.066733","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42078","20.066740","172.30.1.205","172.30.1.104","TCP","54","46304 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42079","20.068559","172.30.1.205","172.30.1.104","TCP","54","46304 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42080","20.068672","172.30.1.205","172.30.1.104","TCP","74","38942 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923295 TSecr=0 WS=128" "42081","20.068809","172.30.1.104","172.30.1.205","TCP","54","135 > 46304 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42082","20.068821","172.30.1.104","172.30.1.205","TCP","54","135 > 46304 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42083","20.068828","172.30.1.205","172.30.1.104","TCP","54","46304 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42084","20.068989","172.30.1.104","172.30.1.205","TCP","66","49671 > 38942 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42085","20.068997","172.30.1.205","172.30.1.104","TCP","54","38942 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42086","20.069381","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42087","20.070732","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42088","20.070742","172.30.1.205","172.30.1.104","TCP","54","38942 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42089","20.072629","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42090","20.073004","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42091","20.073011","172.30.1.205","172.30.1.104","TCP","54","38942 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42092","20.074386","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42093","20.077704","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42094","20.077713","172.30.1.205","172.30.1.104","TCP","54","38942 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42095","20.078702","172.30.1.205","172.30.1.104","TCP","74","46308 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923305 TSecr=0 WS=128" "42096","20.079017","172.30.1.104","172.30.1.205","TCP","66","135 > 46308 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42097","20.079028","172.30.1.205","172.30.1.104","TCP","54","46308 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42098","20.079386","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42099","20.079717","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42100","20.079727","172.30.1.205","172.30.1.104","TCP","54","46308 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42101","20.081948","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42102","20.082371","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42103","20.082379","172.30.1.205","172.30.1.104","TCP","54","46308 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42104","20.084228","172.30.1.205","172.30.1.104","TCP","54","46308 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42105","20.084348","172.30.1.205","172.30.1.104","TCP","74","38946 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923310 TSecr=0 WS=128" "42106","20.084558","172.30.1.104","172.30.1.205","TCP","54","135 > 46308 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42107","20.084570","172.30.1.104","172.30.1.205","TCP","54","135 > 46308 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42108","20.084576","172.30.1.205","172.30.1.104","TCP","54","46308 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42109","20.084655","172.30.1.104","172.30.1.205","TCP","66","49671 > 38946 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42110","20.084664","172.30.1.205","172.30.1.104","TCP","54","38946 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42111","20.085042","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42112","20.085345","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42113","20.085360","172.30.1.205","172.30.1.104","TCP","54","38946 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42114","20.087351","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42115","20.087785","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42116","20.087792","172.30.1.205","172.30.1.104","TCP","54","38946 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42117","20.089202","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42118","20.092589","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42119","20.092601","172.30.1.205","172.30.1.104","TCP","54","38946 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42120","20.093629","172.30.1.205","172.30.1.104","TCP","74","46312 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923320 TSecr=0 WS=128" "42121","20.093948","172.30.1.104","172.30.1.205","TCP","66","135 > 46312 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42122","20.093960","172.30.1.205","172.30.1.104","TCP","54","46312 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42123","20.094330","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42124","20.094652","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42125","20.094663","172.30.1.205","172.30.1.104","TCP","54","46312 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42126","20.096896","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42127","20.097301","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42128","20.097308","172.30.1.205","172.30.1.104","TCP","54","46312 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42129","20.098168","172.30.1.205","172.30.1.104","TCP","54","38906 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42130","20.098218","172.30.1.205","172.30.1.104","TCP","54","38910 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42131","20.098255","172.30.1.205","172.30.1.104","TCP","54","38914 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42132","20.098279","172.30.1.205","172.30.1.104","TCP","54","38918 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42133","20.098308","172.30.1.205","172.30.1.104","TCP","54","38922 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42134","20.098335","172.30.1.205","172.30.1.104","TCP","54","38926 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42135","20.098362","172.30.1.205","172.30.1.104","TCP","54","38930 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42136","20.098392","172.30.1.205","172.30.1.104","TCP","54","38934 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42137","20.098415","172.30.1.205","172.30.1.104","TCP","54","38938 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42138","20.098442","172.30.1.205","172.30.1.104","TCP","54","38942 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42139","20.098464","172.30.1.205","172.30.1.104","TCP","54","38946 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42140","20.098494","172.30.1.104","172.30.1.205","TCP","54","49671 > 38906 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42141","20.098563","172.30.1.205","172.30.1.104","TCP","54","38902 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42142","20.098697","172.30.1.104","172.30.1.205","TCP","54","49671 > 38910 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42143","20.098715","172.30.1.104","172.30.1.205","TCP","54","49671 > 38906 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42144","20.098722","172.30.1.205","172.30.1.104","TCP","54","38906 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42145","20.098737","172.30.1.104","172.30.1.205","TCP","54","49671 > 38910 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42146","20.098740","172.30.1.205","172.30.1.104","TCP","54","38910 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42147","20.098765","172.30.1.104","172.30.1.205","TCP","54","49671 > 38914 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42148","20.098785","172.30.1.104","172.30.1.205","TCP","54","49671 > 38918 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42149","20.098804","172.30.1.104","172.30.1.205","TCP","54","49671 > 38922 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42150","20.098825","172.30.1.104","172.30.1.205","TCP","54","49671 > 38914 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42151","20.098829","172.30.1.205","172.30.1.104","TCP","54","38914 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42152","20.098846","172.30.1.104","172.30.1.205","TCP","54","49671 > 38918 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42153","20.098849","172.30.1.205","172.30.1.104","TCP","54","38918 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42154","20.098867","172.30.1.104","172.30.1.205","TCP","54","49671 > 38922 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42155","20.098870","172.30.1.205","172.30.1.104","TCP","54","38922 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42156","20.099000","172.30.1.104","172.30.1.205","TCP","54","49671 > 38926 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42157","20.099022","172.30.1.104","172.30.1.205","TCP","54","49671 > 38930 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42158","20.099043","172.30.1.104","172.30.1.205","TCP","54","49671 > 38934 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42159","20.099064","172.30.1.104","172.30.1.205","TCP","54","49671 > 38938 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42160","20.099084","172.30.1.104","172.30.1.205","TCP","54","49671 > 38942 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42161","20.099105","172.30.1.104","172.30.1.205","TCP","54","49671 > 38902 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42162","20.099124","172.30.1.104","172.30.1.205","TCP","54","49671 > 38946 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42163","20.099253","172.30.1.104","172.30.1.205","TCP","54","49671 > 38946 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42164","20.099259","172.30.1.205","172.30.1.104","TCP","54","38946 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42165","20.099267","172.30.1.104","172.30.1.205","TCP","54","49671 > 38902 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42166","20.099270","172.30.1.205","172.30.1.104","TCP","54","38902 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42167","20.099295","172.30.1.104","172.30.1.205","TCP","54","49671 > 38942 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42168","20.099298","172.30.1.205","172.30.1.104","TCP","54","38942 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42169","20.099314","172.30.1.104","172.30.1.205","TCP","54","49671 > 38938 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42170","20.099316","172.30.1.205","172.30.1.104","TCP","54","38938 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42171","20.099347","172.30.1.104","172.30.1.205","TCP","54","49671 > 38926 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42172","20.099349","172.30.1.205","172.30.1.104","TCP","54","38926 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42173","20.099351","172.30.1.104","172.30.1.205","TCP","54","49671 > 38930 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42174","20.099353","172.30.1.205","172.30.1.104","TCP","54","38930 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42175","20.099382","172.30.1.104","172.30.1.205","TCP","54","49671 > 38934 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42176","20.099385","172.30.1.205","172.30.1.104","TCP","54","38934 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42177","20.100124","172.30.1.205","172.30.1.104","TCP","54","46312 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42178","20.100238","172.30.1.205","172.30.1.104","TCP","74","38950 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923326 TSecr=0 WS=128" "42179","20.100382","172.30.1.104","172.30.1.205","TCP","54","135 > 46312 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42180","20.100392","172.30.1.104","172.30.1.205","TCP","54","135 > 46312 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42181","20.100397","172.30.1.205","172.30.1.104","TCP","54","46312 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42182","20.100520","172.30.1.104","172.30.1.205","TCP","66","49671 > 38950 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42183","20.100528","172.30.1.205","172.30.1.104","TCP","54","38950 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42184","20.100910","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42185","20.101205","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42186","20.101214","172.30.1.205","172.30.1.104","TCP","54","38950 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42187","20.103116","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42188","20.103487","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42189","20.103493","172.30.1.205","172.30.1.104","TCP","54","38950 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42190","20.104888","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42191","20.108408","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42192","20.108419","172.30.1.205","172.30.1.104","TCP","54","38950 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42193","20.109404","172.30.1.205","172.30.1.104","TCP","74","46316 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923335 TSecr=0 WS=128" "42194","20.109695","172.30.1.104","172.30.1.205","TCP","66","135 > 46316 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42195","20.109706","172.30.1.205","172.30.1.104","TCP","54","46316 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42196","20.110060","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42197","20.110408","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42198","20.110417","172.30.1.205","172.30.1.104","TCP","54","46316 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42199","20.112594","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42200","20.113011","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42201","20.113017","172.30.1.205","172.30.1.104","TCP","54","46316 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42202","20.114832","172.30.1.205","172.30.1.104","TCP","54","46316 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42203","20.114947","172.30.1.205","172.30.1.104","TCP","74","38954 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923341 TSecr=0 WS=128" "42204","20.115087","172.30.1.104","172.30.1.205","TCP","54","135 > 46316 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42205","20.115098","172.30.1.104","172.30.1.205","TCP","54","135 > 46316 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42206","20.115104","172.30.1.205","172.30.1.104","TCP","54","46316 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42207","20.115238","172.30.1.104","172.30.1.205","TCP","66","49671 > 38954 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42208","20.115246","172.30.1.205","172.30.1.104","TCP","54","38954 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42209","20.115589","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42210","20.115889","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42211","20.115895","172.30.1.205","172.30.1.104","TCP","54","38954 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42212","20.117795","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42213","20.118197","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42214","20.118203","172.30.1.205","172.30.1.104","TCP","54","38954 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42215","20.119552","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42216","20.122987","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42217","20.122997","172.30.1.205","172.30.1.104","TCP","54","38954 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42218","20.123965","172.30.1.205","172.30.1.104","TCP","74","46320 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923350 TSecr=0 WS=128" "42219","20.124330","172.30.1.104","172.30.1.205","TCP","66","135 > 46320 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42220","20.124342","172.30.1.205","172.30.1.104","TCP","54","46320 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42221","20.124698","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42222","20.125037","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42223","20.125047","172.30.1.205","172.30.1.104","TCP","54","46320 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42224","20.127255","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42225","20.127689","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42226","20.127695","172.30.1.205","172.30.1.104","TCP","54","46320 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42227","20.129530","172.30.1.205","172.30.1.104","TCP","54","46320 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42228","20.129642","172.30.1.205","172.30.1.104","TCP","74","38958 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923356 TSecr=0 WS=128" "42229","20.129813","172.30.1.104","172.30.1.205","TCP","54","135 > 46320 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42230","20.129822","172.30.1.104","172.30.1.205","TCP","54","135 > 46320 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42231","20.129828","172.30.1.205","172.30.1.104","TCP","54","46320 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42232","20.129940","172.30.1.104","172.30.1.205","TCP","66","49671 > 38958 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42233","20.129949","172.30.1.205","172.30.1.104","TCP","54","38958 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42234","20.130297","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42235","20.130565","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42236","20.130573","172.30.1.205","172.30.1.104","TCP","54","38958 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42237","20.132448","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42238","20.132830","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42239","20.132843","172.30.1.205","172.30.1.104","TCP","54","38958 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42240","20.134403","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42241","20.137672","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42242","20.137681","172.30.1.205","172.30.1.104","TCP","54","38958 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42243","20.138644","172.30.1.205","172.30.1.104","TCP","74","46324 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923365 TSecr=0 WS=128" "42244","20.138959","172.30.1.104","172.30.1.205","TCP","66","135 > 46324 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42245","20.138969","172.30.1.205","172.30.1.104","TCP","54","46324 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42246","20.139319","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42247","20.139620","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42248","20.139630","172.30.1.205","172.30.1.104","TCP","54","46324 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42249","20.141855","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42250","20.142247","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42251","20.142254","172.30.1.205","172.30.1.104","TCP","54","46324 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42252","20.144094","172.30.1.205","172.30.1.104","TCP","54","46324 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42253","20.144205","172.30.1.205","172.30.1.104","TCP","74","38962 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923370 TSecr=0 WS=128" "42254","20.144366","172.30.1.104","172.30.1.205","TCP","54","135 > 46324 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42255","20.144402","172.30.1.104","172.30.1.205","TCP","54","135 > 46324 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42256","20.144408","172.30.1.205","172.30.1.104","TCP","54","46324 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42257","20.144519","172.30.1.104","172.30.1.205","TCP","66","49671 > 38962 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42258","20.144539","172.30.1.205","172.30.1.104","TCP","54","38962 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42259","20.144930","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42260","20.145242","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42261","20.145250","172.30.1.205","172.30.1.104","TCP","54","38962 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42262","20.147125","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42263","20.147533","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42264","20.147540","172.30.1.205","172.30.1.104","TCP","54","38962 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42265","20.148944","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42266","20.152256","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42267","20.152267","172.30.1.205","172.30.1.104","TCP","54","38962 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42268","20.153243","172.30.1.205","172.30.1.104","TCP","74","46328 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923379 TSecr=0 WS=128" "42269","20.153557","172.30.1.104","172.30.1.205","TCP","66","135 > 46328 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42270","20.153567","172.30.1.205","172.30.1.104","TCP","54","46328 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42271","20.153925","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42272","20.154227","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42273","20.154237","172.30.1.205","172.30.1.104","TCP","54","46328 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42274","20.156431","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42275","20.156861","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42276","20.156867","172.30.1.205","172.30.1.104","TCP","54","46328 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42277","20.158674","172.30.1.205","172.30.1.104","TCP","54","46328 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42278","20.158785","172.30.1.205","172.30.1.104","TCP","74","38966 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923385 TSecr=0 WS=128" "42279","20.158945","172.30.1.104","172.30.1.205","TCP","54","135 > 46328 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42280","20.158956","172.30.1.104","172.30.1.205","TCP","54","135 > 46328 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42281","20.158961","172.30.1.205","172.30.1.104","TCP","54","46328 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42282","20.159079","172.30.1.104","172.30.1.205","TCP","66","49671 > 38966 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42283","20.159087","172.30.1.205","172.30.1.104","TCP","54","38966 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42284","20.159429","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42285","20.159713","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42286","20.159721","172.30.1.205","172.30.1.104","TCP","54","38966 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42287","20.161630","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42288","20.162020","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42289","20.162032","172.30.1.205","172.30.1.104","TCP","54","38966 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42290","20.163558","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42291","20.166892","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42292","20.166902","172.30.1.205","172.30.1.104","TCP","54","38966 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42293","20.167845","172.30.1.205","172.30.1.104","TCP","74","46332 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923394 TSecr=0 WS=128" "42294","20.168203","172.30.1.104","172.30.1.205","TCP","66","135 > 46332 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42295","20.168213","172.30.1.205","172.30.1.104","TCP","54","46332 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42296","20.168567","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42297","20.168902","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42298","20.168911","172.30.1.205","172.30.1.104","TCP","54","46332 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42299","20.171115","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42300","20.171505","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42301","20.171511","172.30.1.205","172.30.1.104","TCP","54","46332 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42302","20.173351","172.30.1.205","172.30.1.104","TCP","54","46332 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42303","20.173463","172.30.1.205","172.30.1.104","TCP","74","38970 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923399 TSecr=0 WS=128" "42304","20.173609","172.30.1.104","172.30.1.205","TCP","54","135 > 46332 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42305","20.173625","172.30.1.104","172.30.1.205","TCP","54","135 > 46332 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42306","20.173630","172.30.1.205","172.30.1.104","TCP","54","46332 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42307","20.173772","172.30.1.104","172.30.1.205","TCP","66","49671 > 38970 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42308","20.173780","172.30.1.205","172.30.1.104","TCP","54","38970 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42309","20.174146","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42310","20.174452","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42311","20.174469","172.30.1.205","172.30.1.104","TCP","54","38970 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42312","20.176557","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42313","20.176934","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42314","20.176941","172.30.1.205","172.30.1.104","TCP","54","38970 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42315","20.178345","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42316","20.181670","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42317","20.181690","172.30.1.205","172.30.1.104","TCP","54","38970 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42318","20.182748","172.30.1.205","172.30.1.104","TCP","74","46336 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923409 TSecr=0 WS=128" "42319","20.183094","172.30.1.104","172.30.1.205","TCP","66","135 > 46336 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42320","20.183114","172.30.1.205","172.30.1.104","TCP","54","46336 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42321","20.183638","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42322","20.183999","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42323","20.184008","172.30.1.205","172.30.1.104","TCP","54","46336 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42324","20.186242","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42325","20.186621","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42326","20.186628","172.30.1.205","172.30.1.104","TCP","54","46336 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42327","20.188442","172.30.1.205","172.30.1.104","TCP","54","46336 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42328","20.188553","172.30.1.205","172.30.1.104","TCP","74","38974 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923414 TSecr=0 WS=128" "42329","20.188724","172.30.1.104","172.30.1.205","TCP","54","135 > 46336 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42330","20.188766","172.30.1.104","172.30.1.205","TCP","54","135 > 46336 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42331","20.188772","172.30.1.205","172.30.1.104","TCP","54","46336 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42332","20.188848","172.30.1.104","172.30.1.205","TCP","66","49671 > 38974 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42333","20.188856","172.30.1.205","172.30.1.104","TCP","54","38974 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42334","20.189206","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42335","20.189462","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42336","20.189476","172.30.1.205","172.30.1.104","TCP","54","38974 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42337","20.191541","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42338","20.191913","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42339","20.191920","172.30.1.205","172.30.1.104","TCP","54","38974 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42340","20.193315","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42341","20.196602","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42342","20.196611","172.30.1.205","172.30.1.104","TCP","54","38974 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42343","20.197582","172.30.1.205","172.30.1.104","TCP","74","46340 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923424 TSecr=0 WS=128" "42344","20.197867","172.30.1.104","172.30.1.205","TCP","66","135 > 46340 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42345","20.197878","172.30.1.205","172.30.1.104","TCP","54","46340 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42346","20.198233","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42347","20.198484","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42348","20.198494","172.30.1.205","172.30.1.104","TCP","54","46340 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42349","20.200693","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42350","20.201152","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42351","20.201166","172.30.1.205","172.30.1.104","TCP","54","46340 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42352","20.202977","172.30.1.205","172.30.1.104","TCP","54","46340 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42353","20.203090","172.30.1.205","172.30.1.104","TCP","74","38978 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923429 TSecr=0 WS=128" "42354","20.203268","172.30.1.104","172.30.1.205","TCP","54","135 > 46340 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42355","20.203278","172.30.1.104","172.30.1.205","TCP","54","135 > 46340 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42356","20.203284","172.30.1.205","172.30.1.104","TCP","54","46340 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42357","20.203359","172.30.1.104","172.30.1.205","TCP","66","49671 > 38978 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42358","20.203369","172.30.1.205","172.30.1.104","TCP","54","38978 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42359","20.203715","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42360","20.203990","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42361","20.203999","172.30.1.205","172.30.1.104","TCP","54","38978 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42362","20.205927","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42363","20.206293","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42364","20.206300","172.30.1.205","172.30.1.104","TCP","54","38978 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42365","20.207662","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42366","20.211058","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42367","20.211069","172.30.1.205","172.30.1.104","TCP","54","38978 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42368","20.212023","172.30.1.205","172.30.1.104","TCP","74","46344 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923438 TSecr=0 WS=128" "42369","20.212329","172.30.1.104","172.30.1.205","TCP","66","135 > 46344 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42370","20.212339","172.30.1.205","172.30.1.104","TCP","54","46344 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42371","20.212686","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42372","20.212967","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42373","20.212977","172.30.1.205","172.30.1.104","TCP","54","46344 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42374","20.215176","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42375","20.215589","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42376","20.215595","172.30.1.205","172.30.1.104","TCP","54","46344 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42377","20.217426","172.30.1.205","172.30.1.104","TCP","54","46344 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42378","20.217537","172.30.1.205","172.30.1.104","TCP","74","38982 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923443 TSecr=0 WS=128" "42379","20.217685","172.30.1.104","172.30.1.205","TCP","54","135 > 46344 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42380","20.217725","172.30.1.104","172.30.1.205","TCP","54","135 > 46344 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42381","20.217734","172.30.1.205","172.30.1.104","TCP","54","46344 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42382","20.217811","172.30.1.104","172.30.1.205","TCP","66","49671 > 38982 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42383","20.217823","172.30.1.205","172.30.1.104","TCP","54","38982 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42384","20.218219","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42385","20.218528","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42386","20.218538","172.30.1.205","172.30.1.104","TCP","54","38982 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42387","20.220440","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42388","20.220845","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42389","20.220852","172.30.1.205","172.30.1.104","TCP","54","38982 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42390","20.222208","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42391","20.225478","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42392","20.225488","172.30.1.205","172.30.1.104","TCP","54","38982 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42393","20.226451","172.30.1.205","172.30.1.104","TCP","74","46348 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923452 TSecr=0 WS=128" "42394","20.226758","172.30.1.104","172.30.1.205","TCP","66","135 > 46348 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42395","20.226769","172.30.1.205","172.30.1.104","TCP","54","46348 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42396","20.227123","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42397","20.227441","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42398","20.227450","172.30.1.205","172.30.1.104","TCP","54","46348 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42399","20.229670","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42400","20.230097","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42401","20.230104","172.30.1.205","172.30.1.104","TCP","54","46348 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42402","20.231957","172.30.1.205","172.30.1.104","TCP","54","46348 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42403","20.232069","172.30.1.205","172.30.1.104","TCP","74","38986 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923458 TSecr=0 WS=128" "42404","20.232239","172.30.1.104","172.30.1.205","TCP","54","135 > 46348 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42405","20.232247","172.30.1.104","172.30.1.205","TCP","54","135 > 46348 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42406","20.232252","172.30.1.205","172.30.1.104","TCP","54","46348 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42407","20.232322","172.30.1.104","172.30.1.205","TCP","66","49671 > 38986 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42408","20.232331","172.30.1.205","172.30.1.104","TCP","54","38986 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42409","20.232694","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42410","20.232990","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42411","20.233011","172.30.1.205","172.30.1.104","TCP","54","38986 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42412","20.234979","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42413","20.235378","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42414","20.235384","172.30.1.205","172.30.1.104","TCP","54","38986 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42415","20.236733","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42416","20.240009","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42417","20.240018","172.30.1.205","172.30.1.104","TCP","54","38986 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42418","20.240970","172.30.1.205","172.30.1.104","TCP","74","46352 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923467 TSecr=0 WS=128" "42419","20.241335","172.30.1.104","172.30.1.205","TCP","66","135 > 46352 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42420","20.241357","172.30.1.205","172.30.1.104","TCP","54","46352 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42421","20.241924","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42422","20.242195","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42423","20.242206","172.30.1.205","172.30.1.104","TCP","54","46352 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42424","20.244492","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42425","20.244869","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42426","20.244889","172.30.1.205","172.30.1.104","TCP","54","46352 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42427","20.246763","172.30.1.205","172.30.1.104","TCP","54","46352 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42428","20.246889","172.30.1.205","172.30.1.104","TCP","74","38990 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923473 TSecr=0 WS=128" "42429","20.247029","172.30.1.104","172.30.1.205","TCP","54","135 > 46352 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42430","20.247039","172.30.1.104","172.30.1.205","TCP","54","135 > 46352 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42431","20.247044","172.30.1.205","172.30.1.104","TCP","54","46352 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42432","20.247187","172.30.1.104","172.30.1.205","TCP","66","49671 > 38990 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42433","20.247196","172.30.1.205","172.30.1.104","TCP","54","38990 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42434","20.247546","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42435","20.247862","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42436","20.247869","172.30.1.205","172.30.1.104","TCP","54","38990 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42437","20.249810","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42438","20.250160","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42439","20.250167","172.30.1.205","172.30.1.104","TCP","54","38990 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42440","20.251516","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42441","20.254877","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42442","20.254891","172.30.1.205","172.30.1.104","TCP","54","38990 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42443","20.255872","172.30.1.205","172.30.1.104","TCP","74","46356 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923482 TSecr=0 WS=128" "42444","20.256253","172.30.1.104","172.30.1.205","TCP","66","135 > 46356 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42445","20.256277","172.30.1.205","172.30.1.104","TCP","54","46356 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42446","20.256761","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42447","20.257066","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42448","20.257076","172.30.1.205","172.30.1.104","TCP","54","46356 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42449","20.259359","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42450","20.259828","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42451","20.259835","172.30.1.205","172.30.1.104","TCP","54","46356 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42452","20.261776","172.30.1.205","172.30.1.104","TCP","54","46356 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42453","20.261898","172.30.1.205","172.30.1.104","TCP","74","38994 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923488 TSecr=0 WS=128" "42454","20.262113","172.30.1.104","172.30.1.205","TCP","54","135 > 46356 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42455","20.262154","172.30.1.104","172.30.1.205","TCP","54","135 > 46356 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42456","20.262160","172.30.1.205","172.30.1.104","TCP","54","46356 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42457","20.262229","172.30.1.104","172.30.1.205","TCP","66","49671 > 38994 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42458","20.262238","172.30.1.205","172.30.1.104","TCP","54","38994 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42459","20.262583","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42460","20.262849","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42461","20.262858","172.30.1.205","172.30.1.104","TCP","54","38994 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42462","20.264731","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42463","20.265115","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42464","20.265122","172.30.1.205","172.30.1.104","TCP","54","38994 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42465","20.266476","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42466","20.269768","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42467","20.269778","172.30.1.205","172.30.1.104","TCP","54","38994 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42468","20.270721","172.30.1.205","172.30.1.104","TCP","74","46360 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923497 TSecr=0 WS=128" "42469","20.271112","172.30.1.104","172.30.1.205","TCP","66","135 > 46360 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42470","20.271125","172.30.1.205","172.30.1.104","TCP","54","46360 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42471","20.271490","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42472","20.271801","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42473","20.271810","172.30.1.205","172.30.1.104","TCP","54","46360 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42474","20.274036","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42475","20.274442","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42476","20.274449","172.30.1.205","172.30.1.104","TCP","54","46360 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42477","20.275299","172.30.1.205","172.30.1.104","TCP","54","38954 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42478","20.275353","172.30.1.205","172.30.1.104","TCP","54","38958 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42479","20.275385","172.30.1.205","172.30.1.104","TCP","54","38962 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42480","20.275418","172.30.1.205","172.30.1.104","TCP","54","38966 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42481","20.275450","172.30.1.205","172.30.1.104","TCP","54","38970 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42482","20.275483","172.30.1.205","172.30.1.104","TCP","54","38974 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42483","20.275511","172.30.1.205","172.30.1.104","TCP","54","38978 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42484","20.275543","172.30.1.205","172.30.1.104","TCP","54","38982 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42485","20.275569","172.30.1.205","172.30.1.104","TCP","54","38986 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42486","20.275583","172.30.1.104","172.30.1.205","TCP","54","49671 > 38954 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42487","20.275598","172.30.1.104","172.30.1.205","TCP","54","49671 > 38958 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42488","20.275628","172.30.1.205","172.30.1.104","TCP","54","38990 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42489","20.275656","172.30.1.205","172.30.1.104","TCP","54","38994 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42490","20.275700","172.30.1.104","172.30.1.205","TCP","54","49671 > 38962 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42491","20.275715","172.30.1.104","172.30.1.205","TCP","54","49671 > 38954 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42492","20.275721","172.30.1.205","172.30.1.104","TCP","54","38954 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42493","20.275734","172.30.1.104","172.30.1.205","TCP","54","49671 > 38958 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42494","20.275737","172.30.1.205","172.30.1.104","TCP","54","38958 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42495","20.275753","172.30.1.104","172.30.1.205","TCP","54","49671 > 38966 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42496","20.275772","172.30.1.104","172.30.1.205","TCP","54","49671 > 38970 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42497","20.275786","172.30.1.205","172.30.1.104","TCP","54","38950 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42498","20.275792","172.30.1.104","172.30.1.205","TCP","54","49671 > 38962 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42499","20.275796","172.30.1.205","172.30.1.104","TCP","54","38962 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42500","20.275945","172.30.1.104","172.30.1.205","TCP","54","49671 > 38974 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42501","20.275965","172.30.1.104","172.30.1.205","TCP","54","49671 > 38978 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42502","20.275985","172.30.1.104","172.30.1.205","TCP","54","49671 > 38978 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42503","20.275990","172.30.1.205","172.30.1.104","TCP","54","38978 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42504","20.276005","172.30.1.104","172.30.1.205","TCP","54","49671 > 38974 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42505","20.276008","172.30.1.205","172.30.1.104","TCP","54","38974 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42506","20.276026","172.30.1.104","172.30.1.205","TCP","54","49671 > 38966 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42507","20.276029","172.30.1.205","172.30.1.104","TCP","54","38966 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42508","20.276045","172.30.1.104","172.30.1.205","TCP","54","49671 > 38970 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42509","20.276048","172.30.1.205","172.30.1.104","TCP","54","38970 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42510","20.276066","172.30.1.104","172.30.1.205","TCP","54","49671 > 38982 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42511","20.276167","172.30.1.104","172.30.1.205","TCP","54","49671 > 38986 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42512","20.276185","172.30.1.104","172.30.1.205","TCP","54","49671 > 38990 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42513","20.276217","172.30.1.104","172.30.1.205","TCP","54","49671 > 38982 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42514","20.276222","172.30.1.205","172.30.1.104","TCP","54","38982 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42515","20.276238","172.30.1.104","172.30.1.205","TCP","54","49671 > 38986 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42516","20.276241","172.30.1.205","172.30.1.104","TCP","54","38986 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42517","20.276258","172.30.1.104","172.30.1.205","TCP","54","49671 > 38990 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42518","20.276261","172.30.1.205","172.30.1.104","TCP","54","38990 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42519","20.276280","172.30.1.104","172.30.1.205","TCP","54","49671 > 38994 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42520","20.276391","172.30.1.104","172.30.1.205","TCP","54","49671 > 38950 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42521","20.276410","172.30.1.104","172.30.1.205","TCP","54","49671 > 38994 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42522","20.276414","172.30.1.205","172.30.1.104","TCP","54","38994 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42523","20.276428","172.30.1.104","172.30.1.205","TCP","54","49671 > 38950 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42524","20.276430","172.30.1.205","172.30.1.104","TCP","54","38950 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42525","20.277335","172.30.1.205","172.30.1.104","TCP","54","46360 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42526","20.277447","172.30.1.205","172.30.1.104","TCP","74","38998 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923503 TSecr=0 WS=128" "42527","20.277654","172.30.1.104","172.30.1.205","TCP","54","135 > 46360 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42528","20.277703","172.30.1.104","172.30.1.205","TCP","66","49671 > 38998 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42529","20.277712","172.30.1.205","172.30.1.104","TCP","54","38998 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42530","20.277726","172.30.1.104","172.30.1.205","TCP","54","135 > 46360 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42531","20.277730","172.30.1.205","172.30.1.104","TCP","54","46360 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42532","20.278082","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42533","20.278357","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42534","20.278366","172.30.1.205","172.30.1.104","TCP","54","38998 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42535","20.280243","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42536","20.280612","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42537","20.280618","172.30.1.205","172.30.1.104","TCP","54","38998 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42538","20.282014","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42539","20.286078","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42540","20.286087","172.30.1.205","172.30.1.104","TCP","54","38998 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42541","20.287047","172.30.1.205","172.30.1.104","TCP","74","46364 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923513 TSecr=0 WS=128" "42542","20.287414","172.30.1.104","172.30.1.205","TCP","66","135 > 46364 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42543","20.287426","172.30.1.205","172.30.1.104","TCP","54","46364 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42544","20.287776","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42545","20.288084","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42546","20.288093","172.30.1.205","172.30.1.104","TCP","54","46364 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42547","20.290302","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42548","20.290679","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42549","20.290686","172.30.1.205","172.30.1.104","TCP","54","46364 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42550","20.292499","172.30.1.205","172.30.1.104","TCP","54","46364 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42551","20.292611","172.30.1.205","172.30.1.104","TCP","74","39002 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923519 TSecr=0 WS=128" "42552","20.292793","172.30.1.104","172.30.1.205","TCP","54","135 > 46364 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42553","20.292816","172.30.1.104","172.30.1.205","TCP","54","135 > 46364 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42554","20.292824","172.30.1.205","172.30.1.104","TCP","54","46364 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42555","20.292893","172.30.1.104","172.30.1.205","TCP","66","49671 > 39002 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42556","20.292902","172.30.1.205","172.30.1.104","TCP","54","39002 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42557","20.293255","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42558","20.293544","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42559","20.293553","172.30.1.205","172.30.1.104","TCP","54","39002 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42560","20.295498","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42561","20.295869","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42562","20.295875","172.30.1.205","172.30.1.104","TCP","54","39002 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42563","20.297264","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42564","20.300563","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42565","20.300577","172.30.1.205","172.30.1.104","TCP","54","39002 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42566","20.301563","172.30.1.205","172.30.1.104","TCP","74","46368 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923527 TSecr=0 WS=128" "42567","20.301899","172.30.1.104","172.30.1.205","TCP","66","135 > 46368 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42568","20.301910","172.30.1.205","172.30.1.104","TCP","54","46368 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42569","20.302266","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42570","20.302547","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42571","20.302556","172.30.1.205","172.30.1.104","TCP","54","46368 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42572","20.304768","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42573","20.305158","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42574","20.305165","172.30.1.205","172.30.1.104","TCP","54","46368 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42575","20.306987","172.30.1.205","172.30.1.104","TCP","54","46368 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42576","20.307098","172.30.1.205","172.30.1.104","TCP","74","39006 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923533 TSecr=0 WS=128" "42577","20.307333","172.30.1.104","172.30.1.205","TCP","54","135 > 46368 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42578","20.307342","172.30.1.104","172.30.1.205","TCP","54","135 > 46368 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42579","20.307347","172.30.1.205","172.30.1.104","TCP","54","46368 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42580","20.307420","172.30.1.104","172.30.1.205","TCP","66","49671 > 39006 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42581","20.307429","172.30.1.205","172.30.1.104","TCP","54","39006 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42582","20.307819","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42583","20.308099","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42584","20.308108","172.30.1.205","172.30.1.104","TCP","54","39006 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42585","20.310022","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42586","20.310414","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42587","20.310420","172.30.1.205","172.30.1.104","TCP","54","39006 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42588","20.311767","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42589","20.316950","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42590","20.316959","172.30.1.205","172.30.1.104","TCP","54","39006 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42591","20.317919","172.30.1.205","172.30.1.104","TCP","74","46372 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923544 TSecr=0 WS=128" "42592","20.318316","172.30.1.104","172.30.1.205","TCP","66","135 > 46372 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42593","20.318328","172.30.1.205","172.30.1.104","TCP","54","46372 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42594","20.318689","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42595","20.318957","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42596","20.318973","172.30.1.205","172.30.1.104","TCP","54","46372 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42597","20.321186","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42598","20.321639","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42599","20.321646","172.30.1.205","172.30.1.104","TCP","54","46372 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42600","20.323460","172.30.1.205","172.30.1.104","TCP","54","46372 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42601","20.323574","172.30.1.205","172.30.1.104","TCP","74","39010 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923549 TSecr=0 WS=128" "42602","20.323755","172.30.1.104","172.30.1.205","TCP","54","135 > 46372 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42603","20.323763","172.30.1.104","172.30.1.205","TCP","54","135 > 46372 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42604","20.323769","172.30.1.205","172.30.1.104","TCP","54","46372 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42605","20.323841","172.30.1.104","172.30.1.205","TCP","66","49671 > 39010 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42606","20.323849","172.30.1.205","172.30.1.104","TCP","54","39010 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42607","20.324195","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42608","20.324619","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42609","20.324636","172.30.1.205","172.30.1.104","TCP","54","39010 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42610","20.326816","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42611","20.327195","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42612","20.327201","172.30.1.205","172.30.1.104","TCP","54","39010 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42613","20.328564","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42614","20.331952","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42615","20.331963","172.30.1.205","172.30.1.104","TCP","54","39010 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42616","20.332945","172.30.1.205","172.30.1.104","TCP","74","46376 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923559 TSecr=0 WS=128" "42617","20.333347","172.30.1.104","172.30.1.205","TCP","66","135 > 46376 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42618","20.333358","172.30.1.205","172.30.1.104","TCP","54","46376 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42619","20.333721","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42620","20.333997","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42621","20.334006","172.30.1.205","172.30.1.104","TCP","54","46376 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42622","20.336191","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42623","20.336641","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42624","20.336648","172.30.1.205","172.30.1.104","TCP","54","46376 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42625","20.338486","172.30.1.205","172.30.1.104","TCP","54","46376 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42626","20.338599","172.30.1.205","172.30.1.104","TCP","74","39014 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923565 TSecr=0 WS=128" "42627","20.338797","172.30.1.104","172.30.1.205","TCP","54","135 > 46376 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42628","20.338806","172.30.1.104","172.30.1.205","TCP","54","135 > 46376 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42629","20.338811","172.30.1.205","172.30.1.104","TCP","54","46376 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42630","20.338899","172.30.1.104","172.30.1.205","TCP","66","49671 > 39014 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42631","20.338908","172.30.1.205","172.30.1.104","TCP","54","39014 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42632","20.339253","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42633","20.339519","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42634","20.339527","172.30.1.205","172.30.1.104","TCP","54","39014 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42635","20.341451","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42636","20.341901","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42637","20.341908","172.30.1.205","172.30.1.104","TCP","54","39014 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42638","20.343257","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42639","20.346590","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42640","20.346609","172.30.1.205","172.30.1.104","TCP","54","39014 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42641","20.347806","172.30.1.205","172.30.1.104","TCP","74","46380 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923574 TSecr=0 WS=128" "42642","20.348133","172.30.1.104","172.30.1.205","TCP","66","135 > 46380 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42643","20.348144","172.30.1.205","172.30.1.104","TCP","54","46380 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42644","20.348505","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42645","20.348834","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42646","20.348844","172.30.1.205","172.30.1.104","TCP","54","46380 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42647","20.351099","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42648","20.351548","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42649","20.351555","172.30.1.205","172.30.1.104","TCP","54","46380 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42650","20.353392","172.30.1.205","172.30.1.104","TCP","54","46380 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42651","20.353505","172.30.1.205","172.30.1.104","TCP","74","39018 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923579 TSecr=0 WS=128" "42652","20.353721","172.30.1.104","172.30.1.205","TCP","54","135 > 46380 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42653","20.353768","172.30.1.104","172.30.1.205","TCP","54","135 > 46380 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42654","20.353773","172.30.1.205","172.30.1.104","TCP","54","46380 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42655","20.353862","172.30.1.104","172.30.1.205","TCP","66","49671 > 39018 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42656","20.353871","172.30.1.205","172.30.1.104","TCP","54","39018 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42657","20.354218","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42658","20.354511","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42659","20.354518","172.30.1.205","172.30.1.104","TCP","54","39018 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42660","20.356393","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42661","20.356835","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42662","20.356842","172.30.1.205","172.30.1.104","TCP","54","39018 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42663","20.358248","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42664","20.361653","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42665","20.361662","172.30.1.205","172.30.1.104","TCP","54","39018 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42666","20.362616","172.30.1.205","172.30.1.104","TCP","74","46384 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923589 TSecr=0 WS=128" "42667","20.363017","172.30.1.104","172.30.1.205","TCP","66","135 > 46384 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42668","20.363028","172.30.1.205","172.30.1.104","TCP","54","46384 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42669","20.363371","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42670","20.363643","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42671","20.363652","172.30.1.205","172.30.1.104","TCP","54","46384 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42672","20.365883","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42673","20.366333","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42674","20.366340","172.30.1.205","172.30.1.104","TCP","54","46384 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42675","20.368167","172.30.1.205","172.30.1.104","TCP","54","46384 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42676","20.368285","172.30.1.205","172.30.1.104","TCP","74","39022 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923594 TSecr=0 WS=128" "42677","20.368446","172.30.1.104","172.30.1.205","TCP","54","135 > 46384 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42678","20.368523","172.30.1.104","172.30.1.205","TCP","54","135 > 46384 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42679","20.368529","172.30.1.205","172.30.1.104","TCP","54","46384 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42680","20.368601","172.30.1.104","172.30.1.205","TCP","66","49671 > 39022 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42681","20.368609","172.30.1.205","172.30.1.104","TCP","54","39022 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42682","20.368988","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42683","20.369269","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42684","20.369278","172.30.1.205","172.30.1.104","TCP","54","39022 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42685","20.371168","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42686","20.371539","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42687","20.371546","172.30.1.205","172.30.1.104","TCP","54","39022 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42688","20.372939","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42689","20.376356","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42690","20.376368","172.30.1.205","172.30.1.104","TCP","54","39022 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42691","20.377408","172.30.1.205","172.30.1.104","TCP","74","46388 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923603 TSecr=0 WS=128" "42692","20.377718","172.30.1.104","172.30.1.205","TCP","66","135 > 46388 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42693","20.377729","172.30.1.205","172.30.1.104","TCP","54","46388 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42694","20.378086","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42695","20.378442","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42696","20.378451","172.30.1.205","172.30.1.104","TCP","54","46388 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42697","20.380670","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42698","20.381087","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42699","20.381093","172.30.1.205","172.30.1.104","TCP","54","46388 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42700","20.382930","172.30.1.205","172.30.1.104","TCP","54","46388 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42701","20.383052","172.30.1.205","172.30.1.104","TCP","74","39026 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923609 TSecr=0 WS=128" "42702","20.383202","172.30.1.104","172.30.1.205","TCP","54","135 > 46388 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42703","20.383226","172.30.1.104","172.30.1.205","TCP","54","135 > 46388 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42704","20.383233","172.30.1.205","172.30.1.104","TCP","54","46388 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42705","20.383347","172.30.1.104","172.30.1.205","TCP","66","49671 > 39026 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42706","20.383355","172.30.1.205","172.30.1.104","TCP","54","39026 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42707","20.383698","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42708","20.383970","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42709","20.383978","172.30.1.205","172.30.1.104","TCP","54","39026 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42710","20.385902","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42711","20.386284","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42712","20.386291","172.30.1.205","172.30.1.104","TCP","54","39026 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42713","20.387654","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42714","20.393595","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42715","20.393606","172.30.1.205","172.30.1.104","TCP","54","39026 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42716","20.394605","172.30.1.205","172.30.1.104","TCP","74","46392 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923621 TSecr=0 WS=128" "42717","20.394934","172.30.1.104","172.30.1.205","TCP","66","135 > 46392 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42718","20.394946","172.30.1.205","172.30.1.104","TCP","54","46392 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42719","20.395303","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42720","20.395605","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42721","20.395614","172.30.1.205","172.30.1.104","TCP","54","46392 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42722","20.397835","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42723","20.398264","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42724","20.398271","172.30.1.205","172.30.1.104","TCP","54","46392 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42725","20.400089","172.30.1.205","172.30.1.104","TCP","54","46392 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42726","20.400207","172.30.1.205","172.30.1.104","TCP","74","39030 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923626 TSecr=0 WS=128" "42727","20.400401","172.30.1.104","172.30.1.205","TCP","54","135 > 46392 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42728","20.400418","172.30.1.104","172.30.1.205","TCP","54","135 > 46392 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42729","20.400424","172.30.1.205","172.30.1.104","TCP","54","46392 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42730","20.400496","172.30.1.104","172.30.1.205","TCP","66","49671 > 39030 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42731","20.400504","172.30.1.205","172.30.1.104","TCP","54","39030 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42732","20.400892","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42733","20.401180","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42734","20.401188","172.30.1.205","172.30.1.104","TCP","54","39030 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42735","20.403042","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42736","20.403446","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42737","20.403453","172.30.1.205","172.30.1.104","TCP","54","39030 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42738","20.404829","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42739","20.408141","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42740","20.408150","172.30.1.205","172.30.1.104","TCP","54","39030 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42741","20.409120","172.30.1.205","172.30.1.104","TCP","74","46396 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923635 TSecr=0 WS=128" "42742","20.409459","172.30.1.104","172.30.1.205","TCP","66","135 > 46396 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42743","20.409470","172.30.1.205","172.30.1.104","TCP","54","46396 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42744","20.409829","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42745","20.410134","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42746","20.410143","172.30.1.205","172.30.1.104","TCP","54","46396 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42747","20.412332","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42748","20.412758","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42749","20.412764","172.30.1.205","172.30.1.104","TCP","54","46396 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42750","20.414572","172.30.1.205","172.30.1.104","TCP","54","46396 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42751","20.414692","172.30.1.205","172.30.1.104","TCP","74","39034 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923641 TSecr=0 WS=128" "42752","20.414854","172.30.1.104","172.30.1.205","TCP","54","135 > 46396 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42753","20.414934","172.30.1.104","172.30.1.205","TCP","54","135 > 46396 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42754","20.414940","172.30.1.205","172.30.1.104","TCP","54","46396 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42755","20.414944","172.30.1.104","172.30.1.205","TCP","66","49671 > 39034 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42756","20.414952","172.30.1.205","172.30.1.104","TCP","54","39034 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42757","20.415302","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42758","20.415616","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42759","20.415625","172.30.1.205","172.30.1.104","TCP","54","39034 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42760","20.417541","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42761","20.417916","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42762","20.417922","172.30.1.205","172.30.1.104","TCP","54","39034 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42763","20.419268","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42764","20.422647","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42765","20.422656","172.30.1.205","172.30.1.104","TCP","54","39034 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42766","20.423600","172.30.1.205","172.30.1.104","TCP","74","46400 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923650 TSecr=0 WS=128" "42767","20.423913","172.30.1.104","172.30.1.205","TCP","66","135 > 46400 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42768","20.423923","172.30.1.205","172.30.1.104","TCP","54","46400 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42769","20.424276","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42770","20.424563","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42771","20.424571","172.30.1.205","172.30.1.104","TCP","54","46400 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42772","20.426778","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42773","20.427203","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42774","20.427209","172.30.1.205","172.30.1.104","TCP","54","46400 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42775","20.429038","172.30.1.205","172.30.1.104","TCP","54","46400 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42776","20.429149","172.30.1.205","172.30.1.104","TCP","74","39038 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923655 TSecr=0 WS=128" "42777","20.429366","172.30.1.104","172.30.1.205","TCP","54","135 > 46400 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42778","20.429435","172.30.1.104","172.30.1.205","TCP","66","49671 > 39038 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42779","20.429444","172.30.1.205","172.30.1.104","TCP","54","39038 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42780","20.429456","172.30.1.104","172.30.1.205","TCP","54","135 > 46400 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42781","20.429464","172.30.1.205","172.30.1.104","TCP","54","46400 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42782","20.429816","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42783","20.430094","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42784","20.430102","172.30.1.205","172.30.1.104","TCP","54","39038 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42785","20.431974","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42786","20.432375","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42787","20.432381","172.30.1.205","172.30.1.104","TCP","54","39038 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42788","20.433754","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42789","20.437108","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42790","20.437118","172.30.1.205","172.30.1.104","TCP","54","39038 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42791","20.438091","172.30.1.205","172.30.1.104","TCP","74","46404 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923664 TSecr=0 WS=128" "42792","20.438436","172.30.1.104","172.30.1.205","TCP","66","135 > 46404 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42793","20.438457","172.30.1.205","172.30.1.104","TCP","54","46404 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42794","20.439012","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42795","20.439318","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42796","20.439330","172.30.1.205","172.30.1.104","TCP","54","46404 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42797","20.441552","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42798","20.441976","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42799","20.441986","172.30.1.205","172.30.1.104","TCP","54","46404 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42800","20.443886","172.30.1.205","172.30.1.104","TCP","54","46404 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42801","20.444019","172.30.1.205","172.30.1.104","TCP","74","39042 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923670 TSecr=0 WS=128" "42802","20.444171","172.30.1.104","172.30.1.205","TCP","54","135 > 46404 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42803","20.444182","172.30.1.104","172.30.1.205","TCP","54","135 > 46404 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42804","20.444188","172.30.1.205","172.30.1.104","TCP","54","46404 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42805","20.444287","172.30.1.104","172.30.1.205","TCP","66","49671 > 39042 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42806","20.444295","172.30.1.205","172.30.1.104","TCP","54","39042 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42807","20.444643","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42808","20.444917","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42809","20.444927","172.30.1.205","172.30.1.104","TCP","54","39042 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42810","20.446821","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42811","20.447215","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42812","20.447224","172.30.1.205","172.30.1.104","TCP","54","39042 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42813","20.448655","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42814","20.452677","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42815","20.452690","172.30.1.205","172.30.1.104","TCP","54","39042 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42816","20.453719","172.30.1.205","172.30.1.104","TCP","74","46408 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923680 TSecr=0 WS=128" "42817","20.454055","172.30.1.104","172.30.1.205","TCP","66","135 > 46408 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42818","20.454066","172.30.1.205","172.30.1.104","TCP","54","46408 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42819","20.454456","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42820","20.454736","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42821","20.454755","172.30.1.205","172.30.1.104","TCP","54","46408 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42822","20.457180","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42823","20.457601","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42824","20.457608","172.30.1.205","172.30.1.104","TCP","54","46408 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42825","20.458460","172.30.1.205","172.30.1.104","TCP","54","39002 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42826","20.458508","172.30.1.205","172.30.1.104","TCP","54","39006 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42827","20.458544","172.30.1.205","172.30.1.104","TCP","54","39010 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42828","20.458577","172.30.1.205","172.30.1.104","TCP","54","39014 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42829","20.458604","172.30.1.205","172.30.1.104","TCP","54","39018 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42830","20.458632","172.30.1.205","172.30.1.104","TCP","54","39022 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42831","20.458658","172.30.1.205","172.30.1.104","TCP","54","39026 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42832","20.458680","172.30.1.205","172.30.1.104","TCP","54","39030 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42833","20.458713","172.30.1.205","172.30.1.104","TCP","54","39034 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42834","20.458741","172.30.1.205","172.30.1.104","TCP","54","39038 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42835","20.458767","172.30.1.205","172.30.1.104","TCP","54","39042 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42836","20.458806","172.30.1.104","172.30.1.205","TCP","54","49671 > 39002 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42837","20.458825","172.30.1.104","172.30.1.205","TCP","54","49671 > 39006 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42838","20.458849","172.30.1.104","172.30.1.205","TCP","54","49671 > 39002 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42839","20.458856","172.30.1.205","172.30.1.104","TCP","54","39002 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42840","20.458872","172.30.1.104","172.30.1.205","TCP","54","49671 > 39006 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42841","20.458875","172.30.1.205","172.30.1.104","TCP","54","39006 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42842","20.458893","172.30.1.104","172.30.1.205","TCP","54","49671 > 39010 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42843","20.458908","172.30.1.205","172.30.1.104","TCP","54","38998 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "42844","20.459021","172.30.1.104","172.30.1.205","TCP","54","49671 > 39014 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42845","20.459038","172.30.1.104","172.30.1.205","TCP","54","49671 > 39010 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42846","20.459043","172.30.1.205","172.30.1.104","TCP","54","39010 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42847","20.459058","172.30.1.104","172.30.1.205","TCP","54","49671 > 39018 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42848","20.459079","172.30.1.104","172.30.1.205","TCP","54","49671 > 39014 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42849","20.459083","172.30.1.205","172.30.1.104","TCP","54","39014 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42850","20.459099","172.30.1.104","172.30.1.205","TCP","54","49671 > 39018 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42851","20.459102","172.30.1.205","172.30.1.104","TCP","54","39018 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42852","20.459119","172.30.1.104","172.30.1.205","TCP","54","49671 > 39022 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42853","20.459143","172.30.1.104","172.30.1.205","TCP","54","49671 > 39026 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42854","20.459202","172.30.1.104","172.30.1.205","TCP","54","49671 > 39022 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42855","20.459207","172.30.1.205","172.30.1.104","TCP","54","39022 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42856","20.459285","172.30.1.104","172.30.1.205","TCP","54","49671 > 39030 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42857","20.459302","172.30.1.104","172.30.1.205","TCP","54","49671 > 39034 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42858","20.459323","172.30.1.104","172.30.1.205","TCP","54","49671 > 39034 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42859","20.459328","172.30.1.205","172.30.1.104","TCP","54","39034 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42860","20.459349","172.30.1.104","172.30.1.205","TCP","54","49671 > 39026 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42861","20.459352","172.30.1.205","172.30.1.104","TCP","54","39026 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42862","20.459375","172.30.1.104","172.30.1.205","TCP","54","49671 > 39030 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42863","20.459379","172.30.1.205","172.30.1.104","TCP","54","39030 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42864","20.459400","172.30.1.104","172.30.1.205","TCP","54","49671 > 39038 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42865","20.459419","172.30.1.104","172.30.1.205","TCP","54","49671 > 39042 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42866","20.459528","172.30.1.104","172.30.1.205","TCP","54","49671 > 39038 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42867","20.459533","172.30.1.205","172.30.1.104","TCP","54","39038 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42868","20.459559","172.30.1.104","172.30.1.205","TCP","54","49671 > 39042 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42869","20.459562","172.30.1.205","172.30.1.104","TCP","54","39042 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42870","20.459584","172.30.1.104","172.30.1.205","TCP","54","49671 > 38998 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42871","20.459608","172.30.1.104","172.30.1.205","TCP","54","49671 > 38998 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "42872","20.459611","172.30.1.205","172.30.1.104","TCP","54","38998 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "42873","20.460507","172.30.1.205","172.30.1.104","TCP","54","46408 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42874","20.460620","172.30.1.205","172.30.1.104","TCP","74","39046 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923687 TSecr=0 WS=128" "42875","20.460766","172.30.1.104","172.30.1.205","TCP","54","135 > 46408 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42876","20.460791","172.30.1.104","172.30.1.205","TCP","54","135 > 46408 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42877","20.460796","172.30.1.205","172.30.1.104","TCP","54","46408 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42878","20.460877","172.30.1.104","172.30.1.205","TCP","66","49671 > 39046 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42879","20.460885","172.30.1.205","172.30.1.104","TCP","54","39046 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42880","20.461256","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42881","20.461528","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42882","20.461537","172.30.1.205","172.30.1.104","TCP","54","39046 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42883","20.463406","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42884","20.463756","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42885","20.463762","172.30.1.205","172.30.1.104","TCP","54","39046 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42886","20.465153","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42887","20.468516","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42888","20.468527","172.30.1.205","172.30.1.104","TCP","54","39046 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42889","20.469524","172.30.1.205","172.30.1.104","TCP","74","46412 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923695 TSecr=0 WS=128" "42890","20.469910","172.30.1.104","172.30.1.205","TCP","66","135 > 46412 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42891","20.469921","172.30.1.205","172.30.1.104","TCP","54","46412 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42892","20.470270","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42893","20.470588","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42894","20.470597","172.30.1.205","172.30.1.104","TCP","54","46412 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42895","20.472770","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42896","20.473198","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42897","20.473205","172.30.1.205","172.30.1.104","TCP","54","46412 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42898","20.475011","172.30.1.205","172.30.1.104","TCP","54","46412 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42899","20.475119","172.30.1.205","172.30.1.104","TCP","74","39050 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923701 TSecr=0 WS=128" "42900","20.475288","172.30.1.104","172.30.1.205","TCP","54","135 > 46412 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42901","20.475309","172.30.1.104","172.30.1.205","TCP","54","135 > 46412 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42902","20.475315","172.30.1.205","172.30.1.104","TCP","54","46412 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42903","20.475419","172.30.1.104","172.30.1.205","TCP","66","49671 > 39050 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42904","20.475427","172.30.1.205","172.30.1.104","TCP","54","39050 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42905","20.475768","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42906","20.476842","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42907","20.476850","172.30.1.205","172.30.1.104","TCP","54","39050 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42908","20.478720","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42909","20.479117","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42910","20.479130","172.30.1.205","172.30.1.104","TCP","54","39050 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42911","20.480585","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42912","20.483965","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42913","20.483974","172.30.1.205","172.30.1.104","TCP","54","39050 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42914","20.484922","172.30.1.205","172.30.1.104","TCP","74","46416 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923711 TSecr=0 WS=128" "42915","20.485259","172.30.1.104","172.30.1.205","TCP","66","135 > 46416 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42916","20.485270","172.30.1.205","172.30.1.104","TCP","54","46416 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42917","20.485625","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42918","20.485920","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42919","20.485929","172.30.1.205","172.30.1.104","TCP","54","46416 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42920","20.488114","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42921","20.488602","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42922","20.488609","172.30.1.205","172.30.1.104","TCP","54","46416 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42923","20.490422","172.30.1.205","172.30.1.104","TCP","54","46416 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42924","20.490534","172.30.1.205","172.30.1.104","TCP","74","39054 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923716 TSecr=0 WS=128" "42925","20.490669","172.30.1.104","172.30.1.205","TCP","54","135 > 46416 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42926","20.490682","172.30.1.104","172.30.1.205","TCP","54","135 > 46416 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42927","20.490687","172.30.1.205","172.30.1.104","TCP","54","46416 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42928","20.490803","172.30.1.104","172.30.1.205","TCP","66","49671 > 39054 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42929","20.490814","172.30.1.205","172.30.1.104","TCP","54","39054 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42930","20.491445","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42931","20.491769","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42932","20.491778","172.30.1.205","172.30.1.104","TCP","54","39054 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42933","20.493686","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42934","20.494048","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42935","20.494054","172.30.1.205","172.30.1.104","TCP","54","39054 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42936","20.495397","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42937","20.498828","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42938","20.498837","172.30.1.205","172.30.1.104","TCP","54","39054 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42939","20.499797","172.30.1.205","172.30.1.104","TCP","74","46420 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923726 TSecr=0 WS=128" "42940","20.500131","172.30.1.104","172.30.1.205","TCP","66","135 > 46420 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42941","20.500142","172.30.1.205","172.30.1.104","TCP","54","46420 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42942","20.500496","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42943","20.500824","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42944","20.500833","172.30.1.205","172.30.1.104","TCP","54","46420 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42945","20.503058","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42946","20.503556","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42947","20.503562","172.30.1.205","172.30.1.104","TCP","54","46420 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42948","20.505391","172.30.1.205","172.30.1.104","TCP","54","46420 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42949","20.505500","172.30.1.205","172.30.1.104","TCP","74","39058 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923731 TSecr=0 WS=128" "42950","20.505649","172.30.1.104","172.30.1.205","TCP","54","135 > 46420 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42951","20.505671","172.30.1.104","172.30.1.205","TCP","54","135 > 46420 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42952","20.505677","172.30.1.205","172.30.1.104","TCP","54","46420 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42953","20.505799","172.30.1.104","172.30.1.205","TCP","66","49671 > 39058 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42954","20.505807","172.30.1.205","172.30.1.104","TCP","54","39058 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42955","20.506152","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42956","20.507678","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42957","20.507685","172.30.1.205","172.30.1.104","TCP","54","39058 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42958","20.509584","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42959","20.510013","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42960","20.510023","172.30.1.205","172.30.1.104","TCP","54","39058 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42961","20.511475","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42962","20.514865","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42963","20.514876","172.30.1.205","172.30.1.104","TCP","54","39058 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42964","20.515868","172.30.1.205","172.30.1.104","TCP","74","46424 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923742 TSecr=0 WS=128" "42965","20.516189","172.30.1.104","172.30.1.205","TCP","66","135 > 46424 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42966","20.516204","172.30.1.205","172.30.1.104","TCP","54","46424 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42967","20.516592","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42968","20.516884","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42969","20.516894","172.30.1.205","172.30.1.104","TCP","54","46424 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42970","20.519113","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42971","20.519551","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42972","20.519558","172.30.1.205","172.30.1.104","TCP","54","46424 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42973","20.521405","172.30.1.205","172.30.1.104","TCP","54","46424 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42974","20.521527","172.30.1.205","172.30.1.104","TCP","74","39062 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923747 TSecr=0 WS=128" "42975","20.521668","172.30.1.104","172.30.1.205","TCP","54","135 > 46424 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42976","20.521680","172.30.1.104","172.30.1.205","TCP","54","135 > 46424 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "42977","20.521687","172.30.1.205","172.30.1.104","TCP","54","46424 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "42978","20.521783","172.30.1.104","172.30.1.205","TCP","66","49671 > 39062 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42979","20.521791","172.30.1.205","172.30.1.104","TCP","54","39062 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42980","20.522139","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "42981","20.522584","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42982","20.522593","172.30.1.205","172.30.1.104","TCP","54","39062 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42983","20.524491","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "42984","20.524877","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "42985","20.524884","172.30.1.205","172.30.1.104","TCP","54","39062 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "42986","20.526256","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "42987","20.529764","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "42988","20.529774","172.30.1.205","172.30.1.104","TCP","54","39062 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "42989","20.530734","172.30.1.205","172.30.1.104","TCP","74","46428 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923757 TSecr=0 WS=128" "42990","20.531030","172.30.1.104","172.30.1.205","TCP","66","135 > 46428 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "42991","20.531041","172.30.1.205","172.30.1.104","TCP","54","46428 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "42992","20.531395","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "42993","20.531749","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "42994","20.531758","172.30.1.205","172.30.1.104","TCP","54","46428 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "42995","20.534000","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "42996","20.534400","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "42997","20.534407","172.30.1.205","172.30.1.104","TCP","54","46428 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "42998","20.536237","172.30.1.205","172.30.1.104","TCP","54","46428 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "42999","20.536355","172.30.1.205","172.30.1.104","TCP","74","39066 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923762 TSecr=0 WS=128" "43000","20.536537","172.30.1.104","172.30.1.205","TCP","54","135 > 46428 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43001","20.536568","172.30.1.104","172.30.1.205","TCP","54","135 > 46428 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43002","20.536574","172.30.1.205","172.30.1.104","TCP","54","46428 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43003","20.536643","172.30.1.104","172.30.1.205","TCP","66","49671 > 39066 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43004","20.536651","172.30.1.205","172.30.1.104","TCP","54","39066 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43005","20.537030","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43006","20.537318","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43007","20.537329","172.30.1.205","172.30.1.104","TCP","54","39066 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43008","20.539255","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43009","20.539611","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43010","20.539617","172.30.1.205","172.30.1.104","TCP","54","39066 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43011","20.541017","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43012","20.544545","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43013","20.544557","172.30.1.205","172.30.1.104","TCP","54","39066 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43014","20.545576","172.30.1.205","172.30.1.104","TCP","74","46432 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923772 TSecr=0 WS=128" "43015","20.545938","172.30.1.104","172.30.1.205","TCP","66","135 > 46432 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43016","20.545949","172.30.1.205","172.30.1.104","TCP","54","46432 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43017","20.546320","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43018","20.546646","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43019","20.546656","172.30.1.205","172.30.1.104","TCP","54","46432 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43020","20.548886","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43021","20.549369","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43022","20.549375","172.30.1.205","172.30.1.104","TCP","54","46432 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43023","20.551207","172.30.1.205","172.30.1.104","TCP","54","46432 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43024","20.551327","172.30.1.205","172.30.1.104","TCP","74","39070 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923777 TSecr=0 WS=128" "43025","20.551691","172.30.1.104","172.30.1.205","TCP","66","49671 > 39070 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43026","20.551703","172.30.1.205","172.30.1.104","TCP","54","39070 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43027","20.551724","172.30.1.104","172.30.1.205","TCP","54","135 > 46432 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43028","20.551766","172.30.1.104","172.30.1.205","TCP","54","135 > 46432 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43029","20.551773","172.30.1.205","172.30.1.104","TCP","54","46432 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43030","20.552092","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43031","20.552434","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43032","20.552443","172.30.1.205","172.30.1.104","TCP","54","39070 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43033","20.554382","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43034","20.554811","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43035","20.554818","172.30.1.205","172.30.1.104","TCP","54","39070 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43036","20.556190","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43037","20.559477","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43038","20.559486","172.30.1.205","172.30.1.104","TCP","54","39070 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43039","20.560462","172.30.1.205","172.30.1.104","TCP","74","46436 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923786 TSecr=0 WS=128" "43040","20.560773","172.30.1.104","172.30.1.205","TCP","66","135 > 46436 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43041","20.560794","172.30.1.205","172.30.1.104","TCP","54","46436 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43042","20.561161","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43043","20.561464","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43044","20.561473","172.30.1.205","172.30.1.104","TCP","54","46436 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43045","20.563697","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43046","20.564101","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43047","20.564107","172.30.1.205","172.30.1.104","TCP","54","46436 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43048","20.565949","172.30.1.205","172.30.1.104","TCP","54","46436 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43049","20.566062","172.30.1.205","172.30.1.104","TCP","74","39074 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923792 TSecr=0 WS=128" "43050","20.566207","172.30.1.104","172.30.1.205","TCP","54","135 > 46436 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43051","20.566219","172.30.1.104","172.30.1.205","TCP","54","135 > 46436 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43052","20.566224","172.30.1.205","172.30.1.104","TCP","54","46436 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43053","20.566334","172.30.1.104","172.30.1.205","TCP","66","49671 > 39074 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43054","20.566342","172.30.1.205","172.30.1.104","TCP","54","39074 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43055","20.566688","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43056","20.566957","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43057","20.566966","172.30.1.205","172.30.1.104","TCP","54","39074 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43058","20.568869","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43059","20.569234","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43060","20.569240","172.30.1.205","172.30.1.104","TCP","54","39074 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43061","20.570598","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43062","20.573918","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43063","20.573929","172.30.1.205","172.30.1.104","TCP","54","39074 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43064","20.574907","172.30.1.205","172.30.1.104","TCP","74","46440 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923801 TSecr=0 WS=128" "43065","20.575219","172.30.1.104","172.30.1.205","TCP","66","135 > 46440 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43066","20.575230","172.30.1.205","172.30.1.104","TCP","54","46440 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43067","20.575580","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43068","20.575872","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43069","20.575881","172.30.1.205","172.30.1.104","TCP","54","46440 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43070","20.578114","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43071","20.578524","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43072","20.578530","172.30.1.205","172.30.1.104","TCP","54","46440 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43073","20.580350","172.30.1.205","172.30.1.104","TCP","54","46440 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43074","20.580469","172.30.1.205","172.30.1.104","TCP","74","39078 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923806 TSecr=0 WS=128" "43075","20.580636","172.30.1.104","172.30.1.205","TCP","54","135 > 46440 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43076","20.580677","172.30.1.104","172.30.1.205","TCP","54","135 > 46440 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43077","20.580684","172.30.1.205","172.30.1.104","TCP","54","46440 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43078","20.580760","172.30.1.104","172.30.1.205","TCP","66","49671 > 39078 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43079","20.580768","172.30.1.205","172.30.1.104","TCP","54","39078 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43080","20.581127","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43081","20.581443","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43082","20.581450","172.30.1.205","172.30.1.104","TCP","54","39078 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43083","20.583318","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43084","20.583681","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43085","20.583688","172.30.1.205","172.30.1.104","TCP","54","39078 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43086","20.585103","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43087","20.588457","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43088","20.588468","172.30.1.205","172.30.1.104","TCP","54","39078 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43089","20.589513","172.30.1.205","172.30.1.104","TCP","74","46444 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923815 TSecr=0 WS=128" "43090","20.589862","172.30.1.104","172.30.1.205","TCP","66","135 > 46444 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43091","20.589874","172.30.1.205","172.30.1.104","TCP","54","46444 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43092","20.590237","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43093","20.590512","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43094","20.590521","172.30.1.205","172.30.1.104","TCP","54","46444 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43095","20.592742","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43096","20.593155","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43097","20.593162","172.30.1.205","172.30.1.104","TCP","54","46444 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43098","20.595050","172.30.1.205","172.30.1.104","TCP","54","46444 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43099","20.595172","172.30.1.205","172.30.1.104","TCP","74","39082 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923821 TSecr=0 WS=128" "43100","20.595337","172.30.1.104","172.30.1.205","TCP","54","135 > 46444 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43101","20.595381","172.30.1.104","172.30.1.205","TCP","54","135 > 46444 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43102","20.595388","172.30.1.205","172.30.1.104","TCP","54","46444 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43103","20.595454","172.30.1.104","172.30.1.205","TCP","66","49671 > 39082 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43104","20.595462","172.30.1.205","172.30.1.104","TCP","54","39082 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43105","20.595823","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43106","20.597282","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43107","20.597292","172.30.1.205","172.30.1.104","TCP","54","39082 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43108","20.599198","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43109","20.599591","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43110","20.599597","172.30.1.205","172.30.1.104","TCP","54","39082 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43111","20.601002","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43112","20.604365","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43113","20.604380","172.30.1.205","172.30.1.104","TCP","54","39082 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43114","20.605411","172.30.1.205","172.30.1.104","TCP","74","46448 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923831 TSecr=0 WS=128" "43115","20.605864","172.30.1.104","172.30.1.205","TCP","66","135 > 46448 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43116","20.605877","172.30.1.205","172.30.1.104","TCP","54","46448 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43117","20.606246","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43118","20.606535","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43119","20.606544","172.30.1.205","172.30.1.104","TCP","54","46448 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43120","20.608767","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43121","20.609183","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43122","20.609190","172.30.1.205","172.30.1.104","TCP","54","46448 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43123","20.611017","172.30.1.205","172.30.1.104","TCP","54","46448 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43124","20.611147","172.30.1.205","172.30.1.104","TCP","74","39086 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923837 TSecr=0 WS=128" "43125","20.611242","172.30.1.104","172.30.1.205","TCP","54","135 > 46448 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43126","20.611278","172.30.1.104","172.30.1.205","TCP","54","135 > 46448 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43127","20.611284","172.30.1.205","172.30.1.104","TCP","54","46448 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43128","20.611416","172.30.1.104","172.30.1.205","TCP","66","49671 > 39086 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43129","20.611424","172.30.1.205","172.30.1.104","TCP","54","39086 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43130","20.611773","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43131","20.612066","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43132","20.612075","172.30.1.205","172.30.1.104","TCP","54","39086 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43133","20.614013","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43134","20.614419","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43135","20.614426","172.30.1.205","172.30.1.104","TCP","54","39086 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43136","20.615779","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43137","20.619222","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43138","20.619233","172.30.1.205","172.30.1.104","TCP","54","39086 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43139","20.620217","172.30.1.205","172.30.1.104","TCP","74","46452 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923846 TSecr=0 WS=128" "43140","20.620556","172.30.1.104","172.30.1.205","TCP","66","135 > 46452 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43141","20.620566","172.30.1.205","172.30.1.104","TCP","54","46452 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43142","20.620971","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43143","20.621311","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43144","20.621320","172.30.1.205","172.30.1.104","TCP","54","46452 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43145","20.623557","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43146","20.623960","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43147","20.623967","172.30.1.205","172.30.1.104","TCP","54","46452 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43148","20.625807","172.30.1.205","172.30.1.104","TCP","54","46452 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43149","20.625920","172.30.1.205","172.30.1.104","TCP","74","39090 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923852 TSecr=0 WS=128" "43150","20.626097","172.30.1.104","172.30.1.205","TCP","54","135 > 46452 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43151","20.626123","172.30.1.104","172.30.1.205","TCP","54","135 > 46452 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43152","20.626128","172.30.1.205","172.30.1.104","TCP","54","46452 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43153","20.626263","172.30.1.104","172.30.1.205","TCP","66","49671 > 39090 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43154","20.626271","172.30.1.205","172.30.1.104","TCP","54","39090 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43155","20.626614","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43156","20.626881","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43157","20.626898","172.30.1.205","172.30.1.104","TCP","54","39090 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43158","20.629137","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43159","20.629501","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43160","20.629508","172.30.1.205","172.30.1.104","TCP","54","39090 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43161","20.630850","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43162","20.634141","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43163","20.634151","172.30.1.205","172.30.1.104","TCP","54","39090 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43164","20.635098","172.30.1.205","172.30.1.104","TCP","74","46456 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923861 TSecr=0 WS=128" "43165","20.635488","172.30.1.104","172.30.1.205","TCP","66","135 > 46456 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43166","20.635499","172.30.1.205","172.30.1.104","TCP","54","46456 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43167","20.635845","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43168","20.636113","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43169","20.636122","172.30.1.205","172.30.1.104","TCP","54","46456 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43170","20.638332","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43171","20.638716","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43172","20.638722","172.30.1.205","172.30.1.104","TCP","54","46456 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43173","20.639585","172.30.1.205","172.30.1.104","TCP","54","39050 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43174","20.639634","172.30.1.205","172.30.1.104","TCP","54","39054 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43175","20.639671","172.30.1.205","172.30.1.104","TCP","54","39058 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43176","20.639705","172.30.1.205","172.30.1.104","TCP","54","39062 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43177","20.639737","172.30.1.205","172.30.1.104","TCP","54","39066 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43178","20.639769","172.30.1.205","172.30.1.104","TCP","54","39070 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43179","20.639800","172.30.1.205","172.30.1.104","TCP","54","39074 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43180","20.639831","172.30.1.205","172.30.1.104","TCP","54","39078 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43181","20.639857","172.30.1.205","172.30.1.104","TCP","54","39082 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43182","20.639882","172.30.1.205","172.30.1.104","TCP","54","39086 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43183","20.639910","172.30.1.205","172.30.1.104","TCP","54","39090 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43184","20.639979","172.30.1.104","172.30.1.205","TCP","54","49671 > 39050 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43185","20.639988","172.30.1.104","172.30.1.205","TCP","54","49671 > 39050 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43186","20.639994","172.30.1.205","172.30.1.104","TCP","54","39050 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43187","20.640021","172.30.1.205","172.30.1.104","TCP","54","39046 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43188","20.640297","172.30.1.104","172.30.1.205","TCP","54","49671 > 39054 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43189","20.640306","172.30.1.104","172.30.1.205","TCP","54","49671 > 39058 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43190","20.640309","172.30.1.104","172.30.1.205","TCP","54","49671 > 39062 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43191","20.640312","172.30.1.104","172.30.1.205","TCP","54","49671 > 39066 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43192","20.640314","172.30.1.104","172.30.1.205","TCP","54","49671 > 39070 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43193","20.640317","172.30.1.104","172.30.1.205","TCP","54","49671 > 39074 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43194","20.640319","172.30.1.104","172.30.1.205","TCP","54","49671 > 39074 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43195","20.640324","172.30.1.205","172.30.1.104","TCP","54","39074 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43196","20.640331","172.30.1.104","172.30.1.205","TCP","54","49671 > 39070 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43197","20.640333","172.30.1.205","172.30.1.104","TCP","54","39070 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43198","20.640335","172.30.1.104","172.30.1.205","TCP","54","49671 > 39066 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43199","20.640337","172.30.1.205","172.30.1.104","TCP","54","39066 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43200","20.640484","172.30.1.104","172.30.1.205","TCP","54","49671 > 39054 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43201","20.640489","172.30.1.205","172.30.1.104","TCP","54","39054 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43202","20.640494","172.30.1.104","172.30.1.205","TCP","54","49671 > 39058 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43203","20.640496","172.30.1.205","172.30.1.104","TCP","54","39058 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43204","20.640498","172.30.1.104","172.30.1.205","TCP","54","49671 > 39062 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43205","20.640499","172.30.1.205","172.30.1.104","TCP","54","39062 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43206","20.640662","172.30.1.104","172.30.1.205","TCP","54","49671 > 39078 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43207","20.640732","172.30.1.104","172.30.1.205","TCP","54","49671 > 39082 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43208","20.640736","172.30.1.104","172.30.1.205","TCP","54","49671 > 39086 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43209","20.640738","172.30.1.104","172.30.1.205","TCP","54","49671 > 39090 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43210","20.640740","172.30.1.104","172.30.1.205","TCP","54","49671 > 39046 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43211","20.640743","172.30.1.104","172.30.1.205","TCP","54","49671 > 39046 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43212","20.640747","172.30.1.205","172.30.1.104","TCP","54","39046 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43213","20.640754","172.30.1.104","172.30.1.205","TCP","54","49671 > 39090 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43214","20.640755","172.30.1.205","172.30.1.104","TCP","54","39090 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43215","20.640763","172.30.1.104","172.30.1.205","TCP","54","49671 > 39078 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43216","20.640769","172.30.1.205","172.30.1.104","TCP","54","39078 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43217","20.640771","172.30.1.104","172.30.1.205","TCP","54","49671 > 39082 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43218","20.640772","172.30.1.205","172.30.1.104","TCP","54","39082 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43219","20.640785","172.30.1.104","172.30.1.205","TCP","54","49671 > 39086 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43220","20.640790","172.30.1.205","172.30.1.104","TCP","54","39086 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43221","20.641494","172.30.1.205","172.30.1.104","TCP","54","46456 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43222","20.641611","172.30.1.205","172.30.1.104","TCP","74","39094 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923868 TSecr=0 WS=128" "43223","20.641742","172.30.1.104","172.30.1.205","TCP","54","135 > 46456 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43224","20.641782","172.30.1.104","172.30.1.205","TCP","54","135 > 46456 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43225","20.641792","172.30.1.205","172.30.1.104","TCP","54","46456 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43226","20.641908","172.30.1.104","172.30.1.205","TCP","66","49671 > 39094 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43227","20.641920","172.30.1.205","172.30.1.104","TCP","54","39094 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43228","20.642320","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43229","20.642825","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43230","20.642839","172.30.1.205","172.30.1.104","TCP","54","39094 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43231","20.644828","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43232","20.645218","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43233","20.645228","172.30.1.205","172.30.1.104","TCP","54","39094 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43234","20.646677","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43235","20.650119","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43236","20.650140","172.30.1.205","172.30.1.104","TCP","54","39094 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43237","20.651254","172.30.1.205","172.30.1.104","TCP","74","46460 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923877 TSecr=0 WS=128" "43238","20.651586","172.30.1.104","172.30.1.205","TCP","66","135 > 46460 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43239","20.651598","172.30.1.205","172.30.1.104","TCP","54","46460 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43240","20.651960","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43241","20.652234","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43242","20.652244","172.30.1.205","172.30.1.104","TCP","54","46460 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43243","20.654460","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43244","20.654878","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43245","20.654884","172.30.1.205","172.30.1.104","TCP","54","46460 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43246","20.656698","172.30.1.205","172.30.1.104","TCP","54","46460 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43247","20.656834","172.30.1.205","172.30.1.104","TCP","74","39098 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923883 TSecr=0 WS=128" "43248","20.656985","172.30.1.104","172.30.1.205","TCP","54","135 > 46460 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43249","20.657020","172.30.1.104","172.30.1.205","TCP","54","135 > 46460 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43250","20.657025","172.30.1.205","172.30.1.104","TCP","54","46460 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43251","20.657115","172.30.1.104","172.30.1.205","TCP","66","49671 > 39098 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43252","20.657123","172.30.1.205","172.30.1.104","TCP","54","39098 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43253","20.657474","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43254","20.657772","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43255","20.657781","172.30.1.205","172.30.1.104","TCP","54","39098 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43256","20.659667","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43257","20.660010","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43258","20.660017","172.30.1.205","172.30.1.104","TCP","54","39098 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43259","20.661414","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43260","20.664748","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43261","20.664758","172.30.1.205","172.30.1.104","TCP","54","39098 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43262","20.665722","172.30.1.205","172.30.1.104","TCP","74","46464 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923892 TSecr=0 WS=128" "43263","20.666044","172.30.1.104","172.30.1.205","TCP","66","135 > 46464 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43264","20.666056","172.30.1.205","172.30.1.104","TCP","54","46464 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43265","20.666414","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43266","20.666732","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43267","20.666741","172.30.1.205","172.30.1.104","TCP","54","46464 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43268","20.668970","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43269","20.669430","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43270","20.669437","172.30.1.205","172.30.1.104","TCP","54","46464 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43271","20.671257","172.30.1.205","172.30.1.104","TCP","54","46464 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43272","20.671371","172.30.1.205","172.30.1.104","TCP","74","39102 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923897 TSecr=0 WS=128" "43273","20.671547","172.30.1.104","172.30.1.205","TCP","54","135 > 46464 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43274","20.671559","172.30.1.104","172.30.1.205","TCP","54","135 > 46464 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43275","20.671564","172.30.1.205","172.30.1.104","TCP","54","46464 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43276","20.671662","172.30.1.104","172.30.1.205","TCP","66","49671 > 39102 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43277","20.671670","172.30.1.205","172.30.1.104","TCP","54","39102 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43278","20.672019","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43279","20.672291","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43280","20.672299","172.30.1.205","172.30.1.104","TCP","54","39102 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43281","20.674208","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43282","20.674598","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43283","20.674605","172.30.1.205","172.30.1.104","TCP","54","39102 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43284","20.675957","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43285","20.679390","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43286","20.679401","172.30.1.205","172.30.1.104","TCP","54","39102 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43287","20.680384","172.30.1.205","172.30.1.104","TCP","74","46468 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923906 TSecr=0 WS=128" "43288","20.680770","172.30.1.104","172.30.1.205","TCP","66","135 > 46468 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43289","20.680791","172.30.1.205","172.30.1.104","TCP","54","46468 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43290","20.681175","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43291","20.681505","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43292","20.681514","172.30.1.205","172.30.1.104","TCP","54","46468 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43293","20.683750","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43294","20.684196","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43295","20.684203","172.30.1.205","172.30.1.104","TCP","54","46468 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43296","20.686043","172.30.1.205","172.30.1.104","TCP","54","46468 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43297","20.686154","172.30.1.205","172.30.1.104","TCP","74","39106 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923912 TSecr=0 WS=128" "43298","20.686319","172.30.1.104","172.30.1.205","TCP","54","135 > 46468 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43299","20.686353","172.30.1.104","172.30.1.205","TCP","54","135 > 46468 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43300","20.686359","172.30.1.205","172.30.1.104","TCP","54","46468 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43301","20.686482","172.30.1.104","172.30.1.205","TCP","66","49671 > 39106 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43302","20.686491","172.30.1.205","172.30.1.104","TCP","54","39106 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43303","20.686853","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43304","20.687182","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43305","20.687192","172.30.1.205","172.30.1.104","TCP","54","39106 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43306","20.689257","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43307","20.689660","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43308","20.689667","172.30.1.205","172.30.1.104","TCP","54","39106 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43309","20.691033","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43310","20.694398","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43311","20.694408","172.30.1.205","172.30.1.104","TCP","54","39106 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43312","20.695374","172.30.1.205","172.30.1.104","TCP","74","46472 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923921 TSecr=0 WS=128" "43313","20.695662","172.30.1.104","172.30.1.205","TCP","66","135 > 46472 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43314","20.695673","172.30.1.205","172.30.1.104","TCP","54","46472 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43315","20.696042","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43316","20.696357","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43317","20.696366","172.30.1.205","172.30.1.104","TCP","54","46472 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43318","20.698571","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43319","20.698984","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43320","20.699002","172.30.1.205","172.30.1.104","TCP","54","46472 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43321","20.700841","172.30.1.205","172.30.1.104","TCP","54","46472 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43322","20.700952","172.30.1.205","172.30.1.104","TCP","74","39110 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923927 TSecr=0 WS=128" "43323","20.701115","172.30.1.104","172.30.1.205","TCP","54","135 > 46472 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43324","20.701153","172.30.1.104","172.30.1.205","TCP","54","135 > 46472 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43325","20.701159","172.30.1.205","172.30.1.104","TCP","54","46472 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43326","20.701265","172.30.1.104","172.30.1.205","TCP","66","49671 > 39110 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43327","20.701273","172.30.1.205","172.30.1.104","TCP","54","39110 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43328","20.701621","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43329","20.701930","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43330","20.701939","172.30.1.205","172.30.1.104","TCP","54","39110 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43331","20.703815","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43332","20.704203","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43333","20.704209","172.30.1.205","172.30.1.104","TCP","54","39110 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43334","20.705585","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43335","20.708937","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43336","20.708947","172.30.1.205","172.30.1.104","TCP","54","39110 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43337","20.709904","172.30.1.205","172.30.1.104","TCP","74","46476 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923936 TSecr=0 WS=128" "43338","20.710282","172.30.1.104","172.30.1.205","TCP","66","135 > 46476 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43339","20.710292","172.30.1.205","172.30.1.104","TCP","54","46476 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43340","20.710636","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43341","20.710972","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43342","20.710981","172.30.1.205","172.30.1.104","TCP","54","46476 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43343","20.713186","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43344","20.713555","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43345","20.713562","172.30.1.205","172.30.1.104","TCP","54","46476 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43346","20.715386","172.30.1.205","172.30.1.104","TCP","54","46476 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43347","20.715499","172.30.1.205","172.30.1.104","TCP","74","39114 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923941 TSecr=0 WS=128" "43348","20.715697","172.30.1.104","172.30.1.205","TCP","54","135 > 46476 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43349","20.715722","172.30.1.104","172.30.1.205","TCP","54","135 > 46476 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43350","20.715728","172.30.1.205","172.30.1.104","TCP","54","46476 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43351","20.715844","172.30.1.104","172.30.1.205","TCP","66","49671 > 39114 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43352","20.715852","172.30.1.205","172.30.1.104","TCP","54","39114 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43353","20.716200","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43354","20.716506","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43355","20.716514","172.30.1.205","172.30.1.104","TCP","54","39114 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43356","20.718414","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43357","20.718793","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43358","20.718799","172.30.1.205","172.30.1.104","TCP","54","39114 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43359","20.720138","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43360","20.723693","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43361","20.723702","172.30.1.205","172.30.1.104","TCP","54","39114 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43362","20.724640","172.30.1.205","172.30.1.104","TCP","74","46480 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923951 TSecr=0 WS=128" "43363","20.724941","172.30.1.104","172.30.1.205","TCP","66","135 > 46480 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43364","20.724951","172.30.1.205","172.30.1.104","TCP","54","46480 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43365","20.725340","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43366","20.725642","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43367","20.725651","172.30.1.205","172.30.1.104","TCP","54","46480 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43368","20.727918","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43369","20.728367","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43370","20.728374","172.30.1.205","172.30.1.104","TCP","54","46480 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43371","20.730201","172.30.1.205","172.30.1.104","TCP","54","46480 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43372","20.730313","172.30.1.205","172.30.1.104","TCP","74","39118 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923956 TSecr=0 WS=128" "43373","20.730490","172.30.1.104","172.30.1.205","TCP","54","135 > 46480 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43374","20.730501","172.30.1.104","172.30.1.205","TCP","54","135 > 46480 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43375","20.730506","172.30.1.205","172.30.1.104","TCP","54","46480 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43376","20.730632","172.30.1.104","172.30.1.205","TCP","66","49671 > 39118 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43377","20.730640","172.30.1.205","172.30.1.104","TCP","54","39118 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43378","20.730987","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43379","20.731285","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43380","20.731294","172.30.1.205","172.30.1.104","TCP","54","39118 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43381","20.733208","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43382","20.733597","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43383","20.733604","172.30.1.205","172.30.1.104","TCP","54","39118 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43384","20.734973","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43385","20.738315","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43386","20.738326","172.30.1.205","172.30.1.104","TCP","54","39118 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43387","20.739280","172.30.1.205","172.30.1.104","TCP","74","46484 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923965 TSecr=0 WS=128" "43388","20.739570","172.30.1.104","172.30.1.205","TCP","66","135 > 46484 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43389","20.739581","172.30.1.205","172.30.1.104","TCP","54","46484 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43390","20.739927","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43391","20.740215","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43392","20.740225","172.30.1.205","172.30.1.104","TCP","54","46484 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43393","20.742439","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43394","20.742826","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43395","20.742833","172.30.1.205","172.30.1.104","TCP","54","46484 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43396","20.744629","172.30.1.205","172.30.1.104","TCP","54","46484 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43397","20.744737","172.30.1.205","172.30.1.104","TCP","74","39122 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923971 TSecr=0 WS=128" "43398","20.744907","172.30.1.104","172.30.1.205","TCP","54","135 > 46484 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43399","20.744930","172.30.1.104","172.30.1.205","TCP","54","135 > 46484 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43400","20.744937","172.30.1.205","172.30.1.104","TCP","54","46484 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43401","20.745082","172.30.1.104","172.30.1.205","TCP","66","49671 > 39122 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43402","20.745090","172.30.1.205","172.30.1.104","TCP","54","39122 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43403","20.745442","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43404","20.746556","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43405","20.746563","172.30.1.205","172.30.1.104","TCP","54","39122 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43406","20.748426","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43407","20.748773","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43408","20.748788","172.30.1.205","172.30.1.104","TCP","54","39122 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43409","20.750188","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43410","20.753674","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43411","20.753684","172.30.1.205","172.30.1.104","TCP","54","39122 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43412","20.754639","172.30.1.205","172.30.1.104","TCP","74","46488 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923981 TSecr=0 WS=128" "43413","20.754985","172.30.1.104","172.30.1.205","TCP","66","135 > 46488 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43414","20.754997","172.30.1.205","172.30.1.104","TCP","54","46488 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43415","20.755356","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43416","20.755676","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43417","20.755690","172.30.1.205","172.30.1.104","TCP","54","46488 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43418","20.758004","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43419","20.758454","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43420","20.758462","172.30.1.205","172.30.1.104","TCP","54","46488 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43421","20.760299","172.30.1.205","172.30.1.104","TCP","54","46488 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43422","20.760417","172.30.1.205","172.30.1.104","TCP","74","39126 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923986 TSecr=0 WS=128" "43423","20.760596","172.30.1.104","172.30.1.205","TCP","54","135 > 46488 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43424","20.760609","172.30.1.104","172.30.1.205","TCP","54","135 > 46488 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43425","20.760615","172.30.1.205","172.30.1.104","TCP","54","46488 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43426","20.760699","172.30.1.104","172.30.1.205","TCP","66","49671 > 39126 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43427","20.760708","172.30.1.205","172.30.1.104","TCP","54","39126 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43428","20.761083","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43429","20.762186","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43430","20.762203","172.30.1.205","172.30.1.104","TCP","54","39126 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43431","20.764331","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43432","20.764703","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43433","20.764710","172.30.1.205","172.30.1.104","TCP","54","39126 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43434","20.766076","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43435","20.769319","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43436","20.769330","172.30.1.205","172.30.1.104","TCP","54","39126 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43437","20.770290","172.30.1.205","172.30.1.104","TCP","74","46492 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499923996 TSecr=0 WS=128" "43438","20.770619","172.30.1.104","172.30.1.205","TCP","66","135 > 46492 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43439","20.770631","172.30.1.205","172.30.1.104","TCP","54","46492 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43440","20.770995","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43441","20.771328","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43442","20.771337","172.30.1.205","172.30.1.104","TCP","54","46492 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43443","20.773530","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43444","20.773979","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43445","20.773985","172.30.1.205","172.30.1.104","TCP","54","46492 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43446","20.775787","172.30.1.205","172.30.1.104","TCP","54","46492 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43447","20.775897","172.30.1.205","172.30.1.104","TCP","74","39130 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924002 TSecr=0 WS=128" "43448","20.776067","172.30.1.104","172.30.1.205","TCP","54","135 > 46492 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43449","20.776077","172.30.1.104","172.30.1.205","TCP","54","135 > 46492 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43450","20.776082","172.30.1.205","172.30.1.104","TCP","54","46492 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43451","20.776195","172.30.1.104","172.30.1.205","TCP","66","49671 > 39130 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43452","20.776204","172.30.1.205","172.30.1.104","TCP","54","39130 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43453","20.776545","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43454","20.776844","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43455","20.776853","172.30.1.205","172.30.1.104","TCP","54","39130 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43456","20.778723","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43457","20.779087","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43458","20.779094","172.30.1.205","172.30.1.104","TCP","54","39130 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43459","20.780428","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43460","20.783616","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43461","20.783626","172.30.1.205","172.30.1.104","TCP","54","39130 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43462","20.784584","172.30.1.205","172.30.1.104","TCP","74","46496 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924011 TSecr=0 WS=128" "43463","20.784879","172.30.1.104","172.30.1.205","TCP","66","135 > 46496 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43464","20.784890","172.30.1.205","172.30.1.104","TCP","54","46496 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43465","20.785261","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43466","20.785575","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43467","20.785584","172.30.1.205","172.30.1.104","TCP","54","46496 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43468","20.787756","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43469","20.788181","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43470","20.788188","172.30.1.205","172.30.1.104","TCP","54","46496 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43471","20.789999","172.30.1.205","172.30.1.104","TCP","54","46496 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43472","20.790113","172.30.1.205","172.30.1.104","TCP","74","39134 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924016 TSecr=0 WS=128" "43473","20.790287","172.30.1.104","172.30.1.205","TCP","54","135 > 46496 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43474","20.790356","172.30.1.104","172.30.1.205","TCP","54","135 > 46496 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43475","20.790362","172.30.1.205","172.30.1.104","TCP","54","46496 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43476","20.790436","172.30.1.104","172.30.1.205","TCP","66","49671 > 39134 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43477","20.790444","172.30.1.205","172.30.1.104","TCP","54","39134 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43478","20.790794","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43479","20.791383","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43480","20.791391","172.30.1.205","172.30.1.104","TCP","54","39134 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43481","20.793318","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43482","20.793741","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43483","20.793747","172.30.1.205","172.30.1.104","TCP","54","39134 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43484","20.795092","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43485","20.798508","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43486","20.798520","172.30.1.205","172.30.1.104","TCP","54","39134 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43487","20.799492","172.30.1.205","172.30.1.104","TCP","74","46500 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924025 TSecr=0 WS=128" "43488","20.799878","172.30.1.104","172.30.1.205","TCP","66","135 > 46500 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43489","20.799888","172.30.1.205","172.30.1.104","TCP","54","46500 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43490","20.800238","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43491","20.800597","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43492","20.800606","172.30.1.205","172.30.1.104","TCP","54","46500 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43493","20.802802","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43494","20.803231","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43495","20.803238","172.30.1.205","172.30.1.104","TCP","54","46500 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43496","20.805065","172.30.1.205","172.30.1.104","TCP","54","46500 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43497","20.805173","172.30.1.205","172.30.1.104","TCP","74","39138 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924031 TSecr=0 WS=128" "43498","20.805425","172.30.1.104","172.30.1.205","TCP","54","135 > 46500 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43499","20.805433","172.30.1.104","172.30.1.205","TCP","54","135 > 46500 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43500","20.805438","172.30.1.205","172.30.1.104","TCP","54","46500 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43501","20.805469","172.30.1.104","172.30.1.205","TCP","66","49671 > 39138 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43502","20.805477","172.30.1.205","172.30.1.104","TCP","54","39138 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43503","20.805815","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43504","20.806134","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43505","20.806143","172.30.1.205","172.30.1.104","TCP","54","39138 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43506","20.808000","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43507","20.808423","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43508","20.808429","172.30.1.205","172.30.1.104","TCP","54","39138 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43509","20.809787","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43510","20.813191","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43511","20.813200","172.30.1.205","172.30.1.104","TCP","54","39138 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43512","20.814134","172.30.1.205","172.30.1.104","TCP","74","46504 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924040 TSecr=0 WS=128" "43513","20.814478","172.30.1.104","172.30.1.205","TCP","66","135 > 46504 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43514","20.814498","172.30.1.205","172.30.1.104","TCP","54","46504 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43515","20.815052","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43516","20.815372","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43517","20.815381","172.30.1.205","172.30.1.104","TCP","54","46504 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43518","20.817571","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43519","20.818000","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43520","20.818007","172.30.1.205","172.30.1.104","TCP","54","46504 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43521","20.818854","172.30.1.205","172.30.1.104","TCP","54","39098 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43522","20.818902","172.30.1.205","172.30.1.104","TCP","54","39102 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43523","20.818939","172.30.1.205","172.30.1.104","TCP","54","39106 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43524","20.818972","172.30.1.205","172.30.1.104","TCP","54","39110 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43525","20.818999","172.30.1.205","172.30.1.104","TCP","54","39114 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43526","20.819031","172.30.1.205","172.30.1.104","TCP","54","39118 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43527","20.819057","172.30.1.205","172.30.1.104","TCP","54","39122 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43528","20.819091","172.30.1.205","172.30.1.104","TCP","54","39126 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43529","20.819117","172.30.1.205","172.30.1.104","TCP","54","39130 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43530","20.819148","172.30.1.205","172.30.1.104","TCP","54","39134 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43531","20.819175","172.30.1.205","172.30.1.104","TCP","54","39138 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43532","20.819242","172.30.1.205","172.30.1.104","TCP","54","39094 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43533","20.819509","172.30.1.104","172.30.1.205","TCP","54","49671 > 39098 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43534","20.819525","172.30.1.104","172.30.1.205","TCP","54","49671 > 39102 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43535","20.819557","172.30.1.104","172.30.1.205","TCP","54","49671 > 39098 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43536","20.819563","172.30.1.205","172.30.1.104","TCP","54","39098 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43537","20.819576","172.30.1.104","172.30.1.205","TCP","54","49671 > 39106 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43538","20.819632","172.30.1.104","172.30.1.205","TCP","54","49671 > 39110 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43539","20.819652","172.30.1.104","172.30.1.205","TCP","54","49671 > 39110 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43540","20.819656","172.30.1.205","172.30.1.104","TCP","54","39110 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43541","20.819672","172.30.1.104","172.30.1.205","TCP","54","49671 > 39114 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43542","20.819695","172.30.1.104","172.30.1.205","TCP","54","49671 > 39118 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43543","20.819742","172.30.1.104","172.30.1.205","TCP","54","49671 > 39118 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43544","20.819744","172.30.1.205","172.30.1.104","TCP","54","39118 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43545","20.819762","172.30.1.104","172.30.1.205","TCP","54","49671 > 39122 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43546","20.819785","172.30.1.104","172.30.1.205","TCP","54","49671 > 39114 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43547","20.819789","172.30.1.205","172.30.1.104","TCP","54","39114 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43548","20.819808","172.30.1.104","172.30.1.205","TCP","54","49671 > 39126 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43549","20.819837","172.30.1.104","172.30.1.205","TCP","54","49671 > 39126 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43550","20.819841","172.30.1.205","172.30.1.104","TCP","54","39126 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43551","20.819858","172.30.1.104","172.30.1.205","TCP","54","49671 > 39130 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43552","20.819881","172.30.1.104","172.30.1.205","TCP","54","49671 > 39122 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43553","20.819885","172.30.1.205","172.30.1.104","TCP","54","39122 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43554","20.819973","172.30.1.104","172.30.1.205","TCP","54","49671 > 39130 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43555","20.819977","172.30.1.205","172.30.1.104","TCP","54","39130 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43556","20.819994","172.30.1.104","172.30.1.205","TCP","54","49671 > 39134 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43557","20.820015","172.30.1.104","172.30.1.205","TCP","54","49671 > 39102 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43558","20.820018","172.30.1.205","172.30.1.104","TCP","54","39102 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43559","20.820035","172.30.1.104","172.30.1.205","TCP","54","49671 > 39138 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43560","20.820064","172.30.1.104","172.30.1.205","TCP","54","49671 > 39138 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43561","20.820068","172.30.1.205","172.30.1.104","TCP","54","39138 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43562","20.820397","172.30.1.104","172.30.1.205","TCP","54","49671 > 39094 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43563","20.820419","172.30.1.104","172.30.1.205","TCP","54","49671 > 39094 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43564","20.820424","172.30.1.205","172.30.1.104","TCP","54","39094 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43565","20.820441","172.30.1.104","172.30.1.205","TCP","54","49671 > 39106 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43566","20.820443","172.30.1.205","172.30.1.104","TCP","54","39106 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43567","20.820497","172.30.1.104","172.30.1.205","TCP","54","49671 > 39134 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43568","20.820501","172.30.1.205","172.30.1.104","TCP","54","39134 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43569","20.820855","172.30.1.205","172.30.1.104","TCP","54","46504 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43570","20.820963","172.30.1.205","172.30.1.104","TCP","74","39142 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924047 TSecr=0 WS=128" "43571","20.821143","172.30.1.104","172.30.1.205","TCP","54","135 > 46504 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43572","20.821171","172.30.1.104","172.30.1.205","TCP","54","135 > 46504 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43573","20.821176","172.30.1.205","172.30.1.104","TCP","54","46504 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43574","20.821247","172.30.1.104","172.30.1.205","TCP","66","49671 > 39142 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43575","20.821255","172.30.1.205","172.30.1.104","TCP","54","39142 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43576","20.821611","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43577","20.821967","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43578","20.821974","172.30.1.205","172.30.1.104","TCP","54","39142 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43579","20.823837","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43580","20.824240","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43581","20.824247","172.30.1.205","172.30.1.104","TCP","54","39142 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43582","20.825630","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43583","20.829185","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43584","20.829195","172.30.1.205","172.30.1.104","TCP","54","39142 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43585","20.830168","172.30.1.205","172.30.1.104","TCP","74","46508 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924056 TSecr=0 WS=128" "43586","20.830503","172.30.1.104","172.30.1.205","TCP","66","135 > 46508 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43587","20.830514","172.30.1.205","172.30.1.104","TCP","54","46508 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43588","20.830871","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43589","20.831183","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43590","20.831192","172.30.1.205","172.30.1.104","TCP","54","46508 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43591","20.833378","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43592","20.833820","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43593","20.833826","172.30.1.205","172.30.1.104","TCP","54","46508 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43594","20.835648","172.30.1.205","172.30.1.104","TCP","54","46508 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43595","20.835761","172.30.1.205","172.30.1.104","TCP","74","39146 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924062 TSecr=0 WS=128" "43596","20.835935","172.30.1.104","172.30.1.205","TCP","54","135 > 46508 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43597","20.835967","172.30.1.104","172.30.1.205","TCP","54","135 > 46508 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43598","20.835973","172.30.1.205","172.30.1.104","TCP","54","46508 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43599","20.836072","172.30.1.104","172.30.1.205","TCP","66","49671 > 39146 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43600","20.836080","172.30.1.205","172.30.1.104","TCP","54","39146 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43601","20.836431","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43602","20.836754","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43603","20.836763","172.30.1.205","172.30.1.104","TCP","54","39146 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43604","20.838701","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43605","20.839214","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43606","20.839227","172.30.1.205","172.30.1.104","TCP","54","39146 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43607","20.840681","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43608","20.844135","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43609","20.844146","172.30.1.205","172.30.1.104","TCP","54","39146 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43610","20.845113","172.30.1.205","172.30.1.104","TCP","74","46512 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924071 TSecr=0 WS=128" "43611","20.845454","172.30.1.104","172.30.1.205","TCP","66","135 > 46512 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43612","20.845466","172.30.1.205","172.30.1.104","TCP","54","46512 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43613","20.845829","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43614","20.846146","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43615","20.846155","172.30.1.205","172.30.1.104","TCP","54","46512 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43616","20.848361","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43617","20.848789","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43618","20.848796","172.30.1.205","172.30.1.104","TCP","54","46512 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43619","20.850597","172.30.1.205","172.30.1.104","TCP","54","46512 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43620","20.850707","172.30.1.205","172.30.1.104","TCP","74","39150 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924077 TSecr=0 WS=128" "43621","20.850886","172.30.1.104","172.30.1.205","TCP","54","135 > 46512 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43622","20.850906","172.30.1.104","172.30.1.205","TCP","54","135 > 46512 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43623","20.850912","172.30.1.205","172.30.1.104","TCP","54","46512 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43624","20.851013","172.30.1.104","172.30.1.205","TCP","66","49671 > 39150 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43625","20.851021","172.30.1.205","172.30.1.104","TCP","54","39150 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43626","20.851364","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43627","20.851646","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43628","20.851655","172.30.1.205","172.30.1.104","TCP","54","39150 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43629","20.853549","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43630","20.854340","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43631","20.854346","172.30.1.205","172.30.1.104","TCP","54","39150 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43632","20.855688","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43633","20.859149","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43634","20.859159","172.30.1.205","172.30.1.104","TCP","54","39150 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43635","20.860101","172.30.1.205","172.30.1.104","TCP","74","46516 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924086 TSecr=0 WS=128" "43636","20.860403","172.30.1.104","172.30.1.205","TCP","66","135 > 46516 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43637","20.860413","172.30.1.205","172.30.1.104","TCP","54","46516 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43638","20.860760","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43639","20.861864","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43640","20.861882","172.30.1.205","172.30.1.104","TCP","54","46516 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43641","20.864203","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43642","20.864634","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43643","20.864641","172.30.1.205","172.30.1.104","TCP","54","46516 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43644","20.866464","172.30.1.205","172.30.1.104","TCP","54","46516 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43645","20.866585","172.30.1.205","172.30.1.104","TCP","74","39154 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924093 TSecr=0 WS=128" "43646","20.866732","172.30.1.104","172.30.1.205","TCP","54","135 > 46516 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43647","20.866752","172.30.1.104","172.30.1.205","TCP","54","135 > 46516 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43648","20.866757","172.30.1.205","172.30.1.104","TCP","54","46516 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43649","20.866903","172.30.1.104","172.30.1.205","TCP","66","49671 > 39154 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43650","20.866911","172.30.1.205","172.30.1.104","TCP","54","39154 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43651","20.867254","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43652","20.867543","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43653","20.867551","172.30.1.205","172.30.1.104","TCP","54","39154 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43654","20.869442","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43655","20.869799","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43656","20.869805","172.30.1.205","172.30.1.104","TCP","54","39154 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43657","20.871145","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43658","20.874629","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43659","20.874639","172.30.1.205","172.30.1.104","TCP","54","39154 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43660","20.875577","172.30.1.205","172.30.1.104","TCP","74","46520 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924102 TSecr=0 WS=128" "43661","20.875919","172.30.1.104","172.30.1.205","TCP","66","135 > 46520 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43662","20.875929","172.30.1.205","172.30.1.104","TCP","54","46520 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43663","20.876281","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43664","20.876582","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43665","20.876591","172.30.1.205","172.30.1.104","TCP","54","46520 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43666","20.878775","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43667","20.879222","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43668","20.879229","172.30.1.205","172.30.1.104","TCP","54","46520 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43669","20.881052","172.30.1.205","172.30.1.104","TCP","54","46520 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43670","20.881161","172.30.1.205","172.30.1.104","TCP","74","39158 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924107 TSecr=0 WS=128" "43671","20.881320","172.30.1.104","172.30.1.205","TCP","54","135 > 46520 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43672","20.881374","172.30.1.104","172.30.1.205","TCP","54","135 > 46520 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43673","20.881380","172.30.1.205","172.30.1.104","TCP","54","46520 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43674","20.881452","172.30.1.104","172.30.1.205","TCP","66","49671 > 39158 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43675","20.881460","172.30.1.205","172.30.1.104","TCP","54","39158 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43676","20.881800","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43677","20.882109","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43678","20.882118","172.30.1.205","172.30.1.104","TCP","54","39158 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43679","20.883969","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43680","20.884297","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43681","20.884302","172.30.1.205","172.30.1.104","TCP","54","39158 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43682","20.885684","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43683","20.888892","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43684","20.888902","172.30.1.205","172.30.1.104","TCP","54","39158 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43685","20.889840","172.30.1.205","172.30.1.104","TCP","74","46524 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924116 TSecr=0 WS=128" "43686","20.890148","172.30.1.104","172.30.1.205","TCP","66","135 > 46524 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43687","20.890158","172.30.1.205","172.30.1.104","TCP","54","46524 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43688","20.890502","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43689","20.890794","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43690","20.890803","172.30.1.205","172.30.1.104","TCP","54","46524 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43691","20.892996","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43692","20.893399","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43693","20.893405","172.30.1.205","172.30.1.104","TCP","54","46524 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43694","20.895206","172.30.1.205","172.30.1.104","TCP","54","46524 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43695","20.895314","172.30.1.205","172.30.1.104","TCP","74","39162 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924121 TSecr=0 WS=128" "43696","20.895482","172.30.1.104","172.30.1.205","TCP","54","135 > 46524 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43697","20.895491","172.30.1.104","172.30.1.205","TCP","54","135 > 46524 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43698","20.895497","172.30.1.205","172.30.1.104","TCP","54","46524 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43699","20.895582","172.30.1.104","172.30.1.205","TCP","66","49671 > 39162 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43700","20.895591","172.30.1.205","172.30.1.104","TCP","54","39162 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43701","20.895940","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43702","20.896214","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43703","20.896222","172.30.1.205","172.30.1.104","TCP","54","39162 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43704","20.898140","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43705","20.898497","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43706","20.898503","172.30.1.205","172.30.1.104","TCP","54","39162 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43707","20.899857","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43708","20.903275","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43709","20.903284","172.30.1.205","172.30.1.104","TCP","54","39162 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43710","20.904228","172.30.1.205","172.30.1.104","TCP","74","46528 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924130 TSecr=0 WS=128" "43711","20.904541","172.30.1.104","172.30.1.205","TCP","66","135 > 46528 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43712","20.904553","172.30.1.205","172.30.1.104","TCP","54","46528 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43713","20.904933","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43714","20.905251","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43715","20.905260","172.30.1.205","172.30.1.104","TCP","54","46528 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43716","20.907440","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43717","20.907876","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43718","20.907888","172.30.1.205","172.30.1.104","TCP","54","46528 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43719","20.909924","172.30.1.205","172.30.1.104","TCP","54","46528 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43720","20.910033","172.30.1.205","172.30.1.104","TCP","74","39166 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924136 TSecr=0 WS=128" "43721","20.910203","172.30.1.104","172.30.1.205","TCP","54","135 > 46528 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43722","20.910211","172.30.1.104","172.30.1.205","TCP","54","135 > 46528 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43723","20.910216","172.30.1.205","172.30.1.104","TCP","54","46528 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43724","20.910294","172.30.1.104","172.30.1.205","TCP","66","49671 > 39166 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43725","20.910302","172.30.1.205","172.30.1.104","TCP","54","39166 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43726","20.910646","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43727","20.910910","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43728","20.910919","172.30.1.205","172.30.1.104","TCP","54","39166 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43729","20.912819","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43730","20.913195","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43731","20.913201","172.30.1.205","172.30.1.104","TCP","54","39166 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43732","20.914550","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43733","20.917935","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43734","20.917945","172.30.1.205","172.30.1.104","TCP","54","39166 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43735","20.918884","172.30.1.205","172.30.1.104","TCP","74","46532 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924145 TSecr=0 WS=128" "43736","20.919174","172.30.1.104","172.30.1.205","TCP","66","135 > 46532 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43737","20.919185","172.30.1.205","172.30.1.104","TCP","54","46532 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43738","20.919531","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43739","20.919825","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43740","20.919842","172.30.1.205","172.30.1.104","TCP","54","46532 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43741","20.922313","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43742","20.922696","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43743","20.922703","172.30.1.205","172.30.1.104","TCP","54","46532 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43744","20.924546","172.30.1.205","172.30.1.104","TCP","54","46532 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43745","20.924655","172.30.1.205","172.30.1.104","TCP","74","39170 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924151 TSecr=0 WS=128" "43746","20.924850","172.30.1.104","172.30.1.205","TCP","54","135 > 46532 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43747","20.924859","172.30.1.104","172.30.1.205","TCP","54","135 > 46532 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43748","20.924864","172.30.1.205","172.30.1.104","TCP","54","46532 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43749","20.924941","172.30.1.104","172.30.1.205","TCP","66","49671 > 39170 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43750","20.924949","172.30.1.205","172.30.1.104","TCP","54","39170 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43751","20.925300","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43752","20.925586","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43753","20.925595","172.30.1.205","172.30.1.104","TCP","54","39170 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43754","20.927509","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43755","20.927874","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43756","20.927880","172.30.1.205","172.30.1.104","TCP","54","39170 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43757","20.929299","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43758","20.932587","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43759","20.932596","172.30.1.205","172.30.1.104","TCP","54","39170 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43760","20.933554","172.30.1.205","172.30.1.104","TCP","74","46536 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924159 TSecr=0 WS=128" "43761","20.933877","172.30.1.104","172.30.1.205","TCP","66","135 > 46536 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43762","20.933888","172.30.1.205","172.30.1.104","TCP","54","46536 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43763","20.934241","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43764","20.934567","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43765","20.934575","172.30.1.205","172.30.1.104","TCP","54","46536 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43766","20.936751","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43767","20.937148","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43768","20.937155","172.30.1.205","172.30.1.104","TCP","54","46536 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43769","20.938961","172.30.1.205","172.30.1.104","TCP","54","46536 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43770","20.939071","172.30.1.205","172.30.1.104","TCP","74","39174 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924165 TSecr=0 WS=128" "43771","20.939281","172.30.1.104","172.30.1.205","TCP","54","135 > 46536 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43772","20.939289","172.30.1.104","172.30.1.205","TCP","54","135 > 46536 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43773","20.939294","172.30.1.205","172.30.1.104","TCP","54","46536 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43774","20.939370","172.30.1.104","172.30.1.205","TCP","66","49671 > 39174 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43775","20.939378","172.30.1.205","172.30.1.104","TCP","54","39174 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43776","20.939722","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43777","20.940044","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43778","20.940054","172.30.1.205","172.30.1.104","TCP","54","39174 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43779","20.941955","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43780","20.942343","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43781","20.942349","172.30.1.205","172.30.1.104","TCP","54","39174 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43782","20.943682","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43783","20.947039","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43784","20.947049","172.30.1.205","172.30.1.104","TCP","54","39174 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43785","20.947993","172.30.1.205","172.30.1.104","TCP","74","46540 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924174 TSecr=0 WS=128" "43786","20.948317","172.30.1.104","172.30.1.205","TCP","66","135 > 46540 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43787","20.948328","172.30.1.205","172.30.1.104","TCP","54","46540 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43788","20.948688","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43789","20.949006","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43790","20.949015","172.30.1.205","172.30.1.104","TCP","54","46540 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43791","20.951221","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43792","20.951653","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43793","20.951659","172.30.1.205","172.30.1.104","TCP","54","46540 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43794","20.953486","172.30.1.205","172.30.1.104","TCP","54","46540 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43795","20.953595","172.30.1.205","172.30.1.104","TCP","74","39178 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924180 TSecr=0 WS=128" "43796","20.953768","172.30.1.104","172.30.1.205","TCP","54","135 > 46540 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43797","20.953799","172.30.1.104","172.30.1.205","TCP","54","135 > 46540 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43798","20.953805","172.30.1.205","172.30.1.104","TCP","54","46540 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43799","20.953888","172.30.1.104","172.30.1.205","TCP","66","49671 > 39178 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43800","20.953896","172.30.1.205","172.30.1.104","TCP","54","39178 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43801","20.954239","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43802","20.954544","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43803","20.954552","172.30.1.205","172.30.1.104","TCP","54","39178 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43804","20.956440","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43805","20.956811","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43806","20.956817","172.30.1.205","172.30.1.104","TCP","54","39178 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43807","20.958175","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43808","20.961559","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43809","20.961569","172.30.1.205","172.30.1.104","TCP","54","39178 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43810","20.962549","172.30.1.205","172.30.1.104","TCP","74","46544 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924188 TSecr=0 WS=128" "43811","20.962844","172.30.1.104","172.30.1.205","TCP","66","135 > 46544 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43812","20.962861","172.30.1.205","172.30.1.104","TCP","54","46544 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43813","20.963218","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43814","20.963513","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43815","20.963521","172.30.1.205","172.30.1.104","TCP","54","46544 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43816","20.965757","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43817","20.966190","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43818","20.966196","172.30.1.205","172.30.1.104","TCP","54","46544 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43819","20.968006","172.30.1.205","172.30.1.104","TCP","54","46544 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43820","20.968124","172.30.1.205","172.30.1.104","TCP","74","39182 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924194 TSecr=0 WS=128" "43821","20.968277","172.30.1.104","172.30.1.205","TCP","54","135 > 46544 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43822","20.968298","172.30.1.104","172.30.1.205","TCP","54","135 > 46544 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43823","20.968304","172.30.1.205","172.30.1.104","TCP","54","46544 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43824","20.968452","172.30.1.104","172.30.1.205","TCP","66","49671 > 39182 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43825","20.968461","172.30.1.205","172.30.1.104","TCP","54","39182 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43826","20.968828","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43827","20.969119","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43828","20.969133","172.30.1.205","172.30.1.104","TCP","54","39182 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43829","20.971114","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43830","20.971494","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43831","20.971501","172.30.1.205","172.30.1.104","TCP","54","39182 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43832","20.972944","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43833","20.976346","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43834","20.976358","172.30.1.205","172.30.1.104","TCP","54","39182 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43835","20.977362","172.30.1.205","172.30.1.104","TCP","74","46548 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924203 TSecr=0 WS=128" "43836","20.977731","172.30.1.104","172.30.1.205","TCP","66","135 > 46548 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43837","20.977743","172.30.1.205","172.30.1.104","TCP","54","46548 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43838","20.978104","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43839","20.978413","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43840","20.978422","172.30.1.205","172.30.1.104","TCP","54","46548 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43841","20.980614","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43842","20.981029","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43843","20.981037","172.30.1.205","172.30.1.104","TCP","54","46548 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43844","20.982865","172.30.1.205","172.30.1.104","TCP","54","46548 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43845","20.982980","172.30.1.205","172.30.1.104","TCP","74","39186 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924209 TSecr=0 WS=128" "43846","20.983142","172.30.1.104","172.30.1.205","TCP","54","135 > 46548 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43847","20.983154","172.30.1.104","172.30.1.205","TCP","54","135 > 46548 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43848","20.983160","172.30.1.205","172.30.1.104","TCP","54","46548 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43849","20.983274","172.30.1.104","172.30.1.205","TCP","66","49671 > 39186 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43850","20.983291","172.30.1.205","172.30.1.104","TCP","54","39186 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43851","20.983632","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43852","20.983912","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43853","20.983921","172.30.1.205","172.30.1.104","TCP","54","39186 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43854","20.985836","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43855","20.986213","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43856","20.986220","172.30.1.205","172.30.1.104","TCP","54","39186 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43857","20.987567","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43858","20.992277","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43859","20.992286","172.30.1.205","172.30.1.104","TCP","54","39186 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43860","20.993264","172.30.1.205","172.30.1.104","TCP","74","46552 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924219 TSecr=0 WS=128" "43861","20.993581","172.30.1.104","172.30.1.205","TCP","66","135 > 46552 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43862","20.993592","172.30.1.205","172.30.1.104","TCP","54","46552 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43863","20.993956","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43864","20.994237","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43865","20.994245","172.30.1.205","172.30.1.104","TCP","54","46552 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43866","20.996417","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43867","20.996810","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43868","20.996817","172.30.1.205","172.30.1.104","TCP","54","46552 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43869","20.997673","172.30.1.205","172.30.1.104","TCP","54","39146 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43870","20.997722","172.30.1.205","172.30.1.104","TCP","54","39150 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43871","20.997760","172.30.1.205","172.30.1.104","TCP","54","39154 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43872","20.997788","172.30.1.205","172.30.1.104","TCP","54","39158 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43873","20.997822","172.30.1.205","172.30.1.104","TCP","54","39162 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43874","20.997854","172.30.1.205","172.30.1.104","TCP","54","39166 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43875","20.997889","172.30.1.205","172.30.1.104","TCP","54","39170 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43876","20.997915","172.30.1.205","172.30.1.104","TCP","54","39174 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43877","20.997948","172.30.1.205","172.30.1.104","TCP","54","39178 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43878","20.997973","172.30.1.205","172.30.1.104","TCP","54","39182 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43879","20.997986","172.30.1.104","172.30.1.205","TCP","54","49671 > 39146 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43880","20.998001","172.30.1.104","172.30.1.205","TCP","54","49671 > 39150 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43881","20.998029","172.30.1.205","172.30.1.104","TCP","54","39186 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43882","20.998068","172.30.1.104","172.30.1.205","TCP","54","49671 > 39154 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43883","20.998116","172.30.1.205","172.30.1.104","TCP","54","39142 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "43884","20.998275","172.30.1.104","172.30.1.205","TCP","54","49671 > 39146 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43885","20.998283","172.30.1.205","172.30.1.104","TCP","54","39146 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43886","20.998291","172.30.1.104","172.30.1.205","TCP","54","49671 > 39158 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43887","20.998318","172.30.1.104","172.30.1.205","TCP","54","49671 > 39158 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43888","20.998322","172.30.1.205","172.30.1.104","TCP","54","39158 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43889","20.998337","172.30.1.104","172.30.1.205","TCP","54","49671 > 39150 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43890","20.998340","172.30.1.205","172.30.1.104","TCP","54","39150 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43891","20.998356","172.30.1.104","172.30.1.205","TCP","54","49671 > 39154 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43892","20.998359","172.30.1.205","172.30.1.104","TCP","54","39154 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43893","20.998377","172.30.1.104","172.30.1.205","TCP","54","49671 > 39162 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43894","20.998397","172.30.1.104","172.30.1.205","TCP","54","49671 > 39166 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43895","20.998417","172.30.1.104","172.30.1.205","TCP","54","49671 > 39166 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43896","20.998421","172.30.1.205","172.30.1.104","TCP","54","39166 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43897","20.998436","172.30.1.104","172.30.1.205","TCP","54","49671 > 39170 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43898","20.998455","172.30.1.104","172.30.1.205","TCP","54","49671 > 39174 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43899","20.998475","172.30.1.104","172.30.1.205","TCP","54","49671 > 39162 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43900","20.998480","172.30.1.205","172.30.1.104","TCP","54","39162 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43901","20.998494","172.30.1.104","172.30.1.205","TCP","54","49671 > 39178 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43902","20.998514","172.30.1.104","172.30.1.205","TCP","54","49671 > 39178 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43903","20.998518","172.30.1.205","172.30.1.104","TCP","54","39178 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43904","20.998534","172.30.1.104","172.30.1.205","TCP","54","49671 > 39182 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43905","20.998571","172.30.1.104","172.30.1.205","TCP","54","49671 > 39174 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43906","20.998575","172.30.1.205","172.30.1.104","TCP","54","39174 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43907","20.998750","172.30.1.104","172.30.1.205","TCP","54","49671 > 39186 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43908","20.998765","172.30.1.104","172.30.1.205","TCP","54","49671 > 39186 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43909","20.998769","172.30.1.205","172.30.1.104","TCP","54","39186 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43910","20.998783","172.30.1.104","172.30.1.205","TCP","54","49671 > 39182 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43911","20.998785","172.30.1.205","172.30.1.104","TCP","54","39182 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43912","20.998802","172.30.1.104","172.30.1.205","TCP","54","49671 > 39170 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43913","20.998804","172.30.1.205","172.30.1.104","TCP","54","39170 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43914","20.998820","172.30.1.104","172.30.1.205","TCP","54","49671 > 39142 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43915","20.998840","172.30.1.104","172.30.1.205","TCP","54","49671 > 39142 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "43916","20.998843","172.30.1.205","172.30.1.104","TCP","54","39142 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "43917","20.999656","172.30.1.205","172.30.1.104","TCP","54","46552 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43918","20.999771","172.30.1.205","172.30.1.104","TCP","74","39190 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924226 TSecr=0 WS=128" "43919","20.999894","172.30.1.104","172.30.1.205","TCP","54","135 > 46552 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43920","20.999928","172.30.1.104","172.30.1.205","TCP","54","135 > 46552 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43921","20.999933","172.30.1.205","172.30.1.104","TCP","54","46552 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43922","21.000038","172.30.1.104","172.30.1.205","TCP","66","49671 > 39190 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43923","21.000046","172.30.1.205","172.30.1.104","TCP","54","39190 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43924","21.000422","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43925","21.000703","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43926","21.000711","172.30.1.205","172.30.1.104","TCP","54","39190 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43927","21.002614","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43928","21.002984","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43929","21.002990","172.30.1.205","172.30.1.104","TCP","54","39190 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43930","21.004350","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43931","21.007847","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43932","21.007860","172.30.1.205","172.30.1.104","TCP","54","39190 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43933","21.008907","172.30.1.205","172.30.1.104","TCP","74","46556 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924235 TSecr=0 WS=128" "43934","21.009267","172.30.1.104","172.30.1.205","TCP","66","135 > 46556 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43935","21.009278","172.30.1.205","172.30.1.104","TCP","54","46556 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43936","21.009638","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43937","21.009919","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43938","21.009928","172.30.1.205","172.30.1.104","TCP","54","46556 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43939","21.012175","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43940","21.012661","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43941","21.012669","172.30.1.205","172.30.1.104","TCP","54","46556 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43942","21.014548","172.30.1.205","172.30.1.104","TCP","54","46556 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43943","21.014703","172.30.1.205","172.30.1.104","TCP","74","39194 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924241 TSecr=0 WS=128" "43944","21.014813","172.30.1.104","172.30.1.205","TCP","54","135 > 46556 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43945","21.014857","172.30.1.104","172.30.1.205","TCP","54","135 > 46556 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43946","21.014866","172.30.1.205","172.30.1.104","TCP","54","46556 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43947","21.014979","172.30.1.104","172.30.1.205","TCP","66","49671 > 39194 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43948","21.014988","172.30.1.205","172.30.1.104","TCP","54","39194 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43949","21.015349","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43950","21.016175","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43951","21.016185","172.30.1.205","172.30.1.104","TCP","54","39194 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43952","21.018149","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43953","21.018613","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43954","21.018619","172.30.1.205","172.30.1.104","TCP","54","39194 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43955","21.019981","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43956","21.023431","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43957","21.023446","172.30.1.205","172.30.1.104","TCP","54","39194 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43958","21.024552","172.30.1.205","172.30.1.104","TCP","74","46560 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924250 TSecr=0 WS=128" "43959","21.024875","172.30.1.104","172.30.1.205","TCP","66","135 > 46560 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43960","21.024888","172.30.1.205","172.30.1.104","TCP","54","46560 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43961","21.025265","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43962","21.025554","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43963","21.025564","172.30.1.205","172.30.1.104","TCP","54","46560 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43964","21.027816","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43965","21.028238","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43966","21.028245","172.30.1.205","172.30.1.104","TCP","54","46560 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43967","21.030110","172.30.1.205","172.30.1.104","TCP","54","46560 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43968","21.030237","172.30.1.205","172.30.1.104","TCP","74","39198 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924256 TSecr=0 WS=128" "43969","21.030394","172.30.1.104","172.30.1.205","TCP","54","135 > 46560 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43970","21.030408","172.30.1.104","172.30.1.205","TCP","54","135 > 46560 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43971","21.030415","172.30.1.205","172.30.1.104","TCP","54","46560 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43972","21.030569","172.30.1.104","172.30.1.205","TCP","66","49671 > 39198 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43973","21.030579","172.30.1.205","172.30.1.104","TCP","54","39198 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43974","21.030933","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "43975","21.031588","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43976","21.031595","172.30.1.205","172.30.1.104","TCP","54","39198 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43977","21.033522","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "43978","21.033878","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "43979","21.033885","172.30.1.205","172.30.1.104","TCP","54","39198 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "43980","21.035253","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "43981","21.038612","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "43982","21.038623","172.30.1.205","172.30.1.104","TCP","54","39198 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "43983","21.039668","172.30.1.205","172.30.1.104","TCP","74","46564 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924266 TSecr=0 WS=128" "43984","21.040011","172.30.1.104","172.30.1.205","TCP","66","135 > 46564 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43985","21.040024","172.30.1.205","172.30.1.104","TCP","54","46564 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43986","21.040398","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "43987","21.040718","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "43988","21.040730","172.30.1.205","172.30.1.104","TCP","54","46564 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "43989","21.042992","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "43990","21.043480","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "43991","21.043487","172.30.1.205","172.30.1.104","TCP","54","46564 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "43992","21.045344","172.30.1.205","172.30.1.104","TCP","54","46564 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "43993","21.045472","172.30.1.205","172.30.1.104","TCP","74","39202 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924271 TSecr=0 WS=128" "43994","21.045671","172.30.1.104","172.30.1.205","TCP","54","135 > 46564 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43995","21.045682","172.30.1.104","172.30.1.205","TCP","54","135 > 46564 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "43996","21.045689","172.30.1.205","172.30.1.104","TCP","54","46564 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "43997","21.045840","172.30.1.104","172.30.1.205","TCP","66","49671 > 39202 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "43998","21.045855","172.30.1.205","172.30.1.104","TCP","54","39202 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "43999","21.046207","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44000","21.046542","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44001","21.046551","172.30.1.205","172.30.1.104","TCP","54","39202 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44002","21.048453","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44003","21.048855","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44004","21.048862","172.30.1.205","172.30.1.104","TCP","54","39202 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44005","21.050242","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44006","21.053619","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44007","21.053629","172.30.1.205","172.30.1.104","TCP","54","39202 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44008","21.054608","172.30.1.205","172.30.1.104","TCP","74","46568 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924281 TSecr=0 WS=128" "44009","21.054935","172.30.1.104","172.30.1.205","TCP","66","135 > 46568 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44010","21.054946","172.30.1.205","172.30.1.104","TCP","54","46568 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44011","21.055299","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44012","21.055633","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44013","21.055641","172.30.1.205","172.30.1.104","TCP","54","46568 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44014","21.057882","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44015","21.058312","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44016","21.058319","172.30.1.205","172.30.1.104","TCP","54","46568 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44017","21.060169","172.30.1.205","172.30.1.104","TCP","54","46568 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44018","21.060293","172.30.1.205","172.30.1.104","TCP","74","39206 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924286 TSecr=0 WS=128" "44019","21.060473","172.30.1.104","172.30.1.205","TCP","54","135 > 46568 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44020","21.060516","172.30.1.104","172.30.1.205","TCP","54","135 > 46568 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44021","21.060523","172.30.1.205","172.30.1.104","TCP","54","46568 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44022","21.060628","172.30.1.104","172.30.1.205","TCP","66","49671 > 39206 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44023","21.060636","172.30.1.205","172.30.1.104","TCP","54","39206 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44024","21.061015","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44025","21.061356","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44026","21.061365","172.30.1.205","172.30.1.104","TCP","54","39206 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44027","21.063266","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44028","21.063651","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44029","21.063658","172.30.1.205","172.30.1.104","TCP","54","39206 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44030","21.065050","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44031","21.068459","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44032","21.068470","172.30.1.205","172.30.1.104","TCP","54","39206 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44033","21.069490","172.30.1.205","172.30.1.104","TCP","74","46572 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924295 TSecr=0 WS=128" "44034","21.069824","172.30.1.104","172.30.1.205","TCP","66","135 > 46572 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44035","21.069836","172.30.1.205","172.30.1.104","TCP","54","46572 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44036","21.070208","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44037","21.070504","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44038","21.070514","172.30.1.205","172.30.1.104","TCP","54","46572 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44039","21.072738","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44040","21.073164","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44041","21.073171","172.30.1.205","172.30.1.104","TCP","54","46572 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44042","21.075018","172.30.1.205","172.30.1.104","TCP","54","46572 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44043","21.075142","172.30.1.205","172.30.1.104","TCP","74","39210 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924301 TSecr=0 WS=128" "44044","21.075349","172.30.1.104","172.30.1.205","TCP","54","135 > 46572 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44045","21.075362","172.30.1.104","172.30.1.205","TCP","54","135 > 46572 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44046","21.075369","172.30.1.205","172.30.1.104","TCP","54","46572 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44047","21.075479","172.30.1.104","172.30.1.205","TCP","66","49671 > 39210 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44048","21.075488","172.30.1.205","172.30.1.104","TCP","54","39210 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44049","21.075845","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44050","21.076136","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44051","21.076144","172.30.1.205","172.30.1.104","TCP","54","39210 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44052","21.078067","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44053","21.078449","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44054","21.078456","172.30.1.205","172.30.1.104","TCP","54","39210 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44055","21.079818","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44056","21.083253","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44057","21.083268","172.30.1.205","172.30.1.104","TCP","54","39210 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44058","21.084373","172.30.1.205","172.30.1.104","TCP","74","46576 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924310 TSecr=0 WS=128" "44059","21.084743","172.30.1.104","172.30.1.205","TCP","66","135 > 46576 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44060","21.084755","172.30.1.205","172.30.1.104","TCP","54","46576 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44061","21.085138","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44062","21.085460","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44063","21.085470","172.30.1.205","172.30.1.104","TCP","54","46576 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44064","21.087750","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44065","21.088215","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44066","21.088222","172.30.1.205","172.30.1.104","TCP","54","46576 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44067","21.090090","172.30.1.205","172.30.1.104","TCP","54","46576 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44068","21.090224","172.30.1.205","172.30.1.104","TCP","74","39214 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924316 TSecr=0 WS=128" "44069","21.090387","172.30.1.104","172.30.1.205","TCP","54","135 > 46576 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44070","21.090416","172.30.1.104","172.30.1.205","TCP","54","135 > 46576 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44071","21.090424","172.30.1.205","172.30.1.104","TCP","54","46576 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44072","21.090555","172.30.1.104","172.30.1.205","TCP","66","49671 > 39214 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44073","21.090563","172.30.1.205","172.30.1.104","TCP","54","39214 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44074","21.090916","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44075","21.091212","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44076","21.091221","172.30.1.205","172.30.1.104","TCP","54","39214 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44077","21.093175","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44078","21.093554","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44079","21.093560","172.30.1.205","172.30.1.104","TCP","54","39214 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44080","21.094937","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44081","21.098338","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44082","21.098352","172.30.1.205","172.30.1.104","TCP","54","39214 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44083","21.099451","172.30.1.205","172.30.1.104","TCP","74","46580 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924325 TSecr=0 WS=128" "44084","21.099784","172.30.1.104","172.30.1.205","TCP","66","135 > 46580 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44085","21.099797","172.30.1.205","172.30.1.104","TCP","54","46580 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44086","21.100169","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44087","21.100472","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44088","21.100481","172.30.1.205","172.30.1.104","TCP","54","46580 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44089","21.102776","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44090","21.103177","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44091","21.103183","172.30.1.205","172.30.1.104","TCP","54","46580 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44092","21.105050","172.30.1.205","172.30.1.104","TCP","54","46580 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44093","21.105206","172.30.1.205","172.30.1.104","TCP","74","39218 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924331 TSecr=0 WS=128" "44094","21.105353","172.30.1.104","172.30.1.205","TCP","54","135 > 46580 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44095","21.105367","172.30.1.104","172.30.1.205","TCP","54","135 > 46580 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44096","21.105375","172.30.1.205","172.30.1.104","TCP","54","46580 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44097","21.105498","172.30.1.104","172.30.1.205","TCP","66","49671 > 39218 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44098","21.105507","172.30.1.205","172.30.1.104","TCP","54","39218 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44099","21.105867","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44100","21.106163","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44101","21.106172","172.30.1.205","172.30.1.104","TCP","54","39218 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44102","21.108092","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44103","21.108455","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44104","21.108461","172.30.1.205","172.30.1.104","TCP","54","39218 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44105","21.109876","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44106","21.113269","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44107","21.113283","172.30.1.205","172.30.1.104","TCP","54","39218 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44108","21.114407","172.30.1.205","172.30.1.104","TCP","74","46584 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924340 TSecr=0 WS=128" "44109","21.114708","172.30.1.104","172.30.1.205","TCP","66","135 > 46584 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44110","21.114722","172.30.1.205","172.30.1.104","TCP","54","46584 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44111","21.115083","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44112","21.115381","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44113","21.115390","172.30.1.205","172.30.1.104","TCP","54","46584 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44114","21.117668","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44115","21.118095","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44116","21.118105","172.30.1.205","172.30.1.104","TCP","54","46584 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44117","21.120013","172.30.1.205","172.30.1.104","TCP","54","46584 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44118","21.120170","172.30.1.205","172.30.1.104","TCP","74","39222 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924346 TSecr=0 WS=128" "44119","21.120331","172.30.1.104","172.30.1.205","TCP","54","135 > 46584 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44120","21.120343","172.30.1.104","172.30.1.205","TCP","54","135 > 46584 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44121","21.120354","172.30.1.205","172.30.1.104","TCP","54","46584 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44122","21.120494","172.30.1.104","172.30.1.205","TCP","66","49671 > 39222 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44123","21.120503","172.30.1.205","172.30.1.104","TCP","54","39222 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44124","21.120886","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44125","21.121188","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44126","21.121197","172.30.1.205","172.30.1.104","TCP","54","39222 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44127","21.123084","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44128","21.123477","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44129","21.123483","172.30.1.205","172.30.1.104","TCP","54","39222 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44130","21.124864","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44131","21.128313","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44132","21.128325","172.30.1.205","172.30.1.104","TCP","54","39222 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44133","21.129374","172.30.1.205","172.30.1.104","TCP","74","46588 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924355 TSecr=0 WS=128" "44134","21.129693","172.30.1.104","172.30.1.205","TCP","66","135 > 46588 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44135","21.129706","172.30.1.205","172.30.1.104","TCP","54","46588 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44136","21.130071","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44137","21.130368","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44138","21.130378","172.30.1.205","172.30.1.104","TCP","54","46588 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44139","21.132593","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44140","21.133015","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44141","21.133022","172.30.1.205","172.30.1.104","TCP","54","46588 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44142","21.134864","172.30.1.205","172.30.1.104","TCP","54","46588 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44143","21.134994","172.30.1.205","172.30.1.104","TCP","74","39226 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924361 TSecr=0 WS=128" "44144","21.135133","172.30.1.104","172.30.1.205","TCP","54","135 > 46588 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44145","21.135157","172.30.1.104","172.30.1.205","TCP","54","135 > 46588 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44146","21.135165","172.30.1.205","172.30.1.104","TCP","54","46588 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44147","21.135350","172.30.1.104","172.30.1.205","TCP","66","49671 > 39226 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44148","21.135358","172.30.1.205","172.30.1.104","TCP","54","39226 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44149","21.135705","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44150","21.136017","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44151","21.136026","172.30.1.205","172.30.1.104","TCP","54","39226 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44152","21.137943","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44153","21.138303","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44154","21.138310","172.30.1.205","172.30.1.104","TCP","54","39226 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44155","21.139666","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44156","21.143027","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44157","21.143045","172.30.1.205","172.30.1.104","TCP","54","39226 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44158","21.144220","172.30.1.205","172.30.1.104","TCP","74","46592 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924370 TSecr=0 WS=128" "44159","21.144530","172.30.1.104","172.30.1.205","TCP","66","135 > 46592 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44160","21.144546","172.30.1.205","172.30.1.104","TCP","54","46592 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44161","21.144966","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44162","21.145323","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44163","21.145333","172.30.1.205","172.30.1.104","TCP","54","46592 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44164","21.147595","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44165","21.148009","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44166","21.148016","172.30.1.205","172.30.1.104","TCP","54","46592 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44167","21.149877","172.30.1.205","172.30.1.104","TCP","54","46592 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44168","21.150022","172.30.1.205","172.30.1.104","TCP","74","39230 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924376 TSecr=0 WS=128" "44169","21.150161","172.30.1.104","172.30.1.205","TCP","54","135 > 46592 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44170","21.150173","172.30.1.104","172.30.1.205","TCP","54","135 > 46592 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44171","21.150181","172.30.1.205","172.30.1.104","TCP","54","46592 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44172","21.150295","172.30.1.104","172.30.1.205","TCP","66","49671 > 39230 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44173","21.150304","172.30.1.205","172.30.1.104","TCP","54","39230 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44174","21.150653","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44175","21.150933","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44176","21.150943","172.30.1.205","172.30.1.104","TCP","54","39230 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44177","21.152899","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44178","21.153277","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44179","21.153283","172.30.1.205","172.30.1.104","TCP","54","39230 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44180","21.154665","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44181","21.158830","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44182","21.158842","172.30.1.205","172.30.1.104","TCP","54","39230 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44183","21.159864","172.30.1.205","172.30.1.104","TCP","74","46596 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924386 TSecr=0 WS=128" "44184","21.160160","172.30.1.104","172.30.1.205","TCP","66","135 > 46596 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44185","21.160172","172.30.1.205","172.30.1.104","TCP","54","46596 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44186","21.160520","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44187","21.160817","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44188","21.160826","172.30.1.205","172.30.1.104","TCP","54","46596 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44189","21.163042","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44190","21.163451","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44191","21.163458","172.30.1.205","172.30.1.104","TCP","54","46596 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44192","21.165321","172.30.1.205","172.30.1.104","TCP","54","46596 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44193","21.165445","172.30.1.205","172.30.1.104","TCP","74","39234 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924391 TSecr=0 WS=128" "44194","21.165616","172.30.1.104","172.30.1.205","TCP","54","135 > 46596 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44195","21.165626","172.30.1.104","172.30.1.205","TCP","54","135 > 46596 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44196","21.165633","172.30.1.205","172.30.1.104","TCP","54","46596 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44197","21.165733","172.30.1.104","172.30.1.205","TCP","66","49671 > 39234 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44198","21.165742","172.30.1.205","172.30.1.104","TCP","54","39234 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44199","21.166086","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44200","21.166861","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44201","21.166870","172.30.1.205","172.30.1.104","TCP","54","39234 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44202","21.168744","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44203","21.169161","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44204","21.169167","172.30.1.205","172.30.1.104","TCP","54","39234 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44205","21.170511","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44206","21.173961","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44207","21.173971","172.30.1.205","172.30.1.104","TCP","54","39234 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44208","21.174986","172.30.1.205","172.30.1.104","TCP","74","46600 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924401 TSecr=0 WS=128" "44209","21.175316","172.30.1.104","172.30.1.205","TCP","66","135 > 46600 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44210","21.175328","172.30.1.205","172.30.1.104","TCP","54","46600 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44211","21.175687","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44212","21.175995","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44213","21.176004","172.30.1.205","172.30.1.104","TCP","54","46600 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44214","21.178232","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44215","21.178668","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44216","21.178675","172.30.1.205","172.30.1.104","TCP","54","46600 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44217","21.179528","172.30.1.205","172.30.1.104","TCP","54","39194 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44218","21.179579","172.30.1.205","172.30.1.104","TCP","54","39198 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44219","21.179615","172.30.1.205","172.30.1.104","TCP","54","39202 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44220","21.179645","172.30.1.205","172.30.1.104","TCP","54","39206 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44221","21.179673","172.30.1.205","172.30.1.104","TCP","54","39210 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44222","21.179707","172.30.1.205","172.30.1.104","TCP","54","39214 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44223","21.179734","172.30.1.205","172.30.1.104","TCP","54","39218 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44224","21.179761","172.30.1.205","172.30.1.104","TCP","54","39222 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44225","21.179787","172.30.1.205","172.30.1.104","TCP","54","39226 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44226","21.179818","172.30.1.205","172.30.1.104","TCP","54","39230 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44227","21.179845","172.30.1.205","172.30.1.104","TCP","54","39234 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44228","21.179916","172.30.1.205","172.30.1.104","TCP","54","39190 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44229","21.179937","172.30.1.104","172.30.1.205","TCP","54","49671 > 39194 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44230","21.179964","172.30.1.104","172.30.1.205","TCP","54","49671 > 39198 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44231","21.180001","172.30.1.104","172.30.1.205","TCP","54","49671 > 39202 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44232","21.180041","172.30.1.104","172.30.1.205","TCP","54","49671 > 39194 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44233","21.180050","172.30.1.205","172.30.1.104","TCP","54","39194 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44234","21.180064","172.30.1.104","172.30.1.205","TCP","54","49671 > 39206 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44235","21.180090","172.30.1.104","172.30.1.205","TCP","54","49671 > 39210 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44236","21.180115","172.30.1.104","172.30.1.205","TCP","54","49671 > 39214 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44237","21.180198","172.30.1.104","172.30.1.205","TCP","54","49671 > 39218 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44238","21.180224","172.30.1.104","172.30.1.205","TCP","54","49671 > 39218 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44239","21.180238","172.30.1.205","172.30.1.104","TCP","54","39218 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44240","21.180263","172.30.1.104","172.30.1.205","TCP","54","49671 > 39214 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44241","21.180267","172.30.1.205","172.30.1.104","TCP","54","39214 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44242","21.180293","172.30.1.104","172.30.1.205","TCP","54","49671 > 39210 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44243","21.180297","172.30.1.205","172.30.1.104","TCP","54","39210 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44244","21.180320","172.30.1.104","172.30.1.205","TCP","54","49671 > 39206 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44245","21.180323","172.30.1.205","172.30.1.104","TCP","54","39206 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44246","21.180346","172.30.1.104","172.30.1.205","TCP","54","49671 > 39198 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44247","21.180350","172.30.1.205","172.30.1.104","TCP","54","39198 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44248","21.180373","172.30.1.104","172.30.1.205","TCP","54","49671 > 39202 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44249","21.180377","172.30.1.205","172.30.1.104","TCP","54","39202 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44250","21.180399","172.30.1.104","172.30.1.205","TCP","54","49671 > 39222 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44251","21.180426","172.30.1.104","172.30.1.205","TCP","54","49671 > 39226 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44252","21.180453","172.30.1.104","172.30.1.205","TCP","54","49671 > 39230 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44253","21.180479","172.30.1.104","172.30.1.205","TCP","54","49671 > 39234 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44254","21.180506","172.30.1.104","172.30.1.205","TCP","54","49671 > 39234 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44255","21.180510","172.30.1.205","172.30.1.104","TCP","54","39234 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44256","21.180531","172.30.1.104","172.30.1.205","TCP","54","49671 > 39230 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44257","21.180534","172.30.1.205","172.30.1.104","TCP","54","39230 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44258","21.180556","172.30.1.104","172.30.1.205","TCP","54","49671 > 39222 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44259","21.180559","172.30.1.205","172.30.1.104","TCP","54","39222 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44260","21.180594","172.30.1.104","172.30.1.205","TCP","54","49671 > 39226 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44261","21.180597","172.30.1.205","172.30.1.104","TCP","54","39226 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44262","21.180619","172.30.1.104","172.30.1.205","TCP","54","49671 > 39190 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44263","21.180645","172.30.1.104","172.30.1.205","TCP","54","49671 > 39190 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44264","21.180648","172.30.1.205","172.30.1.104","TCP","54","39190 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44265","21.181582","172.30.1.205","172.30.1.104","TCP","54","46600 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44266","21.181702","172.30.1.205","172.30.1.104","TCP","74","39238 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924408 TSecr=0 WS=128" "44267","21.181849","172.30.1.104","172.30.1.205","TCP","54","135 > 46600 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44268","21.181872","172.30.1.104","172.30.1.205","TCP","54","135 > 46600 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44269","21.181877","172.30.1.205","172.30.1.104","TCP","54","46600 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44270","21.181996","172.30.1.104","172.30.1.205","TCP","66","49671 > 39238 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44271","21.182004","172.30.1.205","172.30.1.104","TCP","54","39238 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44272","21.182358","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44273","21.182654","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44274","21.182662","172.30.1.205","172.30.1.104","TCP","54","39238 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44275","21.184552","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44276","21.184958","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44277","21.184965","172.30.1.205","172.30.1.104","TCP","54","39238 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44278","21.186364","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44279","21.189914","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44280","21.189924","172.30.1.205","172.30.1.104","TCP","54","39238 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44281","21.190916","172.30.1.205","172.30.1.104","TCP","74","46604 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924417 TSecr=0 WS=128" "44282","21.191298","172.30.1.104","172.30.1.205","TCP","66","135 > 46604 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44283","21.191310","172.30.1.205","172.30.1.104","TCP","54","46604 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44284","21.191670","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44285","21.192003","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44286","21.192012","172.30.1.205","172.30.1.104","TCP","54","46604 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44287","21.194220","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44288","21.194618","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44289","21.194625","172.30.1.205","172.30.1.104","TCP","54","46604 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44290","21.196426","172.30.1.205","172.30.1.104","TCP","54","46604 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44291","21.196535","172.30.1.205","172.30.1.104","TCP","74","39242 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924422 TSecr=0 WS=128" "44292","21.196715","172.30.1.104","172.30.1.205","TCP","54","135 > 46604 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44293","21.196726","172.30.1.104","172.30.1.205","TCP","54","135 > 46604 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44294","21.196732","172.30.1.205","172.30.1.104","TCP","54","46604 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44295","21.196848","172.30.1.104","172.30.1.205","TCP","66","49671 > 39242 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44296","21.196857","172.30.1.205","172.30.1.104","TCP","54","39242 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44297","21.197223","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44298","21.197541","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44299","21.197550","172.30.1.205","172.30.1.104","TCP","54","39242 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44300","21.199431","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44301","21.199807","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44302","21.199813","172.30.1.205","172.30.1.104","TCP","54","39242 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44303","21.201193","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44304","21.204532","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44305","21.204541","172.30.1.205","172.30.1.104","TCP","54","39242 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44306","21.205503","172.30.1.205","172.30.1.104","TCP","74","46608 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924431 TSecr=0 WS=128" "44307","21.205826","172.30.1.104","172.30.1.205","TCP","66","135 > 46608 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44308","21.205839","172.30.1.205","172.30.1.104","TCP","54","46608 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44309","21.206203","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44310","21.206488","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44311","21.206497","172.30.1.205","172.30.1.104","TCP","54","46608 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44312","21.208685","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44313","21.209147","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44314","21.209153","172.30.1.205","172.30.1.104","TCP","54","46608 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44315","21.210960","172.30.1.205","172.30.1.104","TCP","54","46608 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44316","21.211075","172.30.1.205","172.30.1.104","TCP","74","39246 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924437 TSecr=0 WS=128" "44317","21.211250","172.30.1.104","172.30.1.205","TCP","54","135 > 46608 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44318","21.211294","172.30.1.104","172.30.1.205","TCP","54","135 > 46608 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44319","21.211301","172.30.1.205","172.30.1.104","TCP","54","46608 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44320","21.211380","172.30.1.104","172.30.1.205","TCP","66","49671 > 39246 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44321","21.211388","172.30.1.205","172.30.1.104","TCP","54","39246 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44322","21.211743","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44323","21.212070","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44324","21.212078","172.30.1.205","172.30.1.104","TCP","54","39246 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44325","21.213965","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44326","21.214356","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44327","21.214362","172.30.1.205","172.30.1.104","TCP","54","39246 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44328","21.215704","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44329","21.219261","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44330","21.219270","172.30.1.205","172.30.1.104","TCP","54","39246 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44331","21.220254","172.30.1.205","172.30.1.104","TCP","74","46612 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924446 TSecr=0 WS=128" "44332","21.220616","172.30.1.104","172.30.1.205","TCP","66","135 > 46612 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44333","21.220628","172.30.1.205","172.30.1.104","TCP","54","46612 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44334","21.221012","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44335","21.221314","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44336","21.221323","172.30.1.205","172.30.1.104","TCP","54","46612 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44337","21.223537","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44338","21.223929","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44339","21.223941","172.30.1.205","172.30.1.104","TCP","54","46612 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44340","21.225780","172.30.1.205","172.30.1.104","TCP","54","46612 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44341","21.225890","172.30.1.205","172.30.1.104","TCP","74","39250 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924452 TSecr=0 WS=128" "44342","21.226040","172.30.1.104","172.30.1.205","TCP","54","135 > 46612 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44343","21.226090","172.30.1.104","172.30.1.205","TCP","54","135 > 46612 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44344","21.226096","172.30.1.205","172.30.1.104","TCP","54","46612 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44345","21.226186","172.30.1.104","172.30.1.205","TCP","66","49671 > 39250 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44346","21.226193","172.30.1.205","172.30.1.104","TCP","54","39250 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44347","21.226548","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44348","21.226841","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44349","21.226850","172.30.1.205","172.30.1.104","TCP","54","39250 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44350","21.228729","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44351","21.229085","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44352","21.229092","172.30.1.205","172.30.1.104","TCP","54","39250 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44353","21.230461","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44354","21.233886","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44355","21.233895","172.30.1.205","172.30.1.104","TCP","54","39250 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44356","21.234841","172.30.1.205","172.30.1.104","TCP","74","46616 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924461 TSecr=0 WS=128" "44357","21.235192","172.30.1.104","172.30.1.205","TCP","66","135 > 46616 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44358","21.235203","172.30.1.205","172.30.1.104","TCP","54","46616 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44359","21.235549","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44360","21.235874","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44361","21.235882","172.30.1.205","172.30.1.104","TCP","54","46616 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44362","21.238086","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44363","21.238478","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44364","21.238485","172.30.1.205","172.30.1.104","TCP","54","46616 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44365","21.240292","172.30.1.205","172.30.1.104","TCP","54","46616 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44366","21.240401","172.30.1.205","172.30.1.104","TCP","74","39254 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924466 TSecr=0 WS=128" "44367","21.240544","172.30.1.104","172.30.1.205","TCP","54","135 > 46616 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44368","21.240555","172.30.1.104","172.30.1.205","TCP","54","135 > 46616 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44369","21.240561","172.30.1.205","172.30.1.104","TCP","54","46616 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44370","21.240669","172.30.1.104","172.30.1.205","TCP","66","49671 > 39254 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44371","21.240677","172.30.1.205","172.30.1.104","TCP","54","39254 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44372","21.241056","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44373","21.241346","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44374","21.241355","172.30.1.205","172.30.1.104","TCP","54","39254 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44375","21.243247","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44376","21.243651","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44377","21.243657","172.30.1.205","172.30.1.104","TCP","54","39254 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44378","21.245029","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44379","21.248592","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44380","21.248601","172.30.1.205","172.30.1.104","TCP","54","39254 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44381","21.249561","172.30.1.205","172.30.1.104","TCP","74","46620 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924475 TSecr=0 WS=128" "44382","21.249882","172.30.1.104","172.30.1.205","TCP","66","135 > 46620 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44383","21.249893","172.30.1.205","172.30.1.104","TCP","54","46620 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44384","21.250254","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44385","21.250557","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44386","21.250574","172.30.1.205","172.30.1.104","TCP","54","46620 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44387","21.252798","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44388","21.253208","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44389","21.253215","172.30.1.205","172.30.1.104","TCP","54","46620 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44390","21.255030","172.30.1.205","172.30.1.104","TCP","54","46620 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44391","21.255140","172.30.1.205","172.30.1.104","TCP","74","39258 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924481 TSecr=0 WS=128" "44392","21.255292","172.30.1.104","172.30.1.205","TCP","54","135 > 46620 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44393","21.255330","172.30.1.104","172.30.1.205","TCP","54","135 > 46620 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44394","21.255335","172.30.1.205","172.30.1.104","TCP","54","46620 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44395","21.255421","172.30.1.104","172.30.1.205","TCP","66","49671 > 39258 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44396","21.255429","172.30.1.205","172.30.1.104","TCP","54","39258 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44397","21.255773","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44398","21.256063","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44399","21.256074","172.30.1.205","172.30.1.104","TCP","54","39258 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44400","21.258253","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44401","21.258636","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44402","21.258640","172.30.1.205","172.30.1.104","TCP","54","39258 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44403","21.259999","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44404","21.263653","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44405","21.263662","172.30.1.205","172.30.1.104","TCP","54","39258 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44406","21.264601","172.30.1.205","172.30.1.104","TCP","74","46624 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924491 TSecr=0 WS=128" "44407","21.264889","172.30.1.104","172.30.1.205","TCP","66","135 > 46624 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44408","21.264900","172.30.1.205","172.30.1.104","TCP","54","46624 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44409","21.265257","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44410","21.265545","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44411","21.265554","172.30.1.205","172.30.1.104","TCP","54","46624 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44412","21.267750","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44413","21.268143","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44414","21.268150","172.30.1.205","172.30.1.104","TCP","54","46624 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44415","21.269975","172.30.1.205","172.30.1.104","TCP","54","46624 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44416","21.270087","172.30.1.205","172.30.1.104","TCP","74","39262 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924496 TSecr=0 WS=128" "44417","21.270269","172.30.1.104","172.30.1.205","TCP","54","135 > 46624 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44418","21.270291","172.30.1.104","172.30.1.205","TCP","54","135 > 46624 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44419","21.270296","172.30.1.205","172.30.1.104","TCP","54","46624 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44420","21.270400","172.30.1.104","172.30.1.205","TCP","66","49671 > 39262 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44421","21.270407","172.30.1.205","172.30.1.104","TCP","54","39262 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44422","21.270756","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44423","21.271053","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44424","21.271062","172.30.1.205","172.30.1.104","TCP","54","39262 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44425","21.272979","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44426","21.273338","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44427","21.273344","172.30.1.205","172.30.1.104","TCP","54","39262 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44428","21.274693","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44429","21.278161","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44430","21.278171","172.30.1.205","172.30.1.104","TCP","54","39262 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44431","21.279142","172.30.1.205","172.30.1.104","TCP","74","46628 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924505 TSecr=0 WS=128" "44432","21.279439","172.30.1.104","172.30.1.205","TCP","66","135 > 46628 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44433","21.279449","172.30.1.205","172.30.1.104","TCP","54","46628 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44434","21.279806","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44435","21.280092","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44436","21.280100","172.30.1.205","172.30.1.104","TCP","54","46628 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44437","21.282318","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44438","21.282705","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44439","21.282712","172.30.1.205","172.30.1.104","TCP","54","46628 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44440","21.284522","172.30.1.205","172.30.1.104","TCP","54","46628 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44441","21.284633","172.30.1.205","172.30.1.104","TCP","74","39266 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924511 TSecr=0 WS=128" "44442","21.284789","172.30.1.104","172.30.1.205","TCP","54","135 > 46628 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44443","21.284808","172.30.1.104","172.30.1.205","TCP","54","135 > 46628 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44444","21.284814","172.30.1.205","172.30.1.104","TCP","54","46628 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44445","21.284897","172.30.1.104","172.30.1.205","TCP","66","49671 > 39266 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44446","21.284905","172.30.1.205","172.30.1.104","TCP","54","39266 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44447","21.285248","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44448","21.285534","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44449","21.285542","172.30.1.205","172.30.1.104","TCP","54","39266 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44450","21.287407","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44451","21.287769","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44452","21.287775","172.30.1.205","172.30.1.104","TCP","54","39266 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44453","21.289171","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44454","21.292518","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44455","21.292528","172.30.1.205","172.30.1.104","TCP","54","39266 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44456","21.293501","172.30.1.205","172.30.1.104","TCP","74","46632 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924519 TSecr=0 WS=128" "44457","21.293808","172.30.1.104","172.30.1.205","TCP","66","135 > 46632 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44458","21.293819","172.30.1.205","172.30.1.104","TCP","54","46632 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44459","21.294168","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44460","21.294445","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44461","21.294453","172.30.1.205","172.30.1.104","TCP","54","46632 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44462","21.296631","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44463","21.297043","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44464","21.297049","172.30.1.205","172.30.1.104","TCP","54","46632 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44465","21.298861","172.30.1.205","172.30.1.104","TCP","54","46632 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44466","21.298972","172.30.1.205","172.30.1.104","TCP","74","39270 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924525 TSecr=0 WS=128" "44467","21.299129","172.30.1.104","172.30.1.205","TCP","54","135 > 46632 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44468","21.299175","172.30.1.104","172.30.1.205","TCP","54","135 > 46632 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44469","21.299180","172.30.1.205","172.30.1.104","TCP","54","46632 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44470","21.299260","172.30.1.104","172.30.1.205","TCP","66","49671 > 39270 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44471","21.299268","172.30.1.205","172.30.1.104","TCP","54","39270 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44472","21.299609","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44473","21.299895","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44474","21.299904","172.30.1.205","172.30.1.104","TCP","54","39270 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44475","21.301809","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44476","21.302191","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44477","21.302198","172.30.1.205","172.30.1.104","TCP","54","39270 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44478","21.303534","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44479","21.306963","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44480","21.306972","172.30.1.205","172.30.1.104","TCP","54","39270 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44481","21.307909","172.30.1.205","172.30.1.104","TCP","74","46636 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924534 TSecr=0 WS=128" "44482","21.308208","172.30.1.104","172.30.1.205","TCP","66","135 > 46636 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44483","21.308218","172.30.1.205","172.30.1.104","TCP","54","46636 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44484","21.308566","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44485","21.308871","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44486","21.308880","172.30.1.205","172.30.1.104","TCP","54","46636 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44487","21.311063","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44488","21.311477","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44489","21.311484","172.30.1.205","172.30.1.104","TCP","54","46636 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44490","21.313316","172.30.1.205","172.30.1.104","TCP","54","46636 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44491","21.313428","172.30.1.205","172.30.1.104","TCP","74","39274 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924539 TSecr=0 WS=128" "44492","21.313625","172.30.1.104","172.30.1.205","TCP","54","135 > 46636 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44493","21.313648","172.30.1.104","172.30.1.205","TCP","54","135 > 46636 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44494","21.313653","172.30.1.205","172.30.1.104","TCP","54","46636 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44495","21.313689","172.30.1.104","172.30.1.205","TCP","66","49671 > 39274 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44496","21.313697","172.30.1.205","172.30.1.104","TCP","54","39274 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44497","21.314037","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44498","21.314335","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44499","21.314343","172.30.1.205","172.30.1.104","TCP","54","39274 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44500","21.316210","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44501","21.316593","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44502","21.316599","172.30.1.205","172.30.1.104","TCP","54","39274 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44503","21.317966","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44504","21.322090","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44505","21.322099","172.30.1.205","172.30.1.104","TCP","54","39274 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44506","21.323033","172.30.1.205","172.30.1.104","TCP","74","46640 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924549 TSecr=0 WS=128" "44507","21.323357","172.30.1.104","172.30.1.205","TCP","66","135 > 46640 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44508","21.323368","172.30.1.205","172.30.1.104","TCP","54","46640 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44509","21.323720","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44510","21.324023","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44511","21.324032","172.30.1.205","172.30.1.104","TCP","54","46640 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44512","21.326247","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44513","21.326637","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44514","21.326649","172.30.1.205","172.30.1.104","TCP","54","46640 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44515","21.328449","172.30.1.205","172.30.1.104","TCP","54","46640 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44516","21.328559","172.30.1.205","172.30.1.104","TCP","74","39278 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924554 TSecr=0 WS=128" "44517","21.328716","172.30.1.104","172.30.1.205","TCP","54","135 > 46640 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44518","21.328749","172.30.1.104","172.30.1.205","TCP","54","135 > 46640 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44519","21.328755","172.30.1.205","172.30.1.104","TCP","54","46640 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44520","21.328834","172.30.1.104","172.30.1.205","TCP","66","49671 > 39278 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44521","21.328843","172.30.1.205","172.30.1.104","TCP","54","39278 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44522","21.329187","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44523","21.329508","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44524","21.329517","172.30.1.205","172.30.1.104","TCP","54","39278 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44525","21.331392","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44526","21.332707","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44527","21.332714","172.30.1.205","172.30.1.104","TCP","54","39278 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44528","21.334076","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44529","21.337568","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44530","21.337579","172.30.1.205","172.30.1.104","TCP","54","39278 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44531","21.338559","172.30.1.205","172.30.1.104","TCP","74","46644 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924564 TSecr=0 WS=128" "44532","21.338860","172.30.1.104","172.30.1.205","TCP","66","135 > 46644 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44533","21.338870","172.30.1.205","172.30.1.104","TCP","54","46644 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44534","21.339224","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44535","21.339522","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44536","21.339531","172.30.1.205","172.30.1.104","TCP","54","46644 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44537","21.341743","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44538","21.342188","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44539","21.342194","172.30.1.205","172.30.1.104","TCP","54","46644 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44540","21.344032","172.30.1.205","172.30.1.104","TCP","54","46644 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44541","21.344142","172.30.1.205","172.30.1.104","TCP","74","39282 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924570 TSecr=0 WS=128" "44542","21.344308","172.30.1.104","172.30.1.205","TCP","54","135 > 46644 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44543","21.344330","172.30.1.104","172.30.1.205","TCP","54","135 > 46644 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44544","21.344336","172.30.1.205","172.30.1.104","TCP","54","46644 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44545","21.344490","172.30.1.104","172.30.1.205","TCP","66","49671 > 39282 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44546","21.344498","172.30.1.205","172.30.1.104","TCP","54","39282 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44547","21.344866","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44548","21.345166","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44549","21.345173","172.30.1.205","172.30.1.104","TCP","54","39282 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44550","21.347040","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44551","21.347394","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44552","21.347401","172.30.1.205","172.30.1.104","TCP","54","39282 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44553","21.348748","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44554","21.352036","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44555","21.352045","172.30.1.205","172.30.1.104","TCP","54","39282 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44556","21.353025","172.30.1.205","172.30.1.104","TCP","74","46648 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924579 TSecr=0 WS=128" "44557","21.353457","172.30.1.104","172.30.1.205","TCP","66","135 > 46648 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44558","21.353468","172.30.1.205","172.30.1.104","TCP","54","46648 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44559","21.353823","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44560","21.354135","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44561","21.354144","172.30.1.205","172.30.1.104","TCP","54","46648 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44562","21.356326","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44563","21.356826","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44564","21.356832","172.30.1.205","172.30.1.104","TCP","54","46648 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44565","21.357694","172.30.1.205","172.30.1.104","TCP","54","39242 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44566","21.357742","172.30.1.205","172.30.1.104","TCP","54","39246 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44567","21.357779","172.30.1.205","172.30.1.104","TCP","54","39250 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44568","21.357813","172.30.1.205","172.30.1.104","TCP","54","39254 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44569","21.357841","172.30.1.205","172.30.1.104","TCP","54","39258 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44570","21.357869","172.30.1.205","172.30.1.104","TCP","54","39262 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44571","21.357896","172.30.1.205","172.30.1.104","TCP","54","39266 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44572","21.357923","172.30.1.205","172.30.1.104","TCP","54","39270 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44573","21.357950","172.30.1.205","172.30.1.104","TCP","54","39274 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44574","21.357963","172.30.1.104","172.30.1.205","TCP","54","49671 > 39242 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44575","21.357999","172.30.1.205","172.30.1.104","TCP","54","39278 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44576","21.358031","172.30.1.205","172.30.1.104","TCP","54","39282 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44577","21.358106","172.30.1.205","172.30.1.104","TCP","54","39238 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44578","21.358305","172.30.1.104","172.30.1.205","TCP","54","49671 > 39246 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44579","21.358324","172.30.1.104","172.30.1.205","TCP","54","49671 > 39242 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44580","21.358330","172.30.1.205","172.30.1.104","TCP","54","39242 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44581","21.358344","172.30.1.104","172.30.1.205","TCP","54","49671 > 39250 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44582","21.358383","172.30.1.104","172.30.1.205","TCP","54","49671 > 39246 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44583","21.358388","172.30.1.205","172.30.1.104","TCP","54","39246 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44584","21.358412","172.30.1.104","172.30.1.205","TCP","54","49671 > 39254 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44585","21.358437","172.30.1.104","172.30.1.205","TCP","54","49671 > 39250 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44586","21.358441","172.30.1.205","172.30.1.104","TCP","54","39250 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44587","21.358456","172.30.1.104","172.30.1.205","TCP","54","49671 > 39258 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44588","21.358477","172.30.1.104","172.30.1.205","TCP","54","49671 > 39262 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44589","21.358498","172.30.1.104","172.30.1.205","TCP","54","49671 > 39262 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44590","21.358502","172.30.1.205","172.30.1.104","TCP","54","39262 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44591","21.358517","172.30.1.104","172.30.1.205","TCP","54","49671 > 39266 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44592","21.358537","172.30.1.104","172.30.1.205","TCP","54","49671 > 39266 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44593","21.358541","172.30.1.205","172.30.1.104","TCP","54","39266 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44594","21.358558","172.30.1.104","172.30.1.205","TCP","54","49671 > 39270 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44595","21.358578","172.30.1.104","172.30.1.205","TCP","54","49671 > 39270 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44596","21.358582","172.30.1.205","172.30.1.104","TCP","54","39270 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44597","21.358599","172.30.1.104","172.30.1.205","TCP","54","49671 > 39274 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44598","21.358618","172.30.1.104","172.30.1.205","TCP","54","49671 > 39274 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44599","21.358622","172.30.1.205","172.30.1.104","TCP","54","39274 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44600","21.358639","172.30.1.104","172.30.1.205","TCP","54","49671 > 39278 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44601","21.358659","172.30.1.104","172.30.1.205","TCP","54","49671 > 39278 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44602","21.358667","172.30.1.205","172.30.1.104","TCP","54","39278 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44603","21.358678","172.30.1.104","172.30.1.205","TCP","54","49671 > 39282 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44604","21.358699","172.30.1.104","172.30.1.205","TCP","54","49671 > 39282 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44605","21.358702","172.30.1.205","172.30.1.104","TCP","54","39282 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44606","21.358719","172.30.1.104","172.30.1.205","TCP","54","49671 > 39254 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44607","21.358722","172.30.1.205","172.30.1.104","TCP","54","39254 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44608","21.358740","172.30.1.104","172.30.1.205","TCP","54","49671 > 39258 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44609","21.358742","172.30.1.205","172.30.1.104","TCP","54","39258 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44610","21.359005","172.30.1.104","172.30.1.205","TCP","54","49671 > 39238 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44611","21.359025","172.30.1.104","172.30.1.205","TCP","54","49671 > 39238 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44612","21.359029","172.30.1.205","172.30.1.104","TCP","54","39238 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44613","21.359685","172.30.1.205","172.30.1.104","TCP","54","46648 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44614","21.359797","172.30.1.205","172.30.1.104","TCP","74","39286 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924586 TSecr=0 WS=128" "44615","21.359927","172.30.1.104","172.30.1.205","TCP","54","135 > 46648 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44616","21.359946","172.30.1.104","172.30.1.205","TCP","54","135 > 46648 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44617","21.359951","172.30.1.205","172.30.1.104","TCP","54","46648 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44618","21.360101","172.30.1.104","172.30.1.205","TCP","66","49671 > 39286 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44619","21.360109","172.30.1.205","172.30.1.104","TCP","54","39286 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44620","21.360460","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44621","21.360749","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44622","21.360758","172.30.1.205","172.30.1.104","TCP","54","39286 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44623","21.362640","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44624","21.363033","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44625","21.363039","172.30.1.205","172.30.1.104","TCP","54","39286 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44626","21.364391","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44627","21.367879","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44628","21.367889","172.30.1.205","172.30.1.104","TCP","54","39286 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44629","21.368864","172.30.1.205","172.30.1.104","TCP","74","46652 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924595 TSecr=0 WS=128" "44630","21.369188","172.30.1.104","172.30.1.205","TCP","66","135 > 46652 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44631","21.369200","172.30.1.205","172.30.1.104","TCP","54","46652 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44632","21.369559","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44633","21.369849","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44634","21.369861","172.30.1.205","172.30.1.104","TCP","54","46652 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44635","21.372031","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44636","21.372479","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44637","21.372485","172.30.1.205","172.30.1.104","TCP","54","46652 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44638","21.374303","172.30.1.205","172.30.1.104","TCP","54","46652 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44639","21.374413","172.30.1.205","172.30.1.104","TCP","74","39290 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924600 TSecr=0 WS=128" "44640","21.374566","172.30.1.104","172.30.1.205","TCP","54","135 > 46652 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44641","21.374593","172.30.1.104","172.30.1.205","TCP","54","135 > 46652 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44642","21.374599","172.30.1.205","172.30.1.104","TCP","54","46652 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44643","21.374721","172.30.1.104","172.30.1.205","TCP","66","49671 > 39290 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44644","21.374730","172.30.1.205","172.30.1.104","TCP","54","39290 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44645","21.375070","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44646","21.375338","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44647","21.375347","172.30.1.205","172.30.1.104","TCP","54","39290 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44648","21.377256","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44649","21.377637","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44650","21.377644","172.30.1.205","172.30.1.104","TCP","54","39290 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44651","21.378985","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44652","21.382365","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44653","21.382374","172.30.1.205","172.30.1.104","TCP","54","39290 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44654","21.383333","172.30.1.205","172.30.1.104","TCP","74","46656 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924609 TSecr=0 WS=128" "44655","21.383656","172.30.1.104","172.30.1.205","TCP","66","135 > 46656 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44656","21.383666","172.30.1.205","172.30.1.104","TCP","54","46656 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44657","21.384019","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44658","21.384313","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44659","21.384324","172.30.1.205","172.30.1.104","TCP","54","46656 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44660","21.386558","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44661","21.386945","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44662","21.386951","172.30.1.205","172.30.1.104","TCP","54","46656 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44663","21.388769","172.30.1.205","172.30.1.104","TCP","54","46656 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44664","21.388891","172.30.1.205","172.30.1.104","TCP","74","39294 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924615 TSecr=0 WS=128" "44665","21.389105","172.30.1.104","172.30.1.205","TCP","54","135 > 46656 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44666","21.389114","172.30.1.104","172.30.1.205","TCP","54","135 > 46656 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44667","21.389119","172.30.1.205","172.30.1.104","TCP","54","46656 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44668","21.389196","172.30.1.104","172.30.1.205","TCP","66","49671 > 39294 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44669","21.389204","172.30.1.205","172.30.1.104","TCP","54","39294 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44670","21.389551","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44671","21.389860","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44672","21.389866","172.30.1.205","172.30.1.104","TCP","54","39294 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44673","21.391731","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44674","21.392107","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44675","21.392113","172.30.1.205","172.30.1.104","TCP","54","39294 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44676","21.393486","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44677","21.396731","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44678","21.396740","172.30.1.205","172.30.1.104","TCP","54","39294 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44679","21.397696","172.30.1.205","172.30.1.104","TCP","74","46660 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924624 TSecr=0 WS=128" "44680","21.397991","172.30.1.104","172.30.1.205","TCP","66","135 > 46660 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44681","21.398001","172.30.1.205","172.30.1.104","TCP","54","46660 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44682","21.398350","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44683","21.398627","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44684","21.398636","172.30.1.205","172.30.1.104","TCP","54","46660 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44685","21.400846","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44686","21.401216","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44687","21.401223","172.30.1.205","172.30.1.104","TCP","54","46660 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44688","21.403037","172.30.1.205","172.30.1.104","TCP","54","46660 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44689","21.403144","172.30.1.205","172.30.1.104","TCP","74","39298 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924629 TSecr=0 WS=128" "44690","21.403317","172.30.1.104","172.30.1.205","TCP","54","135 > 46660 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44691","21.403325","172.30.1.104","172.30.1.205","TCP","54","135 > 46660 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44692","21.403330","172.30.1.205","172.30.1.104","TCP","54","46660 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44693","21.403427","172.30.1.104","172.30.1.205","TCP","66","49671 > 39298 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44694","21.403435","172.30.1.205","172.30.1.104","TCP","54","39298 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44695","21.403794","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44696","21.404083","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44697","21.404091","172.30.1.205","172.30.1.104","TCP","54","39298 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44698","21.405980","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44699","21.406340","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44700","21.406346","172.30.1.205","172.30.1.104","TCP","54","39298 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44701","21.407694","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44702","21.411035","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44703","21.411044","172.30.1.205","172.30.1.104","TCP","54","39298 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44704","21.411983","172.30.1.205","172.30.1.104","TCP","74","46664 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924638 TSecr=0 WS=128" "44705","21.412293","172.30.1.104","172.30.1.205","TCP","66","135 > 46664 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44706","21.412304","172.30.1.205","172.30.1.104","TCP","54","46664 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44707","21.412653","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44708","21.412947","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44709","21.412956","172.30.1.205","172.30.1.104","TCP","54","46664 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44710","21.415147","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44711","21.415574","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44712","21.415580","172.30.1.205","172.30.1.104","TCP","54","46664 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44713","21.417406","172.30.1.205","172.30.1.104","TCP","54","46664 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44714","21.417520","172.30.1.205","172.30.1.104","TCP","74","39302 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924643 TSecr=0 WS=128" "44715","21.417682","172.30.1.104","172.30.1.205","TCP","54","135 > 46664 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44716","21.417716","172.30.1.104","172.30.1.205","TCP","54","135 > 46664 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44717","21.417721","172.30.1.205","172.30.1.104","TCP","54","46664 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44718","21.417821","172.30.1.104","172.30.1.205","TCP","66","49671 > 39302 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44719","21.417829","172.30.1.205","172.30.1.104","TCP","54","39302 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44720","21.418171","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44721","21.418473","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44722","21.418482","172.30.1.205","172.30.1.104","TCP","54","39302 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44723","21.420349","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44724","21.420792","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44725","21.420798","172.30.1.205","172.30.1.104","TCP","54","39302 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44726","21.422158","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44727","21.425573","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44728","21.425582","172.30.1.205","172.30.1.104","TCP","54","39302 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44729","21.426525","172.30.1.205","172.30.1.104","TCP","74","46668 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924652 TSecr=0 WS=128" "44730","21.426810","172.30.1.104","172.30.1.205","TCP","66","135 > 46668 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44731","21.426820","172.30.1.205","172.30.1.104","TCP","54","46668 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44732","21.427173","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44733","21.427543","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44734","21.427551","172.30.1.205","172.30.1.104","TCP","54","46668 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44735","21.429764","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44736","21.430189","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44737","21.430195","172.30.1.205","172.30.1.104","TCP","54","46668 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44738","21.432002","172.30.1.205","172.30.1.104","TCP","54","46668 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44739","21.432111","172.30.1.205","172.30.1.104","TCP","74","39306 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924658 TSecr=0 WS=128" "44740","21.432301","172.30.1.104","172.30.1.205","TCP","54","135 > 46668 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44741","21.432322","172.30.1.104","172.30.1.205","TCP","54","135 > 46668 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44742","21.432327","172.30.1.205","172.30.1.104","TCP","54","46668 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44743","21.432398","172.30.1.104","172.30.1.205","TCP","66","49671 > 39306 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44744","21.432406","172.30.1.205","172.30.1.104","TCP","54","39306 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44745","21.432747","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44746","21.433044","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44747","21.433050","172.30.1.205","172.30.1.104","TCP","54","39306 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44748","21.434913","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44749","21.435273","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44750","21.435279","172.30.1.205","172.30.1.104","TCP","54","39306 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44751","21.436624","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44752","21.440044","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44753","21.440053","172.30.1.205","172.30.1.104","TCP","54","39306 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44754","21.441012","172.30.1.205","172.30.1.104","TCP","74","46672 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924667 TSecr=0 WS=128" "44755","21.441308","172.30.1.104","172.30.1.205","TCP","66","135 > 46672 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44756","21.441318","172.30.1.205","172.30.1.104","TCP","54","46672 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44757","21.441664","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44758","21.441980","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44759","21.441988","172.30.1.205","172.30.1.104","TCP","54","46672 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44760","21.444164","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44761","21.444568","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44762","21.444574","172.30.1.205","172.30.1.104","TCP","54","46672 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44763","21.446382","172.30.1.205","172.30.1.104","TCP","54","46672 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44764","21.446494","172.30.1.205","172.30.1.104","TCP","74","39310 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924672 TSecr=0 WS=128" "44765","21.446646","172.30.1.104","172.30.1.205","TCP","54","135 > 46672 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44766","21.446656","172.30.1.104","172.30.1.205","TCP","54","135 > 46672 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44767","21.446661","172.30.1.205","172.30.1.104","TCP","54","46672 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44768","21.446785","172.30.1.104","172.30.1.205","TCP","66","49671 > 39310 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44769","21.446793","172.30.1.205","172.30.1.104","TCP","54","39310 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44770","21.447139","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44771","21.447424","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44772","21.447432","172.30.1.205","172.30.1.104","TCP","54","39310 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44773","21.449338","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44774","21.449723","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44775","21.449729","172.30.1.205","172.30.1.104","TCP","54","39310 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44776","21.451070","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44777","21.454556","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44778","21.454566","172.30.1.205","172.30.1.104","TCP","54","39310 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44779","21.455505","172.30.1.205","172.30.1.104","TCP","74","46676 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924681 TSecr=0 WS=128" "44780","21.455844","172.30.1.104","172.30.1.205","TCP","66","135 > 46676 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44781","21.455854","172.30.1.205","172.30.1.104","TCP","54","46676 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44782","21.456203","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44783","21.456555","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44784","21.456564","172.30.1.205","172.30.1.104","TCP","54","46676 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44785","21.458769","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44786","21.459209","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44787","21.459215","172.30.1.205","172.30.1.104","TCP","54","46676 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44788","21.461038","172.30.1.205","172.30.1.104","TCP","54","46676 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44789","21.461151","172.30.1.205","172.30.1.104","TCP","74","39314 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924687 TSecr=0 WS=128" "44790","21.461308","172.30.1.104","172.30.1.205","TCP","54","135 > 46676 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44791","21.461357","172.30.1.104","172.30.1.205","TCP","54","135 > 46676 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44792","21.461362","172.30.1.205","172.30.1.104","TCP","54","46676 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44793","21.461433","172.30.1.104","172.30.1.205","TCP","66","49671 > 39314 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44794","21.461441","172.30.1.205","172.30.1.104","TCP","54","39314 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44795","21.461791","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44796","21.462071","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44797","21.462077","172.30.1.205","172.30.1.104","TCP","54","39314 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44798","21.463932","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44799","21.464314","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44800","21.464321","172.30.1.205","172.30.1.104","TCP","54","39314 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44801","21.465723","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44802","21.469126","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44803","21.469136","172.30.1.205","172.30.1.104","TCP","54","39314 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44804","21.470146","172.30.1.205","172.30.1.104","TCP","74","46680 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924696 TSecr=0 WS=128" "44805","21.470473","172.30.1.104","172.30.1.205","TCP","66","135 > 46680 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44806","21.470484","172.30.1.205","172.30.1.104","TCP","54","46680 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44807","21.470837","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44808","21.471153","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44809","21.471162","172.30.1.205","172.30.1.104","TCP","54","46680 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44810","21.473387","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44811","21.473805","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44812","21.473811","172.30.1.205","172.30.1.104","TCP","54","46680 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44813","21.475626","172.30.1.205","172.30.1.104","TCP","54","46680 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44814","21.475745","172.30.1.205","172.30.1.104","TCP","74","39318 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924702 TSecr=0 WS=128" "44815","21.475902","172.30.1.104","172.30.1.205","TCP","54","135 > 46680 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44816","21.475914","172.30.1.104","172.30.1.205","TCP","54","135 > 46680 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44817","21.475921","172.30.1.205","172.30.1.104","TCP","54","46680 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44818","21.476056","172.30.1.104","172.30.1.205","TCP","66","49671 > 39318 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44819","21.476064","172.30.1.205","172.30.1.104","TCP","54","39318 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44820","21.476405","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44821","21.476732","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44822","21.476740","172.30.1.205","172.30.1.104","TCP","54","39318 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44823","21.478636","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44824","21.479005","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44825","21.479011","172.30.1.205","172.30.1.104","TCP","54","39318 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44826","21.480356","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44827","21.483740","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44828","21.483750","172.30.1.205","172.30.1.104","TCP","54","39318 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44829","21.484719","172.30.1.205","172.30.1.104","TCP","74","46684 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924711 TSecr=0 WS=128" "44830","21.485071","172.30.1.104","172.30.1.205","TCP","66","135 > 46684 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44831","21.485082","172.30.1.205","172.30.1.104","TCP","54","46684 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44832","21.485449","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44833","21.485730","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44834","21.485739","172.30.1.205","172.30.1.104","TCP","54","46684 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44835","21.487903","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44836","21.488296","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44837","21.488302","172.30.1.205","172.30.1.104","TCP","54","46684 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44838","21.490122","172.30.1.205","172.30.1.104","TCP","54","46684 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44839","21.490232","172.30.1.205","172.30.1.104","TCP","74","39322 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924716 TSecr=0 WS=128" "44840","21.490401","172.30.1.104","172.30.1.205","TCP","54","135 > 46684 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44841","21.490435","172.30.1.104","172.30.1.205","TCP","54","135 > 46684 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44842","21.490440","172.30.1.205","172.30.1.104","TCP","54","46684 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44843","21.490521","172.30.1.104","172.30.1.205","TCP","66","49671 > 39322 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44844","21.490529","172.30.1.205","172.30.1.104","TCP","54","39322 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44845","21.490875","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44846","21.491173","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44847","21.491182","172.30.1.205","172.30.1.104","TCP","54","39322 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44848","21.493075","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44849","21.493490","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44850","21.493497","172.30.1.205","172.30.1.104","TCP","54","39322 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44851","21.494835","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44852","21.498311","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44853","21.498322","172.30.1.205","172.30.1.104","TCP","54","39322 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44854","21.499291","172.30.1.205","172.30.1.104","TCP","74","46688 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924725 TSecr=0 WS=128" "44855","21.499595","172.30.1.104","172.30.1.205","TCP","66","135 > 46688 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44856","21.499606","172.30.1.205","172.30.1.104","TCP","54","46688 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44857","21.499958","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44858","21.500238","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44859","21.500246","172.30.1.205","172.30.1.104","TCP","54","46688 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44860","21.502471","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44861","21.502900","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44862","21.502906","172.30.1.205","172.30.1.104","TCP","54","46688 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44863","21.504719","172.30.1.205","172.30.1.104","TCP","54","46688 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44864","21.504854","172.30.1.205","172.30.1.104","TCP","74","39326 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924731 TSecr=0 WS=128" "44865","21.505050","172.30.1.104","172.30.1.205","TCP","54","135 > 46688 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44866","21.505080","172.30.1.104","172.30.1.205","TCP","54","135 > 46688 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44867","21.505086","172.30.1.205","172.30.1.104","TCP","54","46688 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44868","21.505185","172.30.1.104","172.30.1.205","TCP","66","49671 > 39326 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44869","21.505193","172.30.1.205","172.30.1.104","TCP","54","39326 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44870","21.505545","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44871","21.505845","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44872","21.505854","172.30.1.205","172.30.1.104","TCP","54","39326 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44873","21.507748","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44874","21.508110","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44875","21.508116","172.30.1.205","172.30.1.104","TCP","54","39326 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44876","21.509501","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44877","21.513025","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44878","21.513036","172.30.1.205","172.30.1.104","TCP","54","39326 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44879","21.514035","172.30.1.205","172.30.1.104","TCP","74","46692 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924740 TSecr=0 WS=128" "44880","21.514332","172.30.1.104","172.30.1.205","TCP","66","135 > 46692 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44881","21.514343","172.30.1.205","172.30.1.104","TCP","54","46692 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44882","21.514709","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44883","21.515004","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44884","21.515022","172.30.1.205","172.30.1.104","TCP","54","46692 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44885","21.517345","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44886","21.517853","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44887","21.517862","172.30.1.205","172.30.1.104","TCP","54","46692 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44888","21.519757","172.30.1.205","172.30.1.104","TCP","54","46692 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44889","21.519890","172.30.1.205","172.30.1.104","TCP","74","39330 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924746 TSecr=0 WS=128" "44890","21.520021","172.30.1.104","172.30.1.205","TCP","54","135 > 46692 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44891","21.520034","172.30.1.104","172.30.1.205","TCP","54","135 > 46692 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44892","21.520041","172.30.1.205","172.30.1.104","TCP","54","46692 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44893","21.520184","172.30.1.104","172.30.1.205","TCP","66","49671 > 39330 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44894","21.520192","172.30.1.205","172.30.1.104","TCP","54","39330 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44895","21.520541","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44896","21.520851","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44897","21.520860","172.30.1.205","172.30.1.104","TCP","54","39330 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44898","21.522769","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44899","21.523129","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44900","21.523136","172.30.1.205","172.30.1.104","TCP","54","39330 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44901","21.524490","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44902","21.528034","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44903","21.528045","172.30.1.205","172.30.1.104","TCP","54","39330 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44904","21.529039","172.30.1.205","172.30.1.104","TCP","74","46696 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924755 TSecr=0 WS=128" "44905","21.529358","172.30.1.104","172.30.1.205","TCP","66","135 > 46696 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44906","21.529368","172.30.1.205","172.30.1.104","TCP","54","46696 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44907","21.529725","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44908","21.530024","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44909","21.530039","172.30.1.205","172.30.1.104","TCP","54","46696 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44910","21.532225","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44911","21.532666","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44912","21.532672","172.30.1.205","172.30.1.104","TCP","54","46696 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44913","21.533556","172.30.1.205","172.30.1.104","TCP","54","39286 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44914","21.533606","172.30.1.205","172.30.1.104","TCP","54","39290 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44915","21.533642","172.30.1.205","172.30.1.104","TCP","54","39294 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44916","21.533676","172.30.1.205","172.30.1.104","TCP","54","39298 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44917","21.533709","172.30.1.205","172.30.1.104","TCP","54","39302 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44918","21.533738","172.30.1.205","172.30.1.104","TCP","54","39306 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44919","21.533771","172.30.1.205","172.30.1.104","TCP","54","39310 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44920","21.533798","172.30.1.205","172.30.1.104","TCP","54","39314 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44921","21.533820","172.30.1.205","172.30.1.104","TCP","54","39318 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44922","21.533838","172.30.1.104","172.30.1.205","TCP","54","49671 > 39286 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44923","21.533854","172.30.1.104","172.30.1.205","TCP","54","49671 > 39290 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44924","21.533874","172.30.1.205","172.30.1.104","TCP","54","39322 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44925","21.533903","172.30.1.205","172.30.1.104","TCP","54","39326 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44926","21.533928","172.30.1.205","172.30.1.104","TCP","54","39330 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "44927","21.534198","172.30.1.104","172.30.1.205","TCP","54","49671 > 39294 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44928","21.534215","172.30.1.104","172.30.1.205","TCP","54","49671 > 39286 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44929","21.534222","172.30.1.205","172.30.1.104","TCP","54","39286 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44930","21.534237","172.30.1.104","172.30.1.205","TCP","54","49671 > 39290 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44931","21.534239","172.30.1.205","172.30.1.104","TCP","54","39290 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44932","21.534257","172.30.1.104","172.30.1.205","TCP","54","49671 > 39294 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44933","21.534260","172.30.1.205","172.30.1.104","TCP","54","39294 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44934","21.534278","172.30.1.104","172.30.1.205","TCP","54","49671 > 39298 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44935","21.534298","172.30.1.104","172.30.1.205","TCP","54","49671 > 39302 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44936","21.534322","172.30.1.104","172.30.1.205","TCP","54","49671 > 39298 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44937","21.534326","172.30.1.205","172.30.1.104","TCP","54","39298 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44938","21.534329","172.30.1.104","172.30.1.205","TCP","54","49671 > 39306 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44939","21.534367","172.30.1.104","172.30.1.205","TCP","54","49671 > 39302 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44940","21.534371","172.30.1.205","172.30.1.104","TCP","54","39302 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44941","21.534377","172.30.1.104","172.30.1.205","TCP","54","49671 > 39310 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44942","21.534407","172.30.1.104","172.30.1.205","TCP","54","49671 > 39314 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44943","21.534416","172.30.1.104","172.30.1.205","TCP","54","49671 > 39314 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44944","21.534420","172.30.1.205","172.30.1.104","TCP","54","39314 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44945","21.534443","172.30.1.104","172.30.1.205","TCP","54","49671 > 39318 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44946","21.534462","172.30.1.104","172.30.1.205","TCP","54","49671 > 39306 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44947","21.534466","172.30.1.205","172.30.1.104","TCP","54","39306 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44948","21.534484","172.30.1.104","172.30.1.205","TCP","54","49671 > 39322 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44949","21.534505","172.30.1.104","172.30.1.205","TCP","54","49671 > 39322 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44950","21.534508","172.30.1.205","172.30.1.104","TCP","54","39322 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44951","21.534525","172.30.1.104","172.30.1.205","TCP","54","49671 > 39326 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44952","21.534545","172.30.1.104","172.30.1.205","TCP","54","49671 > 39326 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44953","21.534548","172.30.1.205","172.30.1.104","TCP","54","39326 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44954","21.534565","172.30.1.104","172.30.1.205","TCP","54","49671 > 39330 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44955","21.534587","172.30.1.104","172.30.1.205","TCP","54","49671 > 39330 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44956","21.534590","172.30.1.205","172.30.1.104","TCP","54","39330 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44957","21.534608","172.30.1.104","172.30.1.205","TCP","54","49671 > 39310 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44958","21.534610","172.30.1.205","172.30.1.104","TCP","54","39310 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44959","21.534629","172.30.1.104","172.30.1.205","TCP","54","49671 > 39318 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "44960","21.534631","172.30.1.205","172.30.1.104","TCP","54","39318 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "44961","21.535490","172.30.1.205","172.30.1.104","TCP","54","46696 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44962","21.535606","172.30.1.205","172.30.1.104","TCP","74","39334 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924762 TSecr=0 WS=128" "44963","21.535752","172.30.1.104","172.30.1.205","TCP","54","135 > 46696 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44964","21.535789","172.30.1.104","172.30.1.205","TCP","54","135 > 46696 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44965","21.535794","172.30.1.205","172.30.1.104","TCP","54","46696 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44966","21.535935","172.30.1.104","172.30.1.205","TCP","66","49671 > 39334 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44967","21.535943","172.30.1.205","172.30.1.104","TCP","54","39334 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44968","21.536296","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44969","21.537844","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44970","21.537854","172.30.1.205","172.30.1.104","TCP","54","39334 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44971","21.539741","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44972","21.540132","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44973","21.540139","172.30.1.205","172.30.1.104","TCP","54","39334 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44974","21.541534","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "44975","21.545202","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "44976","21.545211","172.30.1.205","172.30.1.104","TCP","54","39334 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "44977","21.546223","172.30.1.205","172.30.1.104","TCP","74","46700 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924772 TSecr=0 WS=128" "44978","21.546535","172.30.1.104","172.30.1.205","TCP","66","135 > 46700 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44979","21.546546","172.30.1.205","172.30.1.104","TCP","54","46700 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44980","21.546909","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "44981","21.548253","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44982","21.548264","172.30.1.205","172.30.1.104","TCP","54","46700 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44983","21.550520","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "44984","21.551461","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "44985","21.551467","172.30.1.205","172.30.1.104","TCP","54","46700 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "44986","21.553331","172.30.1.205","172.30.1.104","TCP","54","46700 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "44987","21.553467","172.30.1.205","172.30.1.104","TCP","74","39338 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924779 TSecr=0 WS=128" "44988","21.553599","172.30.1.104","172.30.1.205","TCP","54","135 > 46700 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44989","21.553612","172.30.1.104","172.30.1.205","TCP","54","135 > 46700 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "44990","21.553620","172.30.1.205","172.30.1.104","TCP","54","46700 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "44991","21.553764","172.30.1.104","172.30.1.205","TCP","66","49671 > 39338 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "44992","21.553773","172.30.1.205","172.30.1.104","TCP","54","39338 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "44993","21.554116","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "44994","21.554406","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "44995","21.554415","172.30.1.205","172.30.1.104","TCP","54","39338 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "44996","21.556268","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "44997","21.556656","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "44998","21.556662","172.30.1.205","172.30.1.104","TCP","54","39338 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "44999","21.558034","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45000","21.561546","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45001","21.561556","172.30.1.205","172.30.1.104","TCP","54","39338 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45002","21.562509","172.30.1.205","172.30.1.104","TCP","74","46704 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924788 TSecr=0 WS=128" "45003","21.562876","172.30.1.104","172.30.1.205","TCP","66","135 > 46704 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45004","21.562887","172.30.1.205","172.30.1.104","TCP","54","46704 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45005","21.563235","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45006","21.563519","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45007","21.563528","172.30.1.205","172.30.1.104","TCP","54","46704 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45008","21.565741","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45009","21.566145","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45010","21.566152","172.30.1.205","172.30.1.104","TCP","54","46704 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45011","21.567950","172.30.1.205","172.30.1.104","TCP","54","46704 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45012","21.568058","172.30.1.205","172.30.1.104","TCP","74","39342 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924794 TSecr=0 WS=128" "45013","21.568241","172.30.1.104","172.30.1.205","TCP","54","135 > 46704 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45014","21.568249","172.30.1.104","172.30.1.205","TCP","54","135 > 46704 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45015","21.568255","172.30.1.205","172.30.1.104","TCP","54","46704 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45016","21.568346","172.30.1.104","172.30.1.205","TCP","66","49671 > 39342 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45017","21.568354","172.30.1.205","172.30.1.104","TCP","54","39342 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45018","21.568695","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45019","21.568983","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45020","21.568992","172.30.1.205","172.30.1.104","TCP","54","39342 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45021","21.570882","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45022","21.571232","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45023","21.571238","172.30.1.205","172.30.1.104","TCP","54","39342 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45024","21.572578","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45025","21.576083","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45026","21.576093","172.30.1.205","172.30.1.104","TCP","54","39342 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45027","21.577060","172.30.1.205","172.30.1.104","TCP","74","46708 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924803 TSecr=0 WS=128" "45028","21.577372","172.30.1.104","172.30.1.205","TCP","66","135 > 46708 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45029","21.577383","172.30.1.205","172.30.1.104","TCP","54","46708 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45030","21.577733","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45031","21.578056","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45032","21.578070","172.30.1.205","172.30.1.104","TCP","54","46708 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45033","21.580354","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45034","21.580732","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45035","21.580740","172.30.1.205","172.30.1.104","TCP","54","46708 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45036","21.582596","172.30.1.205","172.30.1.104","TCP","54","46708 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45037","21.582722","172.30.1.205","172.30.1.104","TCP","74","39346 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924809 TSecr=0 WS=128" "45038","21.582892","172.30.1.104","172.30.1.205","TCP","54","135 > 46708 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45039","21.582951","172.30.1.104","172.30.1.205","TCP","54","135 > 46708 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45040","21.582959","172.30.1.205","172.30.1.104","TCP","54","46708 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45041","21.582988","172.30.1.104","172.30.1.205","TCP","66","49671 > 39346 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45042","21.582997","172.30.1.205","172.30.1.104","TCP","54","39346 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45043","21.583352","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45044","21.583621","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45045","21.583630","172.30.1.205","172.30.1.104","TCP","54","39346 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45046","21.585579","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45047","21.585920","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45048","21.585927","172.30.1.205","172.30.1.104","TCP","54","39346 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45049","21.587289","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45050","21.590681","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45051","21.590692","172.30.1.205","172.30.1.104","TCP","54","39346 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45052","21.591648","172.30.1.205","172.30.1.104","TCP","74","46712 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924818 TSecr=0 WS=128" "45053","21.591959","172.30.1.104","172.30.1.205","TCP","66","135 > 46712 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45054","21.591969","172.30.1.205","172.30.1.104","TCP","54","46712 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45055","21.592317","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45056","21.592667","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45057","21.592676","172.30.1.205","172.30.1.104","TCP","54","46712 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45058","21.594882","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45059","21.595285","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45060","21.595292","172.30.1.205","172.30.1.104","TCP","54","46712 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45061","21.597144","172.30.1.205","172.30.1.104","TCP","54","46712 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45062","21.597264","172.30.1.205","172.30.1.104","TCP","74","39350 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924823 TSecr=0 WS=128" "45063","21.597442","172.30.1.104","172.30.1.205","TCP","54","135 > 46712 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45064","21.597451","172.30.1.104","172.30.1.205","TCP","54","135 > 46712 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45065","21.597456","172.30.1.205","172.30.1.104","TCP","54","46712 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45066","21.597545","172.30.1.104","172.30.1.205","TCP","66","49671 > 39350 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45067","21.597553","172.30.1.205","172.30.1.104","TCP","54","39350 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45068","21.597898","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45069","21.598159","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45070","21.598168","172.30.1.205","172.30.1.104","TCP","54","39350 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45071","21.600068","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45072","21.600455","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45073","21.600461","172.30.1.205","172.30.1.104","TCP","54","39350 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45074","21.601840","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45075","21.605385","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45076","21.605394","172.30.1.205","172.30.1.104","TCP","54","39350 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45077","21.606336","172.30.1.205","172.30.1.104","TCP","74","46716 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924832 TSecr=0 WS=128" "45078","21.606651","172.30.1.104","172.30.1.205","TCP","66","135 > 46716 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45079","21.606662","172.30.1.205","172.30.1.104","TCP","54","46716 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45080","21.607013","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45081","21.607310","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45082","21.607319","172.30.1.205","172.30.1.104","TCP","54","46716 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45083","21.609540","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45084","21.609937","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45085","21.609944","172.30.1.205","172.30.1.104","TCP","54","46716 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45086","21.611768","172.30.1.205","172.30.1.104","TCP","54","46716 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45087","21.611880","172.30.1.205","172.30.1.104","TCP","74","39354 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924838 TSecr=0 WS=128" "45088","21.612044","172.30.1.104","172.30.1.205","TCP","54","135 > 46716 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45089","21.612111","172.30.1.104","172.30.1.205","TCP","54","135 > 46716 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45090","21.612117","172.30.1.205","172.30.1.104","TCP","54","46716 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45091","21.612185","172.30.1.104","172.30.1.205","TCP","66","49671 > 39354 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45092","21.612193","172.30.1.205","172.30.1.104","TCP","54","39354 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45093","21.612540","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45094","21.612908","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45095","21.612917","172.30.1.205","172.30.1.104","TCP","54","39354 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45096","21.614819","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45097","21.615183","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45098","21.615189","172.30.1.205","172.30.1.104","TCP","54","39354 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45099","21.616547","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45100","21.619958","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45101","21.619969","172.30.1.205","172.30.1.104","TCP","54","39354 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45102","21.620956","172.30.1.205","172.30.1.104","TCP","74","46720 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924847 TSecr=0 WS=128" "45103","21.621261","172.30.1.104","172.30.1.205","TCP","66","135 > 46720 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45104","21.621273","172.30.1.205","172.30.1.104","TCP","54","46720 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45105","21.621630","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45106","21.621914","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45107","21.621924","172.30.1.205","172.30.1.104","TCP","54","46720 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45108","21.624154","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45109","21.624616","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45110","21.624626","172.30.1.205","172.30.1.104","TCP","54","46720 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45111","21.626581","172.30.1.205","172.30.1.104","TCP","54","46720 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45112","21.626731","172.30.1.205","172.30.1.104","TCP","74","39358 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924853 TSecr=0 WS=128" "45113","21.626863","172.30.1.104","172.30.1.205","TCP","54","135 > 46720 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45114","21.626876","172.30.1.104","172.30.1.205","TCP","54","135 > 46720 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45115","21.626883","172.30.1.205","172.30.1.104","TCP","54","46720 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45116","21.627029","172.30.1.104","172.30.1.205","TCP","66","49671 > 39358 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45117","21.627039","172.30.1.205","172.30.1.104","TCP","54","39358 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45118","21.627393","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45119","21.628641","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45120","21.628654","172.30.1.205","172.30.1.104","TCP","54","39358 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45121","21.630645","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45122","21.630995","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45123","21.631001","172.30.1.205","172.30.1.104","TCP","54","39358 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45124","21.632377","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45125","21.635851","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45126","21.635865","172.30.1.205","172.30.1.104","TCP","54","39358 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45127","21.636966","172.30.1.205","172.30.1.104","TCP","74","46724 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924863 TSecr=0 WS=128" "45128","21.637278","172.30.1.104","172.30.1.205","TCP","66","135 > 46724 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45129","21.637291","172.30.1.205","172.30.1.104","TCP","54","46724 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45130","21.637662","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45131","21.637965","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45132","21.637975","172.30.1.205","172.30.1.104","TCP","54","46724 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45133","21.640212","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45134","21.640605","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45135","21.640612","172.30.1.205","172.30.1.104","TCP","54","46724 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45136","21.642456","172.30.1.205","172.30.1.104","TCP","54","46724 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45137","21.642573","172.30.1.205","172.30.1.104","TCP","74","39362 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924868 TSecr=0 WS=128" "45138","21.642714","172.30.1.104","172.30.1.205","TCP","54","135 > 46724 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45139","21.642727","172.30.1.104","172.30.1.205","TCP","54","135 > 46724 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45140","21.642734","172.30.1.205","172.30.1.104","TCP","54","46724 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45141","21.642853","172.30.1.104","172.30.1.205","TCP","66","49671 > 39362 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45142","21.642862","172.30.1.205","172.30.1.104","TCP","54","39362 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45143","21.643210","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45144","21.643592","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45145","21.643601","172.30.1.205","172.30.1.104","TCP","54","39362 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45146","21.645513","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45147","21.645868","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45148","21.645873","172.30.1.205","172.30.1.104","TCP","54","39362 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45149","21.647240","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45150","21.650736","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45151","21.650748","172.30.1.205","172.30.1.104","TCP","54","39362 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45152","21.651715","172.30.1.205","172.30.1.104","TCP","74","46728 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924878 TSecr=0 WS=128" "45153","21.652036","172.30.1.104","172.30.1.205","TCP","66","135 > 46728 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45154","21.652047","172.30.1.205","172.30.1.104","TCP","54","46728 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45155","21.652397","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45156","21.652770","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45157","21.652789","172.30.1.205","172.30.1.104","TCP","54","46728 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45158","21.654984","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45159","21.655400","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45160","21.655407","172.30.1.205","172.30.1.104","TCP","54","46728 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45161","21.657287","172.30.1.205","172.30.1.104","TCP","54","46728 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45162","21.657396","172.30.1.205","172.30.1.104","TCP","74","39366 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924883 TSecr=0 WS=128" "45163","21.657550","172.30.1.104","172.30.1.205","TCP","54","135 > 46728 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45164","21.657561","172.30.1.104","172.30.1.205","TCP","54","135 > 46728 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45165","21.657567","172.30.1.205","172.30.1.104","TCP","54","46728 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45166","21.657663","172.30.1.104","172.30.1.205","TCP","66","49671 > 39366 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45167","21.657672","172.30.1.205","172.30.1.104","TCP","54","39366 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45168","21.658036","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45169","21.658308","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45170","21.658317","172.30.1.205","172.30.1.104","TCP","54","39366 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45171","21.660201","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45172","21.660591","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45173","21.660598","172.30.1.205","172.30.1.104","TCP","54","39366 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45174","21.661979","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45175","21.665387","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45176","21.665397","172.30.1.205","172.30.1.104","TCP","54","39366 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45177","21.666340","172.30.1.205","172.30.1.104","TCP","74","46732 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924892 TSecr=0 WS=128" "45178","21.666637","172.30.1.104","172.30.1.205","TCP","66","135 > 46732 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45179","21.666648","172.30.1.205","172.30.1.104","TCP","54","46732 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45180","21.666995","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45181","21.667277","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45182","21.667286","172.30.1.205","172.30.1.104","TCP","54","46732 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45183","21.669511","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45184","21.669956","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45185","21.669963","172.30.1.205","172.30.1.104","TCP","54","46732 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45186","21.671775","172.30.1.205","172.30.1.104","TCP","54","46732 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45187","21.671886","172.30.1.205","172.30.1.104","TCP","74","39370 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924898 TSecr=0 WS=128" "45188","21.672087","172.30.1.104","172.30.1.205","TCP","54","135 > 46732 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45189","21.672124","172.30.1.104","172.30.1.205","TCP","54","135 > 46732 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45190","21.672130","172.30.1.205","172.30.1.104","TCP","54","46732 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45191","21.672197","172.30.1.104","172.30.1.205","TCP","66","49671 > 39370 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45192","21.672205","172.30.1.205","172.30.1.104","TCP","54","39370 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45193","21.672551","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45194","21.672844","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45195","21.672853","172.30.1.205","172.30.1.104","TCP","54","39370 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45196","21.674759","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45197","21.675150","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45198","21.675157","172.30.1.205","172.30.1.104","TCP","54","39370 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45199","21.676514","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45200","21.679974","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45201","21.679984","172.30.1.205","172.30.1.104","TCP","54","39370 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45202","21.680943","172.30.1.205","172.30.1.104","TCP","74","46736 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924907 TSecr=0 WS=128" "45203","21.681258","172.30.1.104","172.30.1.205","TCP","66","135 > 46736 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45204","21.681269","172.30.1.205","172.30.1.104","TCP","54","46736 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45205","21.681629","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45206","21.681924","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45207","21.681933","172.30.1.205","172.30.1.104","TCP","54","46736 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45208","21.684146","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45209","21.684605","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45210","21.684612","172.30.1.205","172.30.1.104","TCP","54","46736 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45211","21.686451","172.30.1.205","172.30.1.104","TCP","54","46736 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45212","21.686574","172.30.1.205","172.30.1.104","TCP","74","39374 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924912 TSecr=0 WS=128" "45213","21.686745","172.30.1.104","172.30.1.205","TCP","54","135 > 46736 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45214","21.686756","172.30.1.104","172.30.1.205","TCP","54","135 > 46736 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45215","21.686762","172.30.1.205","172.30.1.104","TCP","54","46736 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45216","21.686857","172.30.1.104","172.30.1.205","TCP","66","49671 > 39374 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45217","21.686865","172.30.1.205","172.30.1.104","TCP","54","39374 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45218","21.687228","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45219","21.687570","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45220","21.687578","172.30.1.205","172.30.1.104","TCP","54","39374 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45221","21.689494","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45222","21.689901","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45223","21.689908","172.30.1.205","172.30.1.104","TCP","54","39374 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45224","21.691262","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45225","21.694750","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45226","21.694761","172.30.1.205","172.30.1.104","TCP","54","39374 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45227","21.695716","172.30.1.205","172.30.1.104","TCP","74","46740 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924922 TSecr=0 WS=128" "45228","21.696021","172.30.1.104","172.30.1.205","TCP","66","135 > 46740 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45229","21.696031","172.30.1.205","172.30.1.104","TCP","54","46740 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45230","21.696383","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45231","21.696662","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45232","21.696671","172.30.1.205","172.30.1.104","TCP","54","46740 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45233","21.698893","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45234","21.699310","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45235","21.699317","172.30.1.205","172.30.1.104","TCP","54","46740 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45236","21.701168","172.30.1.205","172.30.1.104","TCP","54","46740 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45237","21.701294","172.30.1.205","172.30.1.104","TCP","74","39378 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924927 TSecr=0 WS=128" "45238","21.701442","172.30.1.104","172.30.1.205","TCP","54","135 > 46740 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45239","21.701455","172.30.1.104","172.30.1.205","TCP","54","135 > 46740 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45240","21.701461","172.30.1.205","172.30.1.104","TCP","54","46740 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45241","21.701558","172.30.1.104","172.30.1.205","TCP","66","49671 > 39378 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45242","21.701566","172.30.1.205","172.30.1.104","TCP","54","39378 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45243","21.701911","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45244","21.702188","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45245","21.702197","172.30.1.205","172.30.1.104","TCP","54","39378 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45246","21.704089","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45247","21.704458","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45248","21.704465","172.30.1.205","172.30.1.104","TCP","54","39378 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45249","21.705868","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45250","21.709431","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45251","21.709441","172.30.1.205","172.30.1.104","TCP","54","39378 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45252","21.710447","172.30.1.205","172.30.1.104","TCP","74","46744 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924936 TSecr=0 WS=128" "45253","21.710805","172.30.1.104","172.30.1.205","TCP","66","135 > 46744 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45254","21.710816","172.30.1.205","172.30.1.104","TCP","54","46744 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45255","21.711168","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45256","21.711515","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45257","21.711524","172.30.1.205","172.30.1.104","TCP","54","46744 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45258","21.713761","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45259","21.714153","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45260","21.714160","172.30.1.205","172.30.1.104","TCP","54","46744 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45261","21.715023","172.30.1.205","172.30.1.104","TCP","54","39338 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45262","21.715072","172.30.1.205","172.30.1.104","TCP","54","39342 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45263","21.715105","172.30.1.205","172.30.1.104","TCP","54","39346 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45264","21.715139","172.30.1.205","172.30.1.104","TCP","54","39350 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45265","21.715168","172.30.1.205","172.30.1.104","TCP","54","39354 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45266","21.715194","172.30.1.205","172.30.1.104","TCP","54","39358 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45267","21.715221","172.30.1.205","172.30.1.104","TCP","54","39362 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45268","21.715248","172.30.1.205","172.30.1.104","TCP","54","39366 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45269","21.715281","172.30.1.205","172.30.1.104","TCP","54","39370 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45270","21.715308","172.30.1.205","172.30.1.104","TCP","54","39374 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45271","21.715340","172.30.1.205","172.30.1.104","TCP","54","39378 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45272","21.715378","172.30.1.104","172.30.1.205","TCP","54","49671 > 39338 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45273","21.715398","172.30.1.104","172.30.1.205","TCP","54","49671 > 39342 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45274","21.715416","172.30.1.104","172.30.1.205","TCP","54","49671 > 39346 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45275","21.715437","172.30.1.104","172.30.1.205","TCP","54","49671 > 39350 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45276","21.715459","172.30.1.205","172.30.1.104","TCP","54","39334 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45277","21.715757","172.30.1.104","172.30.1.205","TCP","54","49671 > 39338 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45278","21.715766","172.30.1.205","172.30.1.104","TCP","54","39338 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45279","21.715783","172.30.1.104","172.30.1.205","TCP","54","49671 > 39354 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45280","21.715810","172.30.1.104","172.30.1.205","TCP","54","49671 > 39354 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45281","21.715815","172.30.1.205","172.30.1.104","TCP","54","39354 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45282","21.715828","172.30.1.104","172.30.1.205","TCP","54","49671 > 39350 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45283","21.715831","172.30.1.205","172.30.1.104","TCP","54","39350 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45284","21.715848","172.30.1.104","172.30.1.205","TCP","54","49671 > 39342 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45285","21.715851","172.30.1.205","172.30.1.104","TCP","54","39342 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45286","21.715869","172.30.1.104","172.30.1.205","TCP","54","49671 > 39346 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45287","21.715872","172.30.1.205","172.30.1.104","TCP","54","39346 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45288","21.715887","172.30.1.104","172.30.1.205","TCP","54","49671 > 39358 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45289","21.715921","172.30.1.104","172.30.1.205","TCP","54","49671 > 39362 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45290","21.715926","172.30.1.104","172.30.1.205","TCP","54","49671 > 39358 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45291","21.715929","172.30.1.205","172.30.1.104","TCP","54","39358 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45292","21.715944","172.30.1.104","172.30.1.205","TCP","54","49671 > 39366 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45293","21.715964","172.30.1.104","172.30.1.205","TCP","54","49671 > 39362 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45294","21.715968","172.30.1.205","172.30.1.104","TCP","54","39362 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45295","21.715984","172.30.1.104","172.30.1.205","TCP","54","49671 > 39366 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45296","21.715986","172.30.1.205","172.30.1.104","TCP","54","39366 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45297","21.716036","172.30.1.104","172.30.1.205","TCP","54","49671 > 39370 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45298","21.716047","172.30.1.104","172.30.1.205","TCP","54","49671 > 39374 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45299","21.716073","172.30.1.104","172.30.1.205","TCP","54","49671 > 39370 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45300","21.716075","172.30.1.205","172.30.1.104","TCP","54","39370 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45301","21.716092","172.30.1.104","172.30.1.205","TCP","54","49671 > 39374 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45302","21.716095","172.30.1.205","172.30.1.104","TCP","54","39374 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45303","21.716112","172.30.1.104","172.30.1.205","TCP","54","49671 > 39378 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45304","21.716132","172.30.1.104","172.30.1.205","TCP","54","49671 > 39334 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45305","21.716152","172.30.1.104","172.30.1.205","TCP","54","49671 > 39378 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45306","21.716156","172.30.1.205","172.30.1.104","TCP","54","39378 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45307","21.716171","172.30.1.104","172.30.1.205","TCP","54","49671 > 39334 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45308","21.716174","172.30.1.205","172.30.1.104","TCP","54","39334 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45309","21.717070","172.30.1.205","172.30.1.104","TCP","54","46744 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45310","21.717187","172.30.1.205","172.30.1.104","TCP","74","39382 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924943 TSecr=0 WS=128" "45311","21.717330","172.30.1.104","172.30.1.205","TCP","54","135 > 46744 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45312","21.717359","172.30.1.104","172.30.1.205","TCP","54","135 > 46744 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45313","21.717364","172.30.1.205","172.30.1.104","TCP","54","46744 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45314","21.717463","172.30.1.104","172.30.1.205","TCP","66","49671 > 39382 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45315","21.717471","172.30.1.205","172.30.1.104","TCP","54","39382 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45316","21.717824","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45317","21.718118","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45318","21.718127","172.30.1.205","172.30.1.104","TCP","54","39382 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45319","21.720006","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45320","21.720360","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45321","21.720367","172.30.1.205","172.30.1.104","TCP","54","39382 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45322","21.721756","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45323","21.725249","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45324","21.725259","172.30.1.205","172.30.1.104","TCP","54","39382 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45325","21.726222","172.30.1.205","172.30.1.104","TCP","74","46748 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924952 TSecr=0 WS=128" "45326","21.726528","172.30.1.104","172.30.1.205","TCP","66","135 > 46748 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45327","21.726538","172.30.1.205","172.30.1.104","TCP","54","46748 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45328","21.726893","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45329","21.727183","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45330","21.727193","172.30.1.205","172.30.1.104","TCP","54","46748 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45331","21.729413","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45332","21.729862","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45333","21.729869","172.30.1.205","172.30.1.104","TCP","54","46748 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45334","21.731687","172.30.1.205","172.30.1.104","TCP","54","46748 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45335","21.731802","172.30.1.205","172.30.1.104","TCP","74","39386 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924958 TSecr=0 WS=128" "45336","21.732056","172.30.1.104","172.30.1.205","TCP","54","135 > 46748 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45337","21.732066","172.30.1.104","172.30.1.205","TCP","54","135 > 46748 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45338","21.732071","172.30.1.205","172.30.1.104","TCP","54","46748 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45339","21.732149","172.30.1.104","172.30.1.205","TCP","66","49671 > 39386 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45340","21.732157","172.30.1.205","172.30.1.104","TCP","54","39386 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45341","21.732502","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45342","21.732792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45343","21.732802","172.30.1.205","172.30.1.104","TCP","54","39386 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45344","21.734718","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45345","21.735101","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45346","21.735108","172.30.1.205","172.30.1.104","TCP","54","39386 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45347","21.736473","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45348","21.739882","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45349","21.739892","172.30.1.205","172.30.1.104","TCP","54","39386 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45350","21.740869","172.30.1.205","172.30.1.104","TCP","74","46752 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924967 TSecr=0 WS=128" "45351","21.741218","172.30.1.104","172.30.1.205","TCP","66","135 > 46752 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45352","21.741230","172.30.1.205","172.30.1.104","TCP","54","46752 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45353","21.741601","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45354","21.741912","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45355","21.741921","172.30.1.205","172.30.1.104","TCP","54","46752 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45356","21.744131","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45357","21.744585","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45358","21.744592","172.30.1.205","172.30.1.104","TCP","54","46752 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45359","21.746423","172.30.1.205","172.30.1.104","TCP","54","46752 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45360","21.746536","172.30.1.205","172.30.1.104","TCP","74","39390 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924972 TSecr=0 WS=128" "45361","21.746699","172.30.1.104","172.30.1.205","TCP","54","135 > 46752 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45362","21.746737","172.30.1.104","172.30.1.205","TCP","54","135 > 46752 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45363","21.746743","172.30.1.205","172.30.1.104","TCP","54","46752 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45364","21.746870","172.30.1.104","172.30.1.205","TCP","66","49671 > 39390 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45365","21.746887","172.30.1.205","172.30.1.104","TCP","54","39390 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45366","21.747296","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45367","21.747659","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45368","21.747667","172.30.1.205","172.30.1.104","TCP","54","39390 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45369","21.749603","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45370","21.750011","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45371","21.750018","172.30.1.205","172.30.1.104","TCP","54","39390 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45372","21.751384","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45373","21.754804","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45374","21.754814","172.30.1.205","172.30.1.104","TCP","54","39390 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45375","21.755790","172.30.1.205","172.30.1.104","TCP","74","46756 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924982 TSecr=0 WS=128" "45376","21.756093","172.30.1.104","172.30.1.205","TCP","66","135 > 46756 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45377","21.756105","172.30.1.205","172.30.1.104","TCP","54","46756 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45378","21.756464","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45379","21.756737","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45380","21.756746","172.30.1.205","172.30.1.104","TCP","54","46756 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45381","21.758984","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45382","21.759364","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45383","21.759371","172.30.1.205","172.30.1.104","TCP","54","46756 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45384","21.761229","172.30.1.205","172.30.1.104","TCP","54","46756 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45385","21.761344","172.30.1.205","172.30.1.104","TCP","74","39394 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499924987 TSecr=0 WS=128" "45386","21.761496","172.30.1.104","172.30.1.205","TCP","54","135 > 46756 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45387","21.761524","172.30.1.104","172.30.1.205","TCP","54","135 > 46756 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45388","21.761530","172.30.1.205","172.30.1.104","TCP","54","46756 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45389","21.761623","172.30.1.104","172.30.1.205","TCP","66","49671 > 39394 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45390","21.761631","172.30.1.205","172.30.1.104","TCP","54","39394 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45391","21.761978","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45392","21.765399","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45393","21.765409","172.30.1.205","172.30.1.104","TCP","54","39394 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45394","21.767302","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45395","21.767707","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45396","21.767714","172.30.1.205","172.30.1.104","TCP","54","39394 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45397","21.769112","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45398","21.773817","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45399","21.773827","172.30.1.205","172.30.1.104","TCP","54","39394 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45400","21.774806","172.30.1.205","172.30.1.104","TCP","74","46760 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925001 TSecr=0 WS=128" "45401","21.775157","172.30.1.104","172.30.1.205","TCP","66","135 > 46760 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45402","21.775168","172.30.1.205","172.30.1.104","TCP","54","46760 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45403","21.775520","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45404","21.775803","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45405","21.775812","172.30.1.205","172.30.1.104","TCP","54","46760 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45406","21.778032","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45407","21.778519","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45408","21.778526","172.30.1.205","172.30.1.104","TCP","54","46760 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45409","21.780365","172.30.1.205","172.30.1.104","TCP","54","46760 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45410","21.780479","172.30.1.205","172.30.1.104","TCP","74","39398 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925006 TSecr=0 WS=128" "45411","21.780693","172.30.1.104","172.30.1.205","TCP","54","135 > 46760 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45412","21.780708","172.30.1.104","172.30.1.205","TCP","54","135 > 46760 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45413","21.780714","172.30.1.205","172.30.1.104","TCP","54","46760 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45414","21.780791","172.30.1.104","172.30.1.205","TCP","66","49671 > 39398 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45415","21.780801","172.30.1.205","172.30.1.104","TCP","54","39398 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45416","21.781159","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45417","21.782104","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45418","21.782111","172.30.1.205","172.30.1.104","TCP","54","39398 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45419","21.783990","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45420","21.784409","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45421","21.784416","172.30.1.205","172.30.1.104","TCP","54","39398 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45422","21.785836","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45423","21.789420","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45424","21.789430","172.30.1.205","172.30.1.104","TCP","54","39398 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45425","21.790456","172.30.1.205","172.30.1.104","TCP","74","46764 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925016 TSecr=0 WS=128" "45426","21.790790","172.30.1.104","172.30.1.205","TCP","66","135 > 46764 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45427","21.790801","172.30.1.205","172.30.1.104","TCP","54","46764 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45428","21.791161","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45429","21.791614","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45430","21.791623","172.30.1.205","172.30.1.104","TCP","54","46764 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45431","21.793888","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45432","21.794395","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45433","21.794401","172.30.1.205","172.30.1.104","TCP","54","46764 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45434","21.796258","172.30.1.205","172.30.1.104","TCP","54","46764 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45435","21.796377","172.30.1.205","172.30.1.104","TCP","74","39402 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925022 TSecr=0 WS=128" "45436","21.796561","172.30.1.104","172.30.1.205","TCP","54","135 > 46764 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45437","21.796614","172.30.1.104","172.30.1.205","TCP","54","135 > 46764 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45438","21.796621","172.30.1.205","172.30.1.104","TCP","54","46764 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45439","21.796698","172.30.1.104","172.30.1.205","TCP","66","49671 > 39402 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45440","21.796706","172.30.1.205","172.30.1.104","TCP","54","39402 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45441","21.797081","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45442","21.797423","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45443","21.797432","172.30.1.205","172.30.1.104","TCP","54","39402 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45444","21.799324","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45445","21.799714","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45446","21.799721","172.30.1.205","172.30.1.104","TCP","54","39402 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45447","21.801120","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45448","21.804837","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45449","21.804847","172.30.1.205","172.30.1.104","TCP","54","39402 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45450","21.805830","172.30.1.205","172.30.1.104","TCP","74","46768 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925032 TSecr=0 WS=128" "45451","21.806189","172.30.1.104","172.30.1.205","TCP","66","135 > 46768 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45452","21.806200","172.30.1.205","172.30.1.104","TCP","54","46768 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45453","21.806555","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45454","21.806882","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45455","21.806892","172.30.1.205","172.30.1.104","TCP","54","46768 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45456","21.809114","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45457","21.809547","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45458","21.809553","172.30.1.205","172.30.1.104","TCP","54","46768 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45459","21.811375","172.30.1.205","172.30.1.104","TCP","54","46768 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45460","21.811486","172.30.1.205","172.30.1.104","TCP","74","39406 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925037 TSecr=0 WS=128" "45461","21.811830","172.30.1.104","172.30.1.205","TCP","66","49671 > 39406 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45462","21.811840","172.30.1.205","172.30.1.104","TCP","54","39406 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45463","21.811858","172.30.1.104","172.30.1.205","TCP","54","135 > 46768 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45464","21.811918","172.30.1.104","172.30.1.205","TCP","54","135 > 46768 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45465","21.811925","172.30.1.205","172.30.1.104","TCP","54","46768 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45466","21.812225","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45467","21.812535","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45468","21.812543","172.30.1.205","172.30.1.104","TCP","54","39406 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45469","21.814434","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45470","21.814830","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45471","21.814837","172.30.1.205","172.30.1.104","TCP","54","39406 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45472","21.816197","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45473","21.819709","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45474","21.819719","172.30.1.205","172.30.1.104","TCP","54","39406 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45475","21.820671","172.30.1.205","172.30.1.104","TCP","74","46772 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925047 TSecr=0 WS=128" "45476","21.821007","172.30.1.104","172.30.1.205","TCP","66","135 > 46772 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45477","21.821018","172.30.1.205","172.30.1.104","TCP","54","46772 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45478","21.821384","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45479","21.821714","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45480","21.821724","172.30.1.205","172.30.1.104","TCP","54","46772 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45481","21.823927","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45482","21.824359","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45483","21.824366","172.30.1.205","172.30.1.104","TCP","54","46772 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45484","21.826195","172.30.1.205","172.30.1.104","TCP","54","46772 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45485","21.826311","172.30.1.205","172.30.1.104","TCP","74","39410 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925052 TSecr=0 WS=128" "45486","21.826471","172.30.1.104","172.30.1.205","TCP","54","135 > 46772 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45487","21.826502","172.30.1.104","172.30.1.205","TCP","54","135 > 46772 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45488","21.826508","172.30.1.205","172.30.1.104","TCP","54","46772 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45489","21.826591","172.30.1.104","172.30.1.205","TCP","66","49671 > 39410 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45490","21.826599","172.30.1.205","172.30.1.104","TCP","54","39410 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45491","21.826945","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45492","21.827258","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45493","21.827269","172.30.1.205","172.30.1.104","TCP","54","39410 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45494","21.829197","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45495","21.829599","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45496","21.829609","172.30.1.205","172.30.1.104","TCP","54","39410 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45497","21.831058","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45498","21.834625","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45499","21.834637","172.30.1.205","172.30.1.104","TCP","54","39410 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45500","21.835628","172.30.1.205","172.30.1.104","TCP","74","46776 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925062 TSecr=0 WS=128" "45501","21.835966","172.30.1.104","172.30.1.205","TCP","66","135 > 46776 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45502","21.835978","172.30.1.205","172.30.1.104","TCP","54","46776 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45503","21.836331","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45504","21.836632","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45505","21.836641","172.30.1.205","172.30.1.104","TCP","54","46776 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45506","21.838859","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45507","21.839305","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45508","21.839312","172.30.1.205","172.30.1.104","TCP","54","46776 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45509","21.841171","172.30.1.205","172.30.1.104","TCP","54","46776 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45510","21.841288","172.30.1.205","172.30.1.104","TCP","74","39414 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925067 TSecr=0 WS=128" "45511","21.841476","172.30.1.104","172.30.1.205","TCP","54","135 > 46776 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45512","21.841522","172.30.1.104","172.30.1.205","TCP","54","135 > 46776 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45513","21.841528","172.30.1.205","172.30.1.104","TCP","54","46776 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45514","21.841638","172.30.1.104","172.30.1.205","TCP","66","49671 > 39414 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45515","21.841647","172.30.1.205","172.30.1.104","TCP","54","39414 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45516","21.841994","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45517","21.842292","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45518","21.842301","172.30.1.205","172.30.1.104","TCP","54","39414 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45519","21.844189","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45520","21.844869","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45521","21.844877","172.30.1.205","172.30.1.104","TCP","54","39414 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45522","21.846237","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45523","21.849844","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45524","21.849855","172.30.1.205","172.30.1.104","TCP","54","39414 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45525","21.850830","172.30.1.205","172.30.1.104","TCP","74","46780 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925077 TSecr=0 WS=128" "45526","21.851417","172.30.1.104","172.30.1.205","TCP","66","135 > 46780 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45527","21.851428","172.30.1.205","172.30.1.104","TCP","54","46780 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45528","21.851781","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45529","21.852119","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45530","21.852128","172.30.1.205","172.30.1.104","TCP","54","46780 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45531","21.854358","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45532","21.854812","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45533","21.854819","172.30.1.205","172.30.1.104","TCP","54","46780 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45534","21.856668","172.30.1.205","172.30.1.104","TCP","54","46780 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45535","21.856806","172.30.1.205","172.30.1.104","TCP","74","39418 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925083 TSecr=0 WS=128" "45536","21.856959","172.30.1.104","172.30.1.205","TCP","54","135 > 46780 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45537","21.857002","172.30.1.104","172.30.1.205","TCP","54","135 > 46780 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45538","21.857008","172.30.1.205","172.30.1.104","TCP","54","46780 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45539","21.857112","172.30.1.104","172.30.1.205","TCP","66","49671 > 39418 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45540","21.857121","172.30.1.205","172.30.1.104","TCP","54","39418 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45541","21.857469","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45542","21.857789","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45543","21.857798","172.30.1.205","172.30.1.104","TCP","54","39418 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45544","21.859663","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45545","21.860180","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45546","21.860187","172.30.1.205","172.30.1.104","TCP","54","39418 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45547","21.861572","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45548","21.865164","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45549","21.865174","172.30.1.205","172.30.1.104","TCP","54","39418 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45550","21.866130","172.30.1.205","172.30.1.104","TCP","74","46784 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925092 TSecr=0 WS=128" "45551","21.866475","172.30.1.104","172.30.1.205","TCP","66","135 > 46784 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45552","21.866486","172.30.1.205","172.30.1.104","TCP","54","46784 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45553","21.866842","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45554","21.867212","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45555","21.867221","172.30.1.205","172.30.1.104","TCP","54","46784 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45556","21.869454","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45557","21.869905","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45558","21.869911","172.30.1.205","172.30.1.104","TCP","54","46784 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45559","21.871726","172.30.1.205","172.30.1.104","TCP","54","46784 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45560","21.871840","172.30.1.205","172.30.1.104","TCP","74","39422 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925098 TSecr=0 WS=128" "45561","21.872005","172.30.1.104","172.30.1.205","TCP","54","135 > 46784 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45562","21.872043","172.30.1.104","172.30.1.205","TCP","54","135 > 46784 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45563","21.872048","172.30.1.205","172.30.1.104","TCP","54","46784 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45564","21.872136","172.30.1.104","172.30.1.205","TCP","66","49671 > 39422 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45565","21.872144","172.30.1.205","172.30.1.104","TCP","54","39422 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45566","21.872495","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45567","21.872801","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45568","21.872811","172.30.1.205","172.30.1.104","TCP","54","39422 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45569","21.874723","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45570","21.875146","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45571","21.875152","172.30.1.205","172.30.1.104","TCP","54","39422 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45572","21.876502","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45573","21.880140","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45574","21.880154","172.30.1.205","172.30.1.104","TCP","54","39422 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45575","21.881152","172.30.1.205","172.30.1.104","TCP","74","46788 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925107 TSecr=0 WS=128" "45576","21.881478","172.30.1.104","172.30.1.205","TCP","66","135 > 46788 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45577","21.881489","172.30.1.205","172.30.1.104","TCP","54","46788 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45578","21.881844","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45579","21.882204","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45580","21.882214","172.30.1.205","172.30.1.104","TCP","54","46788 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45581","21.884417","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45582","21.884885","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45583","21.884892","172.30.1.205","172.30.1.104","TCP","54","46788 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45584","21.886726","172.30.1.205","172.30.1.104","TCP","54","46788 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45585","21.886839","172.30.1.205","172.30.1.104","TCP","74","39426 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925113 TSecr=0 WS=128" "45586","21.887013","172.30.1.104","172.30.1.205","TCP","54","135 > 46788 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45587","21.887093","172.30.1.104","172.30.1.205","TCP","54","135 > 46788 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45588","21.887099","172.30.1.205","172.30.1.104","TCP","54","46788 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45589","21.887196","172.30.1.104","172.30.1.205","TCP","66","49671 > 39426 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45590","21.887204","172.30.1.205","172.30.1.104","TCP","54","39426 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45591","21.887565","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45592","21.887905","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45593","21.887913","172.30.1.205","172.30.1.104","TCP","54","39426 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45594","21.889803","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45595","21.891175","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45596","21.891182","172.30.1.205","172.30.1.104","TCP","54","39426 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45597","21.892536","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45598","21.896102","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45599","21.896112","172.30.1.205","172.30.1.104","TCP","54","39426 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45600","21.897092","172.30.1.205","172.30.1.104","TCP","74","46792 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925123 TSecr=0 WS=128" "45601","21.897458","172.30.1.104","172.30.1.205","TCP","66","135 > 46792 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45602","21.897471","172.30.1.205","172.30.1.104","TCP","54","46792 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45603","21.897852","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45604","21.898195","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45605","21.898204","172.30.1.205","172.30.1.104","TCP","54","46792 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45606","21.900411","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45607","21.900924","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45608","21.900931","172.30.1.205","172.30.1.104","TCP","54","46792 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45609","21.901789","172.30.1.205","172.30.1.104","TCP","54","39386 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45610","21.901837","172.30.1.205","172.30.1.104","TCP","54","39390 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45611","21.901869","172.30.1.205","172.30.1.104","TCP","54","39394 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45612","21.901906","172.30.1.205","172.30.1.104","TCP","54","39398 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45613","21.901949","172.30.1.205","172.30.1.104","TCP","54","39402 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45614","21.901977","172.30.1.205","172.30.1.104","TCP","54","39406 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45615","21.902003","172.30.1.205","172.30.1.104","TCP","54","39410 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45616","21.902043","172.30.1.205","172.30.1.104","TCP","54","39414 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45617","21.902065","172.30.1.205","172.30.1.104","TCP","54","39418 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45618","21.902081","172.30.1.104","172.30.1.205","TCP","54","49671 > 39386 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45619","21.902117","172.30.1.205","172.30.1.104","TCP","54","39422 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45620","21.902141","172.30.1.205","172.30.1.104","TCP","54","39426 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45621","21.902165","172.30.1.104","172.30.1.205","TCP","54","49671 > 39390 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45622","21.902232","172.30.1.205","172.30.1.104","TCP","54","39382 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45623","21.902549","172.30.1.104","172.30.1.205","TCP","54","49671 > 39394 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45624","21.902574","172.30.1.104","172.30.1.205","TCP","54","49671 > 39398 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45625","21.902601","172.30.1.104","172.30.1.205","TCP","54","49671 > 39402 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45626","21.902628","172.30.1.104","172.30.1.205","TCP","54","49671 > 39406 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45627","21.902671","172.30.1.104","172.30.1.205","TCP","54","49671 > 39410 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45628","21.902677","172.30.1.104","172.30.1.205","TCP","54","49671 > 39414 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45629","21.902718","172.30.1.104","172.30.1.205","TCP","54","49671 > 39418 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45630","21.902744","172.30.1.104","172.30.1.205","TCP","54","49671 > 39422 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45631","21.902776","172.30.1.104","172.30.1.205","TCP","54","49671 > 39426 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45632","21.902804","172.30.1.104","172.30.1.205","TCP","54","49671 > 39382 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45633","21.902832","172.30.1.104","172.30.1.205","TCP","54","49671 > 39382 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45634","21.902839","172.30.1.205","172.30.1.104","TCP","54","39382 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45635","21.902866","172.30.1.104","172.30.1.205","TCP","54","49671 > 39426 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45636","21.902870","172.30.1.205","172.30.1.104","TCP","54","39426 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45637","21.902898","172.30.1.104","172.30.1.205","TCP","54","49671 > 39422 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45638","21.902902","172.30.1.205","172.30.1.104","TCP","54","39422 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45639","21.902923","172.30.1.104","172.30.1.205","TCP","54","49671 > 39418 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45640","21.902927","172.30.1.205","172.30.1.104","TCP","54","39418 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45641","21.902951","172.30.1.104","172.30.1.205","TCP","54","49671 > 39414 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45642","21.902954","172.30.1.205","172.30.1.104","TCP","54","39414 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45643","21.902986","172.30.1.104","172.30.1.205","TCP","54","49671 > 39410 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45644","21.902989","172.30.1.205","172.30.1.104","TCP","54","39410 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45645","21.903010","172.30.1.104","172.30.1.205","TCP","54","49671 > 39406 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45646","21.903013","172.30.1.205","172.30.1.104","TCP","54","39406 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45647","21.903168","172.30.1.104","172.30.1.205","TCP","54","49671 > 39402 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45648","21.903171","172.30.1.205","172.30.1.104","TCP","54","39402 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45649","21.903194","172.30.1.104","172.30.1.205","TCP","54","49671 > 39398 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45650","21.903197","172.30.1.205","172.30.1.104","TCP","54","39398 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45651","21.903229","172.30.1.104","172.30.1.205","TCP","54","49671 > 39386 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45652","21.903232","172.30.1.205","172.30.1.104","TCP","54","39386 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45653","21.903254","172.30.1.104","172.30.1.205","TCP","54","49671 > 39390 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45654","21.903257","172.30.1.205","172.30.1.104","TCP","54","39390 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45655","21.903281","172.30.1.104","172.30.1.205","TCP","54","49671 > 39394 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45656","21.903293","172.30.1.205","172.30.1.104","TCP","54","39394 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45657","21.903900","172.30.1.205","172.30.1.104","TCP","54","46792 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45658","21.904015","172.30.1.205","172.30.1.104","TCP","74","39430 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925130 TSecr=0 WS=128" "45659","21.904167","172.30.1.104","172.30.1.205","TCP","54","135 > 46792 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45660","21.904190","172.30.1.104","172.30.1.205","TCP","54","135 > 46792 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45661","21.904195","172.30.1.205","172.30.1.104","TCP","54","46792 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45662","21.904304","172.30.1.104","172.30.1.205","TCP","66","49671 > 39430 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45663","21.904312","172.30.1.205","172.30.1.104","TCP","54","39430 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45664","21.904671","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45665","21.904991","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45666","21.905001","172.30.1.205","172.30.1.104","TCP","54","39430 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45667","21.906896","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45668","21.907277","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45669","21.907285","172.30.1.205","172.30.1.104","TCP","54","39430 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45670","21.908678","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45671","21.912168","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45672","21.912178","172.30.1.205","172.30.1.104","TCP","54","39430 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45673","21.913177","172.30.1.205","172.30.1.104","TCP","74","46796 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925139 TSecr=0 WS=128" "45674","21.913508","172.30.1.104","172.30.1.205","TCP","66","135 > 46796 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45675","21.913519","172.30.1.205","172.30.1.104","TCP","54","46796 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45676","21.913877","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45677","21.914189","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45678","21.914199","172.30.1.205","172.30.1.104","TCP","54","46796 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45679","21.916393","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45680","21.916810","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45681","21.916818","172.30.1.205","172.30.1.104","TCP","54","46796 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45682","21.918665","172.30.1.205","172.30.1.104","TCP","54","46796 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45683","21.918783","172.30.1.205","172.30.1.104","TCP","74","39434 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925145 TSecr=0 WS=128" "45684","21.919011","172.30.1.104","172.30.1.205","TCP","54","135 > 46796 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45685","21.919067","172.30.1.104","172.30.1.205","TCP","54","135 > 46796 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45686","21.919074","172.30.1.205","172.30.1.104","TCP","54","46796 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45687","21.919184","172.30.1.104","172.30.1.205","TCP","66","49671 > 39434 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45688","21.919193","172.30.1.205","172.30.1.104","TCP","54","39434 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45689","21.919537","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45690","21.919850","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45691","21.919859","172.30.1.205","172.30.1.104","TCP","54","39434 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45692","21.921772","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45693","21.922140","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45694","21.922147","172.30.1.205","172.30.1.104","TCP","54","39434 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45695","21.923494","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45696","21.926942","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45697","21.926955","172.30.1.205","172.30.1.104","TCP","54","39434 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45698","21.927971","172.30.1.205","172.30.1.104","TCP","74","46800 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925154 TSecr=0 WS=128" "45699","21.928286","172.30.1.104","172.30.1.205","TCP","66","135 > 46800 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45700","21.928307","172.30.1.205","172.30.1.104","TCP","54","46800 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45701","21.928661","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45702","21.929030","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45703","21.929040","172.30.1.205","172.30.1.104","TCP","54","46800 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45704","21.931280","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45705","21.931675","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45706","21.931682","172.30.1.205","172.30.1.104","TCP","54","46800 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45707","21.933533","172.30.1.205","172.30.1.104","TCP","54","46800 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45708","21.933665","172.30.1.205","172.30.1.104","TCP","74","39438 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925160 TSecr=0 WS=128" "45709","21.933852","172.30.1.104","172.30.1.205","TCP","54","135 > 46800 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45710","21.933903","172.30.1.104","172.30.1.205","TCP","54","135 > 46800 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45711","21.933910","172.30.1.205","172.30.1.104","TCP","54","46800 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45712","21.934049","172.30.1.104","172.30.1.205","TCP","66","49671 > 39438 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45713","21.934058","172.30.1.205","172.30.1.104","TCP","54","39438 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45714","21.934406","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45715","21.934715","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45716","21.934724","172.30.1.205","172.30.1.104","TCP","54","39438 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45717","21.936623","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45718","21.936977","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45719","21.936984","172.30.1.205","172.30.1.104","TCP","54","39438 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45720","21.938359","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45721","21.941737","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45722","21.941748","172.30.1.205","172.30.1.104","TCP","54","39438 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45723","21.942783","172.30.1.205","172.30.1.104","TCP","74","46804 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925169 TSecr=0 WS=128" "45724","21.943078","172.30.1.104","172.30.1.205","TCP","66","135 > 46804 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45725","21.943090","172.30.1.205","172.30.1.104","TCP","54","46804 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45726","21.943443","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45727","21.943744","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45728","21.943752","172.30.1.205","172.30.1.104","TCP","54","46804 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45729","21.946013","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45730","21.946420","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45731","21.946427","172.30.1.205","172.30.1.104","TCP","54","46804 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45732","21.948265","172.30.1.205","172.30.1.104","TCP","54","46804 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45733","21.948380","172.30.1.205","172.30.1.104","TCP","74","39442 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925174 TSecr=0 WS=128" "45734","21.948537","172.30.1.104","172.30.1.205","TCP","54","135 > 46804 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45735","21.948619","172.30.1.104","172.30.1.205","TCP","54","135 > 46804 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45736","21.948626","172.30.1.205","172.30.1.104","TCP","54","46804 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45737","21.948696","172.30.1.104","172.30.1.205","TCP","66","49671 > 39442 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45738","21.948704","172.30.1.205","172.30.1.104","TCP","54","39442 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45739","21.949077","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45740","21.949394","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45741","21.949404","172.30.1.205","172.30.1.104","TCP","54","39442 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45742","21.951284","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45743","21.951674","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45744","21.951680","172.30.1.205","172.30.1.104","TCP","54","39442 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45745","21.953072","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45746","21.956557","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45747","21.956571","172.30.1.205","172.30.1.104","TCP","54","39442 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45748","21.957611","172.30.1.205","172.30.1.104","TCP","74","46808 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925184 TSecr=0 WS=128" "45749","21.957947","172.30.1.104","172.30.1.205","TCP","66","135 > 46808 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45750","21.957958","172.30.1.205","172.30.1.104","TCP","54","46808 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45751","21.958313","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45752","21.958609","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45753","21.958619","172.30.1.205","172.30.1.104","TCP","54","46808 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45754","21.960835","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45755","21.961265","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45756","21.961274","172.30.1.205","172.30.1.104","TCP","54","46808 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45757","21.963156","172.30.1.205","172.30.1.104","TCP","54","46808 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45758","21.963273","172.30.1.205","172.30.1.104","TCP","74","39446 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925189 TSecr=0 WS=128" "45759","21.963431","172.30.1.104","172.30.1.205","TCP","54","135 > 46808 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45760","21.963492","172.30.1.104","172.30.1.205","TCP","54","135 > 46808 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45761","21.963499","172.30.1.205","172.30.1.104","TCP","54","46808 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45762","21.963585","172.30.1.104","172.30.1.205","TCP","66","49671 > 39446 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45763","21.963594","172.30.1.205","172.30.1.104","TCP","54","39446 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45764","21.963946","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45765","21.964258","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45766","21.964267","172.30.1.205","172.30.1.104","TCP","54","39446 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45767","21.966161","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45768","21.966556","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45769","21.966563","172.30.1.205","172.30.1.104","TCP","54","39446 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45770","21.967915","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45771","21.971480","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45772","21.971490","172.30.1.205","172.30.1.104","TCP","54","39446 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45773","21.972442","172.30.1.205","172.30.1.104","TCP","74","46812 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925198 TSecr=0 WS=128" "45774","21.972743","172.30.1.104","172.30.1.205","TCP","66","135 > 46812 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45775","21.972754","172.30.1.205","172.30.1.104","TCP","54","46812 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45776","21.973124","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45777","21.973434","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45778","21.973444","172.30.1.205","172.30.1.104","TCP","54","46812 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45779","21.975640","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45780","21.976134","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45781","21.976141","172.30.1.205","172.30.1.104","TCP","54","46812 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45782","21.977995","172.30.1.205","172.30.1.104","TCP","54","46812 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45783","21.978109","172.30.1.205","172.30.1.104","TCP","74","39450 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925204 TSecr=0 WS=128" "45784","21.978269","172.30.1.104","172.30.1.205","TCP","54","135 > 46812 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45785","21.978303","172.30.1.104","172.30.1.205","TCP","54","135 > 46812 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45786","21.978309","172.30.1.205","172.30.1.104","TCP","54","46812 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45787","21.978409","172.30.1.104","172.30.1.205","TCP","66","49671 > 39450 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45788","21.978418","172.30.1.205","172.30.1.104","TCP","54","39450 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45789","21.978765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45790","21.979092","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45791","21.979104","172.30.1.205","172.30.1.104","TCP","54","39450 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45792","21.981017","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45793","21.981374","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45794","21.981380","172.30.1.205","172.30.1.104","TCP","54","39450 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45795","21.982741","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45796","21.986224","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45797","21.986233","172.30.1.205","172.30.1.104","TCP","54","39450 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45798","21.987202","172.30.1.205","172.30.1.104","TCP","74","46816 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925213 TSecr=0 WS=128" "45799","21.987533","172.30.1.104","172.30.1.205","TCP","66","135 > 46816 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45800","21.987544","172.30.1.205","172.30.1.104","TCP","54","46816 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45801","21.987903","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45802","21.988200","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45803","21.988210","172.30.1.205","172.30.1.104","TCP","54","46816 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45804","21.990445","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45805","21.990841","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45806","21.990848","172.30.1.205","172.30.1.104","TCP","54","46816 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45807","21.992663","172.30.1.205","172.30.1.104","TCP","54","46816 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45808","21.992791","172.30.1.205","172.30.1.104","TCP","74","39454 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925219 TSecr=0 WS=128" "45809","21.992943","172.30.1.104","172.30.1.205","TCP","54","135 > 46816 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45810","21.992987","172.30.1.104","172.30.1.205","TCP","54","135 > 46816 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45811","21.992992","172.30.1.205","172.30.1.104","TCP","54","46816 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45812","21.993083","172.30.1.104","172.30.1.205","TCP","66","49671 > 39454 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45813","21.993091","172.30.1.205","172.30.1.104","TCP","54","39454 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45814","21.993436","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45815","21.993744","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45816","21.993753","172.30.1.205","172.30.1.104","TCP","54","39454 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45817","21.995623","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45818","21.995990","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45819","21.995997","172.30.1.205","172.30.1.104","TCP","54","39454 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45820","21.997394","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45821","22.000896","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45822","22.000905","172.30.1.205","172.30.1.104","TCP","54","39454 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45823","22.001868","172.30.1.205","172.30.1.104","TCP","74","46820 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925228 TSecr=0 WS=128" "45824","22.002193","172.30.1.104","172.30.1.205","TCP","66","135 > 46820 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45825","22.002204","172.30.1.205","172.30.1.104","TCP","54","46820 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45826","22.002562","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45827","22.002910","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45828","22.002919","172.30.1.205","172.30.1.104","TCP","54","46820 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45829","22.005166","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45830","22.005554","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45831","22.005561","172.30.1.205","172.30.1.104","TCP","54","46820 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45832","22.007390","172.30.1.205","172.30.1.104","TCP","54","46820 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45833","22.007509","172.30.1.205","172.30.1.104","TCP","74","39458 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925233 TSecr=0 WS=128" "45834","22.007660","172.30.1.104","172.30.1.205","TCP","54","135 > 46820 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45835","22.007698","172.30.1.104","172.30.1.205","TCP","54","135 > 46820 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45836","22.007704","172.30.1.205","172.30.1.104","TCP","54","46820 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45837","22.007797","172.30.1.104","172.30.1.205","TCP","66","49671 > 39458 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45838","22.007805","172.30.1.205","172.30.1.104","TCP","54","39458 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45839","22.008169","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45840","22.009440","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45841","22.009448","172.30.1.205","172.30.1.104","TCP","54","39458 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45842","22.011333","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45843","22.011708","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45844","22.011719","172.30.1.205","172.30.1.104","TCP","54","39458 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45845","22.013244","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45846","22.016792","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45847","22.016804","172.30.1.205","172.30.1.104","TCP","54","39458 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45848","22.017842","172.30.1.205","172.30.1.104","TCP","74","46824 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925244 TSecr=0 WS=128" "45849","22.018181","172.30.1.104","172.30.1.205","TCP","66","135 > 46824 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45850","22.018196","172.30.1.205","172.30.1.104","TCP","54","46824 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45851","22.018570","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45852","22.018930","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45853","22.018944","172.30.1.205","172.30.1.104","TCP","54","46824 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45854","22.021293","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45855","22.021735","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45856","22.021743","172.30.1.205","172.30.1.104","TCP","54","46824 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45857","22.023572","172.30.1.205","172.30.1.104","TCP","54","46824 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45858","22.023689","172.30.1.205","172.30.1.104","TCP","74","39462 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925250 TSecr=0 WS=128" "45859","22.023855","172.30.1.104","172.30.1.205","TCP","54","135 > 46824 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45860","22.023893","172.30.1.104","172.30.1.205","TCP","54","135 > 46824 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45861","22.023900","172.30.1.205","172.30.1.104","TCP","54","46824 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45862","22.024009","172.30.1.104","172.30.1.205","TCP","66","49671 > 39462 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45863","22.024017","172.30.1.205","172.30.1.104","TCP","54","39462 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45864","22.024366","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45865","22.024659","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45866","22.024668","172.30.1.205","172.30.1.104","TCP","54","39462 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45867","22.026578","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45868","22.026957","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45869","22.026968","172.30.1.205","172.30.1.104","TCP","54","39462 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45870","22.028616","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45871","22.032120","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45872","22.032132","172.30.1.205","172.30.1.104","TCP","54","39462 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45873","22.033152","172.30.1.205","172.30.1.104","TCP","74","46828 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925259 TSecr=0 WS=128" "45874","22.033485","172.30.1.104","172.30.1.205","TCP","66","135 > 46828 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45875","22.033496","172.30.1.205","172.30.1.104","TCP","54","46828 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45876","22.033854","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45877","22.034226","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45878","22.034237","172.30.1.205","172.30.1.104","TCP","54","46828 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45879","22.036469","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45880","22.036883","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45881","22.036889","172.30.1.205","172.30.1.104","TCP","54","46828 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45882","22.038731","172.30.1.205","172.30.1.104","TCP","54","46828 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45883","22.038856","172.30.1.205","172.30.1.104","TCP","74","39466 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925265 TSecr=0 WS=128" "45884","22.039029","172.30.1.104","172.30.1.205","TCP","54","135 > 46828 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45885","22.039054","172.30.1.104","172.30.1.205","TCP","54","135 > 46828 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45886","22.039060","172.30.1.205","172.30.1.104","TCP","54","46828 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45887","22.039157","172.30.1.104","172.30.1.205","TCP","66","49671 > 39466 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45888","22.039165","172.30.1.205","172.30.1.104","TCP","54","39466 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45889","22.039512","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45890","22.039816","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45891","22.039823","172.30.1.205","172.30.1.104","TCP","54","39466 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45892","22.041725","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45893","22.042106","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45894","22.042113","172.30.1.205","172.30.1.104","TCP","54","39466 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45895","22.043471","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45896","22.046960","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45897","22.046971","172.30.1.205","172.30.1.104","TCP","54","39466 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45898","22.047936","172.30.1.205","172.30.1.104","TCP","74","46832 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925274 TSecr=0 WS=128" "45899","22.048285","172.30.1.104","172.30.1.205","TCP","66","135 > 46832 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45900","22.048296","172.30.1.205","172.30.1.104","TCP","54","46832 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45901","22.048649","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45902","22.048971","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45903","22.048984","172.30.1.205","172.30.1.104","TCP","54","46832 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45904","22.051273","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45905","22.051750","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45906","22.051757","172.30.1.205","172.30.1.104","TCP","54","46832 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45907","22.053615","172.30.1.205","172.30.1.104","TCP","54","46832 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45908","22.053736","172.30.1.205","172.30.1.104","TCP","74","39470 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925280 TSecr=0 WS=128" "45909","22.053939","172.30.1.104","172.30.1.205","TCP","54","135 > 46832 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45910","22.053983","172.30.1.104","172.30.1.205","TCP","54","135 > 46832 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45911","22.053989","172.30.1.205","172.30.1.104","TCP","54","46832 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45912","22.054090","172.30.1.104","172.30.1.205","TCP","66","49671 > 39470 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45913","22.054098","172.30.1.205","172.30.1.104","TCP","54","39470 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45914","22.054450","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45915","22.055715","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45916","22.055722","172.30.1.205","172.30.1.104","TCP","54","39470 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45917","22.057626","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45918","22.058066","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45919","22.058073","172.30.1.205","172.30.1.104","TCP","54","39470 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45920","22.059414","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45921","22.063025","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45922","22.063034","172.30.1.205","172.30.1.104","TCP","54","39470 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45923","22.063992","172.30.1.205","172.30.1.104","TCP","74","46836 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925290 TSecr=0 WS=128" "45924","22.064331","172.30.1.104","172.30.1.205","TCP","66","135 > 46836 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45925","22.064349","172.30.1.205","172.30.1.104","TCP","54","46836 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45926","22.064693","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45927","22.065062","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45928","22.065072","172.30.1.205","172.30.1.104","TCP","54","46836 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45929","22.067255","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45930","22.067716","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45931","22.067722","172.30.1.205","172.30.1.104","TCP","54","46836 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45932","22.069562","172.30.1.205","172.30.1.104","TCP","54","46836 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "45933","22.069672","172.30.1.205","172.30.1.104","TCP","74","39474 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925296 TSecr=0 WS=128" "45934","22.069827","172.30.1.104","172.30.1.205","TCP","54","135 > 46836 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45935","22.069865","172.30.1.104","172.30.1.205","TCP","54","135 > 46836 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "45936","22.069871","172.30.1.205","172.30.1.104","TCP","54","46836 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "45937","22.069979","172.30.1.104","172.30.1.205","TCP","66","49671 > 39474 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45938","22.069987","172.30.1.205","172.30.1.104","TCP","54","39474 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45939","22.070328","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "45940","22.070635","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45941","22.070643","172.30.1.205","172.30.1.104","TCP","54","39474 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45942","22.072520","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "45943","22.072913","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "45944","22.072920","172.30.1.205","172.30.1.104","TCP","54","39474 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "45945","22.074278","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "45946","22.077937","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "45947","22.077947","172.30.1.205","172.30.1.104","TCP","54","39474 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "45948","22.078937","172.30.1.205","172.30.1.104","TCP","74","46840 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925305 TSecr=0 WS=128" "45949","22.079263","172.30.1.104","172.30.1.205","TCP","66","135 > 46840 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "45950","22.079275","172.30.1.205","172.30.1.104","TCP","54","46840 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "45951","22.079621","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "45952","22.079914","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "45953","22.079924","172.30.1.205","172.30.1.104","TCP","54","46840 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "45954","22.082174","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "45955","22.082598","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "45956","22.082604","172.30.1.205","172.30.1.104","TCP","54","46840 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "45957","22.083452","172.30.1.205","172.30.1.104","TCP","54","39434 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45958","22.083501","172.30.1.205","172.30.1.104","TCP","54","39438 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45959","22.083537","172.30.1.205","172.30.1.104","TCP","54","39442 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45960","22.083569","172.30.1.205","172.30.1.104","TCP","54","39446 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45961","22.083600","172.30.1.205","172.30.1.104","TCP","54","39450 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45962","22.083631","172.30.1.205","172.30.1.104","TCP","54","39454 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45963","22.083661","172.30.1.205","172.30.1.104","TCP","54","39458 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45964","22.083692","172.30.1.205","172.30.1.104","TCP","54","39462 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45965","22.083723","172.30.1.205","172.30.1.104","TCP","54","39466 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45966","22.083755","172.30.1.205","172.30.1.104","TCP","54","39470 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45967","22.083792","172.30.1.205","172.30.1.104","TCP","54","39474 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45968","22.083865","172.30.1.205","172.30.1.104","TCP","54","39430 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "45969","22.084183","172.30.1.104","172.30.1.205","TCP","54","49671 > 39434 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45970","22.084197","172.30.1.104","172.30.1.205","TCP","54","49671 > 39438 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45971","22.084200","172.30.1.104","172.30.1.205","TCP","54","49671 > 39442 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45972","22.084207","172.30.1.104","172.30.1.205","TCP","54","49671 > 39446 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45973","22.084295","172.30.1.104","172.30.1.205","TCP","54","49671 > 39450 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45974","22.084299","172.30.1.104","172.30.1.205","TCP","54","49671 > 39454 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45975","22.084304","172.30.1.104","172.30.1.205","TCP","54","49671 > 39458 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45976","22.084541","172.30.1.104","172.30.1.205","TCP","54","49671 > 39462 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45977","22.084547","172.30.1.104","172.30.1.205","TCP","54","49671 > 39466 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45978","22.084549","172.30.1.104","172.30.1.205","TCP","54","49671 > 39470 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45979","22.084557","172.30.1.104","172.30.1.205","TCP","54","49671 > 39474 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45980","22.084559","172.30.1.104","172.30.1.205","TCP","54","49671 > 39430 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45981","22.084561","172.30.1.104","172.30.1.205","TCP","54","49671 > 39430 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45982","22.084569","172.30.1.205","172.30.1.104","TCP","54","39430 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45983","22.084575","172.30.1.104","172.30.1.205","TCP","54","49671 > 39474 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45984","22.084577","172.30.1.205","172.30.1.104","TCP","54","39474 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45985","22.084579","172.30.1.104","172.30.1.205","TCP","54","49671 > 39470 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45986","22.084581","172.30.1.205","172.30.1.104","TCP","54","39470 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45987","22.084582","172.30.1.104","172.30.1.205","TCP","54","49671 > 39466 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45988","22.084583","172.30.1.205","172.30.1.104","TCP","54","39466 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45989","22.084820","172.30.1.104","172.30.1.205","TCP","54","49671 > 39462 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45990","22.084826","172.30.1.205","172.30.1.104","TCP","54","39462 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45991","22.084832","172.30.1.104","172.30.1.205","TCP","54","49671 > 39458 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45992","22.084834","172.30.1.205","172.30.1.104","TCP","54","39458 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45993","22.084836","172.30.1.104","172.30.1.205","TCP","54","49671 > 39454 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45994","22.084837","172.30.1.205","172.30.1.104","TCP","54","39454 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45995","22.084838","172.30.1.104","172.30.1.205","TCP","54","49671 > 39450 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45996","22.084840","172.30.1.205","172.30.1.104","TCP","54","39450 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45997","22.084842","172.30.1.104","172.30.1.205","TCP","54","49671 > 39446 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "45998","22.084843","172.30.1.205","172.30.1.104","TCP","54","39446 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "45999","22.084845","172.30.1.104","172.30.1.205","TCP","54","49671 > 39434 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46000","22.084851","172.30.1.205","172.30.1.104","TCP","54","39434 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46001","22.084852","172.30.1.104","172.30.1.205","TCP","54","49671 > 39438 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46002","22.084854","172.30.1.205","172.30.1.104","TCP","54","39438 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46003","22.084855","172.30.1.104","172.30.1.205","TCP","54","49671 > 39442 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46004","22.084857","172.30.1.205","172.30.1.104","TCP","54","39442 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46005","22.085345","172.30.1.205","172.30.1.104","TCP","54","46840 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46006","22.085455","172.30.1.205","172.30.1.104","TCP","74","39478 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925311 TSecr=0 WS=128" "46007","22.085610","172.30.1.104","172.30.1.205","TCP","54","135 > 46840 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46008","22.085647","172.30.1.104","172.30.1.205","TCP","54","135 > 46840 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46009","22.085652","172.30.1.205","172.30.1.104","TCP","54","46840 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46010","22.085752","172.30.1.104","172.30.1.205","TCP","66","49671 > 39478 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46011","22.085760","172.30.1.205","172.30.1.104","TCP","54","39478 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46012","22.086109","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46013","22.086425","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46014","22.086433","172.30.1.205","172.30.1.104","TCP","54","39478 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46015","22.088301","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46016","22.088669","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46017","22.088676","172.30.1.205","172.30.1.104","TCP","54","39478 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46018","22.090052","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46019","22.093504","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46020","22.093514","172.30.1.205","172.30.1.104","TCP","54","39478 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46021","22.094466","172.30.1.205","172.30.1.104","TCP","74","46844 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925320 TSecr=0 WS=128" "46022","22.094766","172.30.1.104","172.30.1.205","TCP","66","135 > 46844 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46023","22.094776","172.30.1.205","172.30.1.104","TCP","54","46844 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46024","22.095126","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46025","22.095418","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46026","22.095426","172.30.1.205","172.30.1.104","TCP","54","46844 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46027","22.097622","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46028","22.098119","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46029","22.098126","172.30.1.205","172.30.1.104","TCP","54","46844 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46030","22.099946","172.30.1.205","172.30.1.104","TCP","54","46844 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46031","22.100055","172.30.1.205","172.30.1.104","TCP","74","39482 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925326 TSecr=0 WS=128" "46032","22.100281","172.30.1.104","172.30.1.205","TCP","54","135 > 46844 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46033","22.100351","172.30.1.104","172.30.1.205","TCP","54","135 > 46844 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46034","22.100357","172.30.1.205","172.30.1.104","TCP","54","46844 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46035","22.100476","172.30.1.104","172.30.1.205","TCP","66","49671 > 39482 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46036","22.100484","172.30.1.205","172.30.1.104","TCP","54","39482 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46037","22.100849","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46038","22.101180","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46039","22.101188","172.30.1.205","172.30.1.104","TCP","54","39482 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46040","22.103110","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46041","22.103522","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46042","22.103527","172.30.1.205","172.30.1.104","TCP","54","39482 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46043","22.104886","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46044","22.108416","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46045","22.108425","172.30.1.205","172.30.1.104","TCP","54","39482 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46046","22.109397","172.30.1.205","172.30.1.104","TCP","74","46848 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925335 TSecr=0 WS=128" "46047","22.109698","172.30.1.104","172.30.1.205","TCP","66","135 > 46848 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46048","22.109709","172.30.1.205","172.30.1.104","TCP","54","46848 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46049","22.110082","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46050","22.110369","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46051","22.110378","172.30.1.205","172.30.1.104","TCP","54","46848 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46052","22.112566","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46053","22.113034","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46054","22.113040","172.30.1.205","172.30.1.104","TCP","54","46848 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46055","22.114844","172.30.1.205","172.30.1.104","TCP","54","46848 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46056","22.114952","172.30.1.205","172.30.1.104","TCP","74","39486 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925341 TSecr=0 WS=128" "46057","22.115214","172.30.1.104","172.30.1.205","TCP","54","135 > 46848 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46058","22.115222","172.30.1.104","172.30.1.205","TCP","54","135 > 46848 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46059","22.115227","172.30.1.205","172.30.1.104","TCP","54","46848 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46060","22.115336","172.30.1.104","172.30.1.205","TCP","66","49671 > 39486 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46061","22.115344","172.30.1.205","172.30.1.104","TCP","54","39486 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46062","22.115687","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46063","22.115982","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46064","22.115991","172.30.1.205","172.30.1.104","TCP","54","39486 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46065","22.117957","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46066","22.118356","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46067","22.118363","172.30.1.205","172.30.1.104","TCP","54","39486 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46068","22.119709","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46069","22.123209","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46070","22.123218","172.30.1.205","172.30.1.104","TCP","54","39486 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46071","22.124161","172.30.1.205","172.30.1.104","TCP","74","46852 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925350 TSecr=0 WS=128" "46072","22.124461","172.30.1.104","172.30.1.205","TCP","66","135 > 46852 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46073","22.124474","172.30.1.205","172.30.1.104","TCP","54","46852 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46074","22.124856","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46075","22.125167","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46076","22.125176","172.30.1.205","172.30.1.104","TCP","54","46852 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46077","22.127356","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46078","22.127780","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46079","22.127786","172.30.1.205","172.30.1.104","TCP","54","46852 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46080","22.129605","172.30.1.205","172.30.1.104","TCP","54","46852 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46081","22.129713","172.30.1.205","172.30.1.104","TCP","74","39490 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925356 TSecr=0 WS=128" "46082","22.129900","172.30.1.104","172.30.1.205","TCP","54","135 > 46852 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46083","22.129978","172.30.1.104","172.30.1.205","TCP","54","135 > 46852 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46084","22.129984","172.30.1.205","172.30.1.104","TCP","54","46852 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46085","22.130089","172.30.1.104","172.30.1.205","TCP","66","49671 > 39490 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46086","22.130097","172.30.1.205","172.30.1.104","TCP","54","39490 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46087","22.130446","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46088","22.131197","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46089","22.131206","172.30.1.205","172.30.1.104","TCP","54","39490 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46090","22.133099","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46091","22.133460","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46092","22.133469","172.30.1.205","172.30.1.104","TCP","54","39490 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46093","22.134921","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46094","22.138599","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46095","22.138614","172.30.1.205","172.30.1.104","TCP","54","39490 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46096","22.139610","172.30.1.205","172.30.1.104","TCP","74","46856 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925366 TSecr=0 WS=128" "46097","22.139949","172.30.1.104","172.30.1.205","TCP","66","135 > 46856 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46098","22.139961","172.30.1.205","172.30.1.104","TCP","54","46856 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46099","22.140318","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46100","22.140677","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46101","22.140686","172.30.1.205","172.30.1.104","TCP","54","46856 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46102","22.142890","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46103","22.143383","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46104","22.143389","172.30.1.205","172.30.1.104","TCP","54","46856 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46105","22.145234","172.30.1.205","172.30.1.104","TCP","54","46856 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46106","22.145344","172.30.1.205","172.30.1.104","TCP","74","39494 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925371 TSecr=0 WS=128" "46107","22.145550","172.30.1.104","172.30.1.205","TCP","54","135 > 46856 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46108","22.145587","172.30.1.104","172.30.1.205","TCP","54","135 > 46856 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46109","22.145593","172.30.1.205","172.30.1.104","TCP","54","46856 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46110","22.145731","172.30.1.104","172.30.1.205","TCP","66","49671 > 39494 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46111","22.145739","172.30.1.205","172.30.1.104","TCP","54","39494 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46112","22.146089","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46113","22.146399","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46114","22.146408","172.30.1.205","172.30.1.104","TCP","54","39494 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46115","22.148265","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46116","22.148654","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46117","22.148661","172.30.1.205","172.30.1.104","TCP","54","39494 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46118","22.150026","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46119","22.153667","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46120","22.153677","172.30.1.205","172.30.1.104","TCP","54","39494 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46121","22.154606","172.30.1.205","172.30.1.104","TCP","74","46860 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925381 TSecr=0 WS=128" "46122","22.154993","172.30.1.104","172.30.1.205","TCP","66","135 > 46860 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46123","22.155004","172.30.1.205","172.30.1.104","TCP","54","46860 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46124","22.155357","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46125","22.155666","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46126","22.155675","172.30.1.205","172.30.1.104","TCP","54","46860 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46127","22.157898","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46128","22.158310","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46129","22.158316","172.30.1.205","172.30.1.104","TCP","54","46860 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46130","22.160149","172.30.1.205","172.30.1.104","TCP","54","46860 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46131","22.160267","172.30.1.205","172.30.1.104","TCP","74","39498 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925386 TSecr=0 WS=128" "46132","22.160468","172.30.1.104","172.30.1.205","TCP","54","135 > 46860 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46133","22.160499","172.30.1.104","172.30.1.205","TCP","54","135 > 46860 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46134","22.160507","172.30.1.205","172.30.1.104","TCP","54","46860 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46135","22.160602","172.30.1.104","172.30.1.205","TCP","66","49671 > 39498 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46136","22.160610","172.30.1.205","172.30.1.104","TCP","54","39498 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46137","22.160983","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46138","22.161280","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46139","22.161289","172.30.1.205","172.30.1.104","TCP","54","39498 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46140","22.163163","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46141","22.163572","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46142","22.163579","172.30.1.205","172.30.1.104","TCP","54","39498 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46143","22.164949","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46144","22.168632","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46145","22.168643","172.30.1.205","172.30.1.104","TCP","54","39498 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46146","22.169608","172.30.1.205","172.30.1.104","TCP","74","46864 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925396 TSecr=0 WS=128" "46147","22.169937","172.30.1.104","172.30.1.205","TCP","66","135 > 46864 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46148","22.169947","172.30.1.205","172.30.1.104","TCP","54","46864 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46149","22.170307","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46150","22.170606","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46151","22.170615","172.30.1.205","172.30.1.104","TCP","54","46864 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46152","22.172811","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46153","22.173227","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46154","22.173233","172.30.1.205","172.30.1.104","TCP","54","46864 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46155","22.175043","172.30.1.205","172.30.1.104","TCP","54","46864 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46156","22.175155","172.30.1.205","172.30.1.104","TCP","74","39502 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925401 TSecr=0 WS=128" "46157","22.175298","172.30.1.104","172.30.1.205","TCP","54","135 > 46864 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46158","22.175339","172.30.1.104","172.30.1.205","TCP","54","135 > 46864 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46159","22.175344","172.30.1.205","172.30.1.104","TCP","54","46864 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46160","22.175428","172.30.1.104","172.30.1.205","TCP","66","49671 > 39502 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46161","22.175436","172.30.1.205","172.30.1.104","TCP","54","39502 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46162","22.175782","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46163","22.176091","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46164","22.176101","172.30.1.205","172.30.1.104","TCP","54","39502 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46165","22.178001","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46166","22.178402","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46167","22.178408","172.30.1.205","172.30.1.104","TCP","54","39502 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46168","22.179757","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46169","22.183311","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46170","22.183320","172.30.1.205","172.30.1.104","TCP","54","39502 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46171","22.184262","172.30.1.205","172.30.1.104","TCP","74","46868 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925410 TSecr=0 WS=128" "46172","22.184558","172.30.1.104","172.30.1.205","TCP","66","135 > 46868 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46173","22.184569","172.30.1.205","172.30.1.104","TCP","54","46868 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46174","22.184943","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46175","22.185233","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46176","22.185242","172.30.1.205","172.30.1.104","TCP","54","46868 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46177","22.187417","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46178","22.187854","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46179","22.187861","172.30.1.205","172.30.1.104","TCP","54","46868 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46180","22.189672","172.30.1.205","172.30.1.104","TCP","54","46868 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46181","22.189782","172.30.1.205","172.30.1.104","TCP","74","39506 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925416 TSecr=0 WS=128" "46182","22.189958","172.30.1.104","172.30.1.205","TCP","54","135 > 46868 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46183","22.189967","172.30.1.104","172.30.1.205","TCP","54","135 > 46868 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46184","22.189973","172.30.1.205","172.30.1.104","TCP","54","46868 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46185","22.190078","172.30.1.104","172.30.1.205","TCP","66","49671 > 39506 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46186","22.190086","172.30.1.205","172.30.1.104","TCP","54","39506 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46187","22.190445","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46188","22.190721","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46189","22.190730","172.30.1.205","172.30.1.104","TCP","54","39506 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46190","22.192582","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46191","22.192929","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46192","22.192936","172.30.1.205","172.30.1.104","TCP","54","39506 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46193","22.194291","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46194","22.197775","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46195","22.197784","172.30.1.205","172.30.1.104","TCP","54","39506 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46196","22.198719","172.30.1.205","172.30.1.104","TCP","74","46872 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925425 TSecr=0 WS=128" "46197","22.199073","172.30.1.104","172.30.1.205","TCP","66","135 > 46872 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46198","22.199084","172.30.1.205","172.30.1.104","TCP","54","46872 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46199","22.199428","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46200","22.199744","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46201","22.199753","172.30.1.205","172.30.1.104","TCP","54","46872 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46202","22.201941","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46203","22.202359","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46204","22.202365","172.30.1.205","172.30.1.104","TCP","54","46872 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46205","22.204170","172.30.1.205","172.30.1.104","TCP","54","46872 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46206","22.204279","172.30.1.205","172.30.1.104","TCP","74","39510 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925430 TSecr=0 WS=128" "46207","22.204442","172.30.1.104","172.30.1.205","TCP","54","135 > 46872 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46208","22.204452","172.30.1.104","172.30.1.205","TCP","54","135 > 46872 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46209","22.204457","172.30.1.205","172.30.1.104","TCP","54","46872 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46210","22.204588","172.30.1.104","172.30.1.205","TCP","66","49671 > 39510 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46211","22.204598","172.30.1.205","172.30.1.104","TCP","54","39510 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46212","22.204967","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46213","22.205276","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46214","22.205285","172.30.1.205","172.30.1.104","TCP","54","39510 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46215","22.207147","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46216","22.207524","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46217","22.207530","172.30.1.205","172.30.1.104","TCP","54","39510 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46218","22.208883","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46219","22.212468","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46220","22.212477","172.30.1.205","172.30.1.104","TCP","54","39510 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46221","22.213421","172.30.1.205","172.30.1.104","TCP","74","46876 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925439 TSecr=0 WS=128" "46222","22.213729","172.30.1.104","172.30.1.205","TCP","66","135 > 46876 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46223","22.213740","172.30.1.205","172.30.1.104","TCP","54","46876 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46224","22.214088","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46225","22.214381","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46226","22.214389","172.30.1.205","172.30.1.104","TCP","54","46876 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46227","22.216563","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46228","22.216969","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46229","22.216975","172.30.1.205","172.30.1.104","TCP","54","46876 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46230","22.218789","172.30.1.205","172.30.1.104","TCP","54","46876 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46231","22.218899","172.30.1.205","172.30.1.104","TCP","74","39514 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925445 TSecr=0 WS=128" "46232","22.219041","172.30.1.104","172.30.1.205","TCP","54","135 > 46876 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46233","22.219052","172.30.1.104","172.30.1.205","TCP","54","135 > 46876 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46234","22.219057","172.30.1.205","172.30.1.104","TCP","54","46876 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46235","22.219270","172.30.1.104","172.30.1.205","TCP","66","49671 > 39514 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46236","22.219278","172.30.1.205","172.30.1.104","TCP","54","39514 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46237","22.219619","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46238","22.219923","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46239","22.219930","172.30.1.205","172.30.1.104","TCP","54","39514 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46240","22.221805","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46241","22.222159","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46242","22.222165","172.30.1.205","172.30.1.104","TCP","54","39514 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46243","22.223495","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46244","22.226990","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46245","22.226999","172.30.1.205","172.30.1.104","TCP","54","39514 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46246","22.227926","172.30.1.205","172.30.1.104","TCP","74","46880 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925454 TSecr=0 WS=128" "46247","22.228255","172.30.1.104","172.30.1.205","TCP","66","135 > 46880 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46248","22.228267","172.30.1.205","172.30.1.104","TCP","54","46880 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46249","22.228618","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46250","22.229002","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46251","22.229011","172.30.1.205","172.30.1.104","TCP","54","46880 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46252","22.231221","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46253","22.231673","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46254","22.231680","172.30.1.205","172.30.1.104","TCP","54","46880 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46255","22.233504","172.30.1.205","172.30.1.104","TCP","54","46880 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46256","22.233612","172.30.1.205","172.30.1.104","TCP","74","39518 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925460 TSecr=0 WS=128" "46257","22.233781","172.30.1.104","172.30.1.205","TCP","54","135 > 46880 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46258","22.233813","172.30.1.104","172.30.1.205","TCP","54","135 > 46880 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46259","22.233818","172.30.1.205","172.30.1.104","TCP","54","46880 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46260","22.233942","172.30.1.104","172.30.1.205","TCP","66","49671 > 39518 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46261","22.233950","172.30.1.205","172.30.1.104","TCP","54","39518 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46262","22.234294","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46263","22.234630","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46264","22.234639","172.30.1.205","172.30.1.104","TCP","54","39518 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46265","22.236536","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46266","22.236934","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46267","22.236940","172.30.1.205","172.30.1.104","TCP","54","39518 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46268","22.238291","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46269","22.241885","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46270","22.241898","172.30.1.205","172.30.1.104","TCP","54","39518 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46271","22.242918","172.30.1.205","172.30.1.104","TCP","74","46884 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925469 TSecr=0 WS=128" "46272","22.243244","172.30.1.104","172.30.1.205","TCP","66","135 > 46884 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46273","22.243256","172.30.1.205","172.30.1.104","TCP","54","46884 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46274","22.243617","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46275","22.243915","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46276","22.243925","172.30.1.205","172.30.1.104","TCP","54","46884 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46277","22.246159","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46278","22.246671","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46279","22.246678","172.30.1.205","172.30.1.104","TCP","54","46884 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46280","22.248505","172.30.1.205","172.30.1.104","TCP","54","46884 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46281","22.248628","172.30.1.205","172.30.1.104","TCP","74","39522 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925475 TSecr=0 WS=128" "46282","22.248785","172.30.1.104","172.30.1.205","TCP","54","135 > 46884 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46283","22.248809","172.30.1.104","172.30.1.205","TCP","54","135 > 46884 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46284","22.248815","172.30.1.205","172.30.1.104","TCP","54","46884 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46285","22.248896","172.30.1.104","172.30.1.205","TCP","66","49671 > 39522 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46286","22.248904","172.30.1.205","172.30.1.104","TCP","54","39522 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46287","22.249257","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46288","22.249549","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46289","22.249558","172.30.1.205","172.30.1.104","TCP","54","39522 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46290","22.251443","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46291","22.251820","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46292","22.251827","172.30.1.205","172.30.1.104","TCP","54","39522 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46293","22.253215","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46294","22.256919","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46295","22.256929","172.30.1.205","172.30.1.104","TCP","54","39522 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46296","22.257886","172.30.1.205","172.30.1.104","TCP","74","46888 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925484 TSecr=0 WS=128" "46297","22.258221","172.30.1.104","172.30.1.205","TCP","66","135 > 46888 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46298","22.258233","172.30.1.205","172.30.1.104","TCP","54","46888 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46299","22.258605","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46300","22.258927","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46301","22.258936","172.30.1.205","172.30.1.104","TCP","54","46888 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46302","22.261146","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46303","22.261570","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46304","22.261576","172.30.1.205","172.30.1.104","TCP","54","46888 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46305","22.262429","172.30.1.205","172.30.1.104","TCP","54","39482 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "46306","22.262477","172.30.1.205","172.30.1.104","TCP","54","39486 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "46307","22.262515","172.30.1.205","172.30.1.104","TCP","54","39490 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "46308","22.262548","172.30.1.205","172.30.1.104","TCP","54","39494 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "46309","22.262577","172.30.1.205","172.30.1.104","TCP","54","39498 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "46310","22.262604","172.30.1.205","172.30.1.104","TCP","54","39502 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "46311","22.262632","172.30.1.205","172.30.1.104","TCP","54","39506 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "46312","22.262654","172.30.1.205","172.30.1.104","TCP","54","39510 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "46313","22.262679","172.30.1.205","172.30.1.104","TCP","54","39514 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "46314","22.262702","172.30.1.205","172.30.1.104","TCP","54","39518 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "46315","22.262730","172.30.1.205","172.30.1.104","TCP","54","39522 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "46316","22.262769","172.30.1.104","172.30.1.205","TCP","54","49671 > 39482 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46317","22.262789","172.30.1.104","172.30.1.205","TCP","54","49671 > 39486 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46318","22.262834","172.30.1.205","172.30.1.104","TCP","54","39478 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "46319","22.262881","172.30.1.104","172.30.1.205","TCP","54","49671 > 39490 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46320","22.262898","172.30.1.104","172.30.1.205","TCP","54","49671 > 39494 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46321","22.262919","172.30.1.104","172.30.1.205","TCP","54","49671 > 39498 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46322","22.262938","172.30.1.104","172.30.1.205","TCP","54","49671 > 39502 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46323","22.263141","172.30.1.104","172.30.1.205","TCP","54","49671 > 39506 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46324","22.263156","172.30.1.104","172.30.1.205","TCP","54","49671 > 39482 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46325","22.263162","172.30.1.205","172.30.1.104","TCP","54","39482 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46326","22.263176","172.30.1.104","172.30.1.205","TCP","54","49671 > 39510 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46327","22.263244","172.30.1.104","172.30.1.205","TCP","54","49671 > 39510 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46328","22.263250","172.30.1.205","172.30.1.104","TCP","54","39510 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46329","22.263253","172.30.1.104","172.30.1.205","TCP","54","49671 > 39506 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46330","22.263255","172.30.1.205","172.30.1.104","TCP","54","39506 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46331","22.263256","172.30.1.104","172.30.1.205","TCP","54","49671 > 39502 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46332","22.263258","172.30.1.205","172.30.1.104","TCP","54","39502 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46333","22.263263","172.30.1.104","172.30.1.205","TCP","54","49671 > 39498 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46334","22.263265","172.30.1.205","172.30.1.104","TCP","54","39498 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46335","22.263279","172.30.1.104","172.30.1.205","TCP","54","49671 > 39486 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46336","22.263281","172.30.1.205","172.30.1.104","TCP","54","39486 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46337","22.263308","172.30.1.104","172.30.1.205","TCP","54","49671 > 39494 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46338","22.263311","172.30.1.205","172.30.1.104","TCP","54","39494 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46339","22.263335","172.30.1.104","172.30.1.205","TCP","54","49671 > 39490 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46340","22.263338","172.30.1.205","172.30.1.104","TCP","54","39490 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46341","22.263361","172.30.1.104","172.30.1.205","TCP","54","49671 > 39514 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46342","22.263383","172.30.1.104","172.30.1.205","TCP","54","49671 > 39518 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46343","22.263403","172.30.1.104","172.30.1.205","TCP","54","49671 > 39522 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46344","22.263424","172.30.1.104","172.30.1.205","TCP","54","49671 > 39478 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46345","22.263622","172.30.1.104","172.30.1.205","TCP","54","49671 > 39522 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46346","22.263628","172.30.1.205","172.30.1.104","TCP","54","39522 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46347","22.263642","172.30.1.104","172.30.1.205","TCP","54","49671 > 39478 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46348","22.263644","172.30.1.205","172.30.1.104","TCP","54","39478 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46349","22.263665","172.30.1.104","172.30.1.205","TCP","54","49671 > 39514 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46350","22.263668","172.30.1.205","172.30.1.104","TCP","54","39514 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46351","22.263684","172.30.1.104","172.30.1.205","TCP","54","49671 > 39518 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46352","22.263687","172.30.1.205","172.30.1.104","TCP","54","39518 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46353","22.264358","172.30.1.205","172.30.1.104","TCP","54","46888 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46354","22.264470","172.30.1.205","172.30.1.104","TCP","74","39526 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925490 TSecr=0 WS=128" "46355","22.264615","172.30.1.104","172.30.1.205","TCP","54","135 > 46888 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46356","22.264628","172.30.1.104","172.30.1.205","TCP","54","135 > 46888 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46357","22.264633","172.30.1.205","172.30.1.104","TCP","54","46888 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46358","22.264748","172.30.1.104","172.30.1.205","TCP","66","49671 > 39526 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46359","22.264756","172.30.1.205","172.30.1.104","TCP","54","39526 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46360","22.265136","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46361","22.265431","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46362","22.265440","172.30.1.205","172.30.1.104","TCP","54","39526 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46363","22.267343","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46364","22.267701","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46365","22.267708","172.30.1.205","172.30.1.104","TCP","54","39526 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46366","22.269110","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46367","22.273114","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46368","22.273123","172.30.1.205","172.30.1.104","TCP","54","39526 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46369","22.274096","172.30.1.205","172.30.1.104","TCP","74","46892 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925500 TSecr=0 WS=128" "46370","22.274382","172.30.1.104","172.30.1.205","TCP","66","135 > 46892 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46371","22.274393","172.30.1.205","172.30.1.104","TCP","54","46892 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46372","22.274748","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46373","22.275046","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46374","22.275055","172.30.1.205","172.30.1.104","TCP","54","46892 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46375","22.277256","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46376","22.278149","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46377","22.278156","172.30.1.205","172.30.1.104","TCP","54","46892 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46378","22.279967","172.30.1.205","172.30.1.104","TCP","54","46892 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46379","22.280089","172.30.1.205","172.30.1.104","TCP","74","39530 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925506 TSecr=0 WS=128" "46380","22.280224","172.30.1.104","172.30.1.205","TCP","54","135 > 46892 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46381","22.280238","172.30.1.104","172.30.1.205","TCP","54","135 > 46892 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46382","22.280243","172.30.1.205","172.30.1.104","TCP","54","46892 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46383","22.280377","172.30.1.104","172.30.1.205","TCP","66","49671 > 39530 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46384","22.280385","172.30.1.205","172.30.1.104","TCP","54","39530 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46385","22.280730","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46386","22.281023","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46387","22.281033","172.30.1.205","172.30.1.104","TCP","54","39530 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46388","22.282898","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46389","22.283307","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46390","22.283314","172.30.1.205","172.30.1.104","TCP","54","39530 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46391","22.284680","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46392","22.288192","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46393","22.288201","172.30.1.205","172.30.1.104","TCP","54","39530 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46394","22.289189","172.30.1.205","172.30.1.104","TCP","74","46896 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925515 TSecr=0 WS=128" "46395","22.289556","172.30.1.104","172.30.1.205","TCP","66","135 > 46896 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46396","22.289568","172.30.1.205","172.30.1.104","TCP","54","46896 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46397","22.289931","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46398","22.290238","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46399","22.290247","172.30.1.205","172.30.1.104","TCP","54","46896 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46400","22.292453","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46401","22.292884","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46402","22.292891","172.30.1.205","172.30.1.104","TCP","54","46896 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46403","22.294707","172.30.1.205","172.30.1.104","TCP","54","46896 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46404","22.294821","172.30.1.205","172.30.1.104","TCP","74","39534 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925521 TSecr=0 WS=128" "46405","22.294994","172.30.1.104","172.30.1.205","TCP","54","135 > 46896 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46406","22.295007","172.30.1.104","172.30.1.205","TCP","54","135 > 46896 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46407","22.295013","172.30.1.205","172.30.1.104","TCP","54","46896 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46408","22.295123","172.30.1.104","172.30.1.205","TCP","66","49671 > 39534 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46409","22.295131","172.30.1.205","172.30.1.104","TCP","54","39534 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46410","22.295477","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46411","22.295791","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46412","22.295798","172.30.1.205","172.30.1.104","TCP","54","39534 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46413","22.297701","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46414","22.298924","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46415","22.298930","172.30.1.205","172.30.1.104","TCP","54","39534 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46416","22.300283","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46417","22.303907","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46418","22.303919","172.30.1.205","172.30.1.104","TCP","54","39534 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46419","22.304901","172.30.1.205","172.30.1.104","TCP","74","46900 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925531 TSecr=0 WS=128" "46420","22.305299","172.30.1.104","172.30.1.205","TCP","66","135 > 46900 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46421","22.305310","172.30.1.205","172.30.1.104","TCP","54","46900 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46422","22.305669","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46423","22.306002","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46424","22.306011","172.30.1.205","172.30.1.104","TCP","54","46900 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46425","22.308214","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46426","22.308630","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46427","22.308637","172.30.1.205","172.30.1.104","TCP","54","46900 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46428","22.310487","172.30.1.205","172.30.1.104","TCP","54","46900 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46429","22.310599","172.30.1.205","172.30.1.104","TCP","74","39538 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925537 TSecr=0 WS=128" "46430","22.310806","172.30.1.104","172.30.1.205","TCP","54","135 > 46900 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46431","22.310833","172.30.1.104","172.30.1.205","TCP","54","135 > 46900 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46432","22.310839","172.30.1.205","172.30.1.104","TCP","54","46900 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46433","22.310941","172.30.1.104","172.30.1.205","TCP","66","49671 > 39538 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46434","22.310949","172.30.1.205","172.30.1.104","TCP","54","39538 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46435","22.311300","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46436","22.311636","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46437","22.311654","172.30.1.205","172.30.1.104","TCP","54","39538 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46438","22.313578","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46439","22.313970","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46440","22.313976","172.30.1.205","172.30.1.104","TCP","54","39538 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46441","22.315328","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46442","22.318907","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46443","22.318916","172.30.1.205","172.30.1.104","TCP","54","39538 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46444","22.319873","172.30.1.205","172.30.1.104","TCP","74","46904 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925546 TSecr=0 WS=128" "46445","22.320198","172.30.1.104","172.30.1.205","TCP","66","135 > 46904 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46446","22.320209","172.30.1.205","172.30.1.104","TCP","54","46904 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46447","22.320557","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46448","22.320844","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46449","22.320853","172.30.1.205","172.30.1.104","TCP","54","46904 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46450","22.323055","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46451","22.323496","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46452","22.323503","172.30.1.205","172.30.1.104","TCP","54","46904 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46453","22.325361","172.30.1.205","172.30.1.104","TCP","54","46904 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46454","22.325486","172.30.1.205","172.30.1.104","TCP","74","39542 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925551 TSecr=0 WS=128" "46455","22.325618","172.30.1.104","172.30.1.205","TCP","54","135 > 46904 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46456","22.325641","172.30.1.104","172.30.1.205","TCP","54","135 > 46904 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46457","22.325647","172.30.1.205","172.30.1.104","TCP","54","46904 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46458","22.325768","172.30.1.104","172.30.1.205","TCP","66","49671 > 39542 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46459","22.325777","172.30.1.205","172.30.1.104","TCP","54","39542 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46460","22.326123","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46461","22.326436","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46462","22.326445","172.30.1.205","172.30.1.104","TCP","54","39542 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46463","22.328308","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46464","22.329533","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46465","22.329540","172.30.1.205","172.30.1.104","TCP","54","39542 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46466","22.330916","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46467","22.334486","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46468","22.334496","172.30.1.205","172.30.1.104","TCP","54","39542 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46469","22.335467","172.30.1.205","172.30.1.104","TCP","74","46908 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925561 TSecr=0 WS=128" "46470","22.335744","172.30.1.104","172.30.1.205","TCP","66","135 > 46908 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46471","22.335754","172.30.1.205","172.30.1.104","TCP","54","46908 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46472","22.336103","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46473","22.336364","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46474","22.336373","172.30.1.205","172.30.1.104","TCP","54","46908 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46475","22.338602","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46476","22.338990","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46477","22.338997","172.30.1.205","172.30.1.104","TCP","54","46908 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46478","22.340842","172.30.1.205","172.30.1.104","TCP","54","46908 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46479","22.340953","172.30.1.205","172.30.1.104","TCP","74","39546 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925567 TSecr=0 WS=128" "46480","22.341115","172.30.1.104","172.30.1.205","TCP","54","135 > 46908 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46481","22.341124","172.30.1.104","172.30.1.205","TCP","54","135 > 46908 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46482","22.341130","172.30.1.205","172.30.1.104","TCP","54","46908 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46483","22.341238","172.30.1.104","172.30.1.205","TCP","66","49671 > 39546 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46484","22.341249","172.30.1.205","172.30.1.104","TCP","54","39546 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46485","22.341598","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46486","22.341891","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46487","22.341900","172.30.1.205","172.30.1.104","TCP","54","39546 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46488","22.343834","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46489","22.344192","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46490","22.344198","172.30.1.205","172.30.1.104","TCP","54","39546 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46491","22.345625","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46492","22.349189","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46493","22.349199","172.30.1.205","172.30.1.104","TCP","54","39546 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46494","22.350163","172.30.1.205","172.30.1.104","TCP","74","46912 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925576 TSecr=0 WS=128" "46495","22.350465","172.30.1.104","172.30.1.205","TCP","66","135 > 46912 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46496","22.350475","172.30.1.205","172.30.1.104","TCP","54","46912 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46497","22.350826","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46498","22.351171","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46499","22.351180","172.30.1.205","172.30.1.104","TCP","54","46912 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46500","22.353433","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46501","22.353830","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46502","22.353837","172.30.1.205","172.30.1.104","TCP","54","46912 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46503","22.355670","172.30.1.205","172.30.1.104","TCP","54","46912 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46504","22.355786","172.30.1.205","172.30.1.104","TCP","74","39550 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925582 TSecr=0 WS=128" "46505","22.355946","172.30.1.104","172.30.1.205","TCP","54","135 > 46912 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46506","22.356011","172.30.1.104","172.30.1.205","TCP","54","135 > 46912 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46507","22.356017","172.30.1.205","172.30.1.104","TCP","54","46912 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46508","22.356106","172.30.1.104","172.30.1.205","TCP","66","49671 > 39550 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46509","22.356115","172.30.1.205","172.30.1.104","TCP","54","39550 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46510","22.356461","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46511","22.356752","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46512","22.356761","172.30.1.205","172.30.1.104","TCP","54","39550 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46513","22.358666","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46514","22.359015","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46515","22.359021","172.30.1.205","172.30.1.104","TCP","54","39550 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46516","22.360403","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46517","22.363779","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46518","22.363790","172.30.1.205","172.30.1.104","TCP","54","39550 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46519","22.364750","172.30.1.205","172.30.1.104","TCP","74","46916 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925591 TSecr=0 WS=128" "46520","22.365013","172.30.1.104","172.30.1.205","TCP","66","135 > 46916 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46521","22.365024","172.30.1.205","172.30.1.104","TCP","54","46916 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46522","22.365388","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46523","22.365663","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46524","22.365673","172.30.1.205","172.30.1.104","TCP","54","46916 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46525","22.367874","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46526","22.368510","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46527","22.368516","172.30.1.205","172.30.1.104","TCP","54","46916 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46528","22.370387","172.30.1.205","172.30.1.104","TCP","54","46916 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46529","22.370502","172.30.1.205","172.30.1.104","TCP","74","39554 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925596 TSecr=0 WS=128" "46530","22.370669","172.30.1.104","172.30.1.205","TCP","54","135 > 46916 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46531","22.370678","172.30.1.104","172.30.1.205","TCP","54","135 > 46916 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46532","22.370683","172.30.1.205","172.30.1.104","TCP","54","46916 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46533","22.370778","172.30.1.104","172.30.1.205","TCP","66","49671 > 39554 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46534","22.370787","172.30.1.205","172.30.1.104","TCP","54","39554 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46535","22.371191","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46536","22.371516","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46537","22.371524","172.30.1.205","172.30.1.104","TCP","54","39554 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46538","22.373444","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46539","22.373789","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46540","22.373796","172.30.1.205","172.30.1.104","TCP","54","39554 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46541","22.375158","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46542","22.378675","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46543","22.378684","172.30.1.205","172.30.1.104","TCP","54","39554 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46544","22.379626","172.30.1.205","172.30.1.104","TCP","74","46920 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925606 TSecr=0 WS=128" "46545","22.379912","172.30.1.104","172.30.1.205","TCP","66","135 > 46920 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46546","22.379923","172.30.1.205","172.30.1.104","TCP","54","46920 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46547","22.380272","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46548","22.380549","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46549","22.380558","172.30.1.205","172.30.1.104","TCP","54","46920 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46550","22.382765","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46551","22.383152","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46552","22.383158","172.30.1.205","172.30.1.104","TCP","54","46920 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46553","22.385051","172.30.1.205","172.30.1.104","TCP","54","46920 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46554","22.385162","172.30.1.205","172.30.1.104","TCP","74","39558 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925611 TSecr=0 WS=128" "46555","22.385320","172.30.1.104","172.30.1.205","TCP","54","135 > 46920 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46556","22.385354","172.30.1.104","172.30.1.205","TCP","54","135 > 46920 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46557","22.385360","172.30.1.205","172.30.1.104","TCP","54","46920 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46558","22.385438","172.30.1.104","172.30.1.205","TCP","66","49671 > 39558 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46559","22.385447","172.30.1.205","172.30.1.104","TCP","54","39558 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46560","22.385809","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46561","22.386088","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46562","22.386097","172.30.1.205","172.30.1.104","TCP","54","39558 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46563","22.387958","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46564","22.388574","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46565","22.388578","172.30.1.205","172.30.1.104","TCP","54","39558 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46566","22.389956","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46567","22.394033","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46568","22.394044","172.30.1.205","172.30.1.104","TCP","54","39558 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46569","22.394994","172.30.1.205","172.30.1.104","TCP","74","46924 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925621 TSecr=0 WS=128" "46570","22.395324","172.30.1.104","172.30.1.205","TCP","66","135 > 46924 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46571","22.395337","172.30.1.205","172.30.1.104","TCP","54","46924 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46572","22.395704","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46573","22.396018","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46574","22.396027","172.30.1.205","172.30.1.104","TCP","54","46924 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46575","22.398319","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46576","22.398734","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46577","22.398740","172.30.1.205","172.30.1.104","TCP","54","46924 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46578","22.400616","172.30.1.205","172.30.1.104","TCP","54","46924 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46579","22.400749","172.30.1.205","172.30.1.104","TCP","74","39562 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925627 TSecr=0 WS=128" "46580","22.400882","172.30.1.104","172.30.1.205","TCP","54","135 > 46924 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46581","22.400903","172.30.1.104","172.30.1.205","TCP","54","135 > 46924 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46582","22.400908","172.30.1.205","172.30.1.104","TCP","54","46924 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46583","22.401050","172.30.1.104","172.30.1.205","TCP","66","49671 > 39562 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46584","22.401075","172.30.1.205","172.30.1.104","TCP","54","39562 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46585","22.401451","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46586","22.401731","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46587","22.401742","172.30.1.205","172.30.1.104","TCP","54","39562 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46588","22.403703","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46589","22.404114","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46590","22.404121","172.30.1.205","172.30.1.104","TCP","54","39562 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46591","22.405526","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46592","22.410356","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46593","22.410367","172.30.1.205","172.30.1.104","TCP","54","39562 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46594","22.411340","172.30.1.205","172.30.1.104","TCP","74","46928 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925637 TSecr=0 WS=128" "46595","22.411670","172.30.1.104","172.30.1.205","TCP","66","135 > 46928 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46596","22.411683","172.30.1.205","172.30.1.104","TCP","54","46928 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46597","22.412047","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46598","22.412321","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46599","22.412330","172.30.1.205","172.30.1.104","TCP","54","46928 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46600","22.414561","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46601","22.415005","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46602","22.415012","172.30.1.205","172.30.1.104","TCP","54","46928 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46603","22.416837","172.30.1.205","172.30.1.104","TCP","54","46928 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46604","22.416950","172.30.1.205","172.30.1.104","TCP","74","39566 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925643 TSecr=0 WS=128" "46605","22.417113","172.30.1.104","172.30.1.205","TCP","54","135 > 46928 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46606","22.417128","172.30.1.104","172.30.1.205","TCP","54","135 > 46928 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46607","22.417134","172.30.1.205","172.30.1.104","TCP","54","46928 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46608","22.417256","172.30.1.104","172.30.1.205","TCP","66","49671 > 39566 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46609","22.417264","172.30.1.205","172.30.1.104","TCP","54","39566 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46610","22.417614","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46611","22.417950","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46612","22.417957","172.30.1.205","172.30.1.104","TCP","54","39566 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46613","22.419841","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46614","22.420257","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46615","22.420263","172.30.1.205","172.30.1.104","TCP","54","39566 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46616","22.421648","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46617","22.425241","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46618","22.425251","172.30.1.205","172.30.1.104","TCP","54","39566 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46619","22.426194","172.30.1.205","172.30.1.104","TCP","74","46932 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925652 TSecr=0 WS=128" "46620","22.426524","172.30.1.104","172.30.1.205","TCP","66","135 > 46932 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46621","22.426536","172.30.1.205","172.30.1.104","TCP","54","46932 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46622","22.426891","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46623","22.427170","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46624","22.427178","172.30.1.205","172.30.1.104","TCP","54","46932 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46625","22.429410","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46626","22.429811","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46627","22.429818","172.30.1.205","172.30.1.104","TCP","54","46932 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46628","22.431632","172.30.1.205","172.30.1.104","TCP","54","46932 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46629","22.431748","172.30.1.205","172.30.1.104","TCP","74","39570 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925658 TSecr=0 WS=128" "46630","22.431921","172.30.1.104","172.30.1.205","TCP","54","135 > 46932 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46631","22.431932","172.30.1.104","172.30.1.205","TCP","54","135 > 46932 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46632","22.431938","172.30.1.205","172.30.1.104","TCP","54","46932 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46633","22.432020","172.30.1.104","172.30.1.205","TCP","66","49671 > 39570 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46634","22.432028","172.30.1.205","172.30.1.104","TCP","54","39570 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46635","22.432375","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46636","22.432656","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46637","22.432665","172.30.1.205","172.30.1.104","TCP","54","39570 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46638","22.434582","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46639","22.434948","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46640","22.434953","172.30.1.205","172.30.1.104","TCP","54","39570 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46641","22.436306","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46642","22.439930","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46643","22.439940","172.30.1.205","172.30.1.104","TCP","54","39570 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46644","22.440919","172.30.1.205","172.30.1.104","TCP","74","46936 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925667 TSecr=0 WS=128" "46645","22.441231","172.30.1.104","172.30.1.205","TCP","66","135 > 46936 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46646","22.441242","172.30.1.205","172.30.1.104","TCP","54","46936 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46647","22.441609","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46648","22.441897","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46649","22.441906","172.30.1.205","172.30.1.104","TCP","54","46936 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46650","22.444102","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46651","22.444509","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46652","22.444515","172.30.1.205","172.30.1.104","TCP","54","46936 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46653","22.445394","172.30.1.205","172.30.1.104","TCP","54","39530 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "46654","22.445450","172.30.1.205","172.30.1.104","TCP","54","39534 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "46655","22.445487","172.30.1.205","172.30.1.104","TCP","54","39538 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "46656","22.445521","172.30.1.205","172.30.1.104","TCP","54","39542 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "46657","22.445549","172.30.1.205","172.30.1.104","TCP","54","39546 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "46658","22.445581","172.30.1.205","172.30.1.104","TCP","54","39550 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "46659","22.445604","172.30.1.205","172.30.1.104","TCP","54","39554 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "46660","22.445631","172.30.1.205","172.30.1.104","TCP","54","39558 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "46661","22.445658","172.30.1.205","172.30.1.104","TCP","54","39562 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "46662","22.445666","172.30.1.104","172.30.1.205","TCP","54","49671 > 39530 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46663","22.445710","172.30.1.205","172.30.1.104","TCP","54","39566 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "46664","22.445737","172.30.1.205","172.30.1.104","TCP","54","39570 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "46665","22.445805","172.30.1.104","172.30.1.205","TCP","54","49671 > 39534 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46666","22.445823","172.30.1.104","172.30.1.205","TCP","54","49671 > 39530 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46667","22.445830","172.30.1.205","172.30.1.104","TCP","54","39530 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46668","22.445840","172.30.1.205","172.30.1.104","TCP","54","39526 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "46669","22.445844","172.30.1.104","172.30.1.205","TCP","54","49671 > 39534 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46670","22.445848","172.30.1.205","172.30.1.104","TCP","54","39534 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46671","22.445868","172.30.1.104","172.30.1.205","TCP","54","49671 > 39538 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46672","22.445889","172.30.1.104","172.30.1.205","TCP","54","49671 > 39542 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46673","22.445910","172.30.1.104","172.30.1.205","TCP","54","49671 > 39538 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46674","22.445913","172.30.1.205","172.30.1.104","TCP","54","39538 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46675","22.446046","172.30.1.104","172.30.1.205","TCP","54","49671 > 39546 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46676","22.446063","172.30.1.104","172.30.1.205","TCP","54","49671 > 39550 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46677","22.446093","172.30.1.104","172.30.1.205","TCP","54","49671 > 39550 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46678","22.446097","172.30.1.205","172.30.1.104","TCP","54","39550 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46679","22.446116","172.30.1.104","172.30.1.205","TCP","54","49671 > 39542 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46680","22.446119","172.30.1.205","172.30.1.104","TCP","54","39542 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46681","22.446137","172.30.1.104","172.30.1.205","TCP","54","49671 > 39546 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46682","22.446141","172.30.1.205","172.30.1.104","TCP","54","39546 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46683","22.446158","172.30.1.104","172.30.1.205","TCP","54","49671 > 39558 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46684","22.446178","172.30.1.104","172.30.1.205","TCP","54","49671 > 39562 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46685","22.446196","172.30.1.104","172.30.1.205","TCP","54","49671 > 39558 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46686","22.446200","172.30.1.205","172.30.1.104","TCP","54","39558 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46687","22.446214","172.30.1.104","172.30.1.205","TCP","54","49671 > 39554 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46688","22.446233","172.30.1.104","172.30.1.205","TCP","54","49671 > 39566 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46689","22.446335","172.30.1.104","172.30.1.205","TCP","54","49671 > 39570 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46690","22.446355","172.30.1.104","172.30.1.205","TCP","54","49671 > 39570 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46691","22.446360","172.30.1.205","172.30.1.104","TCP","54","39570 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46692","22.446374","172.30.1.104","172.30.1.205","TCP","54","49671 > 39566 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46693","22.446377","172.30.1.205","172.30.1.104","TCP","54","39566 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46694","22.446396","172.30.1.104","172.30.1.205","TCP","54","49671 > 39562 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46695","22.446399","172.30.1.205","172.30.1.104","TCP","54","39562 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46696","22.446414","172.30.1.104","172.30.1.205","TCP","54","49671 > 39554 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46697","22.446417","172.30.1.205","172.30.1.104","TCP","54","39554 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46698","22.446433","172.30.1.104","172.30.1.205","TCP","54","49671 > 39526 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46699","22.446565","172.30.1.104","172.30.1.205","TCP","54","49671 > 39526 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "46700","22.446569","172.30.1.205","172.30.1.104","TCP","54","39526 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "46701","22.447403","172.30.1.205","172.30.1.104","TCP","54","46936 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46702","22.447517","172.30.1.205","172.30.1.104","TCP","74","39574 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925673 TSecr=0 WS=128" "46703","22.448145","172.30.1.104","172.30.1.205","TCP","66","49671 > 39574 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46704","22.448154","172.30.1.205","172.30.1.104","TCP","54","39574 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46705","22.448178","172.30.1.104","172.30.1.205","TCP","54","135 > 46936 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46706","22.448231","172.30.1.104","172.30.1.205","TCP","54","135 > 46936 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46707","22.448237","172.30.1.205","172.30.1.104","TCP","54","46936 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46708","22.448547","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46709","22.448842","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46710","22.448852","172.30.1.205","172.30.1.104","TCP","54","39574 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46711","22.450740","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46712","22.451116","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46713","22.451122","172.30.1.205","172.30.1.104","TCP","54","39574 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46714","22.452482","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46715","22.456019","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46716","22.456030","172.30.1.205","172.30.1.104","TCP","54","39574 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46717","22.457024","172.30.1.205","172.30.1.104","TCP","74","46940 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925683 TSecr=0 WS=128" "46718","22.457342","172.30.1.104","172.30.1.205","TCP","66","135 > 46940 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46719","22.457353","172.30.1.205","172.30.1.104","TCP","54","46940 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46720","22.457708","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46721","22.458598","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46722","22.458608","172.30.1.205","172.30.1.104","TCP","54","46940 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46723","22.460799","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46724","22.461192","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46725","22.461198","172.30.1.205","172.30.1.104","TCP","54","46940 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46726","22.463034","172.30.1.205","172.30.1.104","TCP","54","46940 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46727","22.463147","172.30.1.205","172.30.1.104","TCP","74","39578 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925689 TSecr=0 WS=128" "46728","22.463306","172.30.1.104","172.30.1.205","TCP","54","135 > 46940 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46729","22.463317","172.30.1.104","172.30.1.205","TCP","54","135 > 46940 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46730","22.463322","172.30.1.205","172.30.1.104","TCP","54","46940 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46731","22.463421","172.30.1.104","172.30.1.205","TCP","66","49671 > 39578 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46732","22.463429","172.30.1.205","172.30.1.104","TCP","54","39578 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46733","22.463780","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46734","22.464055","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46735","22.464063","172.30.1.205","172.30.1.104","TCP","54","39578 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46736","22.465961","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46737","22.466339","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46738","22.466346","172.30.1.205","172.30.1.104","TCP","54","39578 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46739","22.467715","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46740","22.471255","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46741","22.471265","172.30.1.205","172.30.1.104","TCP","54","39578 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46742","22.472203","172.30.1.205","172.30.1.104","TCP","74","46944 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925698 TSecr=0 WS=128" "46743","22.472546","172.30.1.104","172.30.1.205","TCP","66","135 > 46944 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46744","22.472559","172.30.1.205","172.30.1.104","TCP","54","46944 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46745","22.472953","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46746","22.473299","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46747","22.473308","172.30.1.205","172.30.1.104","TCP","54","46944 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46748","22.475505","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46749","22.475932","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46750","22.475939","172.30.1.205","172.30.1.104","TCP","54","46944 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46751","22.477778","172.30.1.205","172.30.1.104","TCP","54","46944 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46752","22.477902","172.30.1.205","172.30.1.104","TCP","74","39582 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925704 TSecr=0 WS=128" "46753","22.478042","172.30.1.104","172.30.1.205","TCP","54","135 > 46944 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46754","22.478089","172.30.1.104","172.30.1.205","TCP","54","135 > 46944 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46755","22.478094","172.30.1.205","172.30.1.104","TCP","54","46944 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46756","22.478171","172.30.1.104","172.30.1.205","TCP","66","49671 > 39582 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46757","22.478179","172.30.1.205","172.30.1.104","TCP","54","39582 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46758","22.478530","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46759","22.479529","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46760","22.479538","172.30.1.205","172.30.1.104","TCP","54","39582 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46761","22.481450","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46762","22.481850","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46763","22.481857","172.30.1.205","172.30.1.104","TCP","54","39582 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46764","22.483214","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46765","22.486650","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46766","22.486659","172.30.1.205","172.30.1.104","TCP","54","39582 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46767","22.487618","172.30.1.205","172.30.1.104","TCP","74","46948 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925714 TSecr=0 WS=128" "46768","22.487935","172.30.1.104","172.30.1.205","TCP","66","135 > 46948 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46769","22.487945","172.30.1.205","172.30.1.104","TCP","54","46948 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46770","22.488307","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46771","22.488592","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46772","22.488603","172.30.1.205","172.30.1.104","TCP","54","46948 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46773","22.490848","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46774","22.491252","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46775","22.491258","172.30.1.205","172.30.1.104","TCP","54","46948 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46776","22.493112","172.30.1.205","172.30.1.104","TCP","54","46948 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46777","22.493223","172.30.1.205","172.30.1.104","TCP","74","39586 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925719 TSecr=0 WS=128" "46778","22.493368","172.30.1.104","172.30.1.205","TCP","54","135 > 46948 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46779","22.493423","172.30.1.104","172.30.1.205","TCP","54","135 > 46948 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46780","22.493428","172.30.1.205","172.30.1.104","TCP","54","46948 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46781","22.493508","172.30.1.104","172.30.1.205","TCP","66","49671 > 39586 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46782","22.493516","172.30.1.205","172.30.1.104","TCP","54","39586 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46783","22.493862","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46784","22.494155","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46785","22.494167","172.30.1.205","172.30.1.104","TCP","54","39586 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46786","22.496159","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46787","22.496653","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46788","22.496660","172.30.1.205","172.30.1.104","TCP","54","39586 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46789","22.498050","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46790","22.501503","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46791","22.501513","172.30.1.205","172.30.1.104","TCP","54","39586 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46792","22.502459","172.30.1.205","172.30.1.104","TCP","74","46952 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925728 TSecr=0 WS=128" "46793","22.502757","172.30.1.104","172.30.1.205","TCP","66","135 > 46952 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46794","22.502768","172.30.1.205","172.30.1.104","TCP","54","46952 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46795","22.503116","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46796","22.503374","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46797","22.503383","172.30.1.205","172.30.1.104","TCP","54","46952 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46798","22.505620","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46799","22.506002","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46800","22.506009","172.30.1.205","172.30.1.104","TCP","54","46952 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46801","22.507832","172.30.1.205","172.30.1.104","TCP","54","46952 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46802","22.507943","172.30.1.205","172.30.1.104","TCP","74","39590 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925734 TSecr=0 WS=128" "46803","22.508082","172.30.1.104","172.30.1.205","TCP","54","135 > 46952 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46804","22.508093","172.30.1.104","172.30.1.205","TCP","54","135 > 46952 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46805","22.508099","172.30.1.205","172.30.1.104","TCP","54","46952 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46806","22.508222","172.30.1.104","172.30.1.205","TCP","66","49671 > 39590 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46807","22.508231","172.30.1.205","172.30.1.104","TCP","54","39590 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46808","22.508599","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46809","22.508865","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46810","22.508874","172.30.1.205","172.30.1.104","TCP","54","39590 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46811","22.510763","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46812","22.511133","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46813","22.511142","172.30.1.205","172.30.1.104","TCP","54","39590 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46814","22.512509","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46815","22.516056","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46816","22.516068","172.30.1.205","172.30.1.104","TCP","54","39590 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46817","22.517093","172.30.1.205","172.30.1.104","TCP","74","46956 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925743 TSecr=0 WS=128" "46818","22.517388","172.30.1.104","172.30.1.205","TCP","66","135 > 46956 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46819","22.517400","172.30.1.205","172.30.1.104","TCP","54","46956 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46820","22.517767","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46821","22.518151","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46822","22.518160","172.30.1.205","172.30.1.104","TCP","54","46956 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46823","22.520381","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46824","22.520843","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46825","22.520850","172.30.1.205","172.30.1.104","TCP","54","46956 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46826","22.522694","172.30.1.205","172.30.1.104","TCP","54","46956 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46827","22.522806","172.30.1.205","172.30.1.104","TCP","74","39594 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925749 TSecr=0 WS=128" "46828","22.522945","172.30.1.104","172.30.1.205","TCP","54","135 > 46956 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46829","22.523018","172.30.1.104","172.30.1.205","TCP","54","135 > 46956 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46830","22.523024","172.30.1.205","172.30.1.104","TCP","54","46956 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46831","22.523116","172.30.1.104","172.30.1.205","TCP","66","49671 > 39594 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46832","22.523125","172.30.1.205","172.30.1.104","TCP","54","39594 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46833","22.523471","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46834","22.523759","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46835","22.523768","172.30.1.205","172.30.1.104","TCP","54","39594 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46836","22.525689","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46837","22.526050","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46838","22.526057","172.30.1.205","172.30.1.104","TCP","54","39594 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46839","22.527421","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46840","22.531015","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46841","22.531024","172.30.1.205","172.30.1.104","TCP","54","39594 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46842","22.531978","172.30.1.205","172.30.1.104","TCP","74","46960 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925758 TSecr=0 WS=128" "46843","22.532279","172.30.1.104","172.30.1.205","TCP","66","135 > 46960 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46844","22.532290","172.30.1.205","172.30.1.104","TCP","54","46960 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46845","22.532646","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46846","22.532909","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46847","22.532918","172.30.1.205","172.30.1.104","TCP","54","46960 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46848","22.535125","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46849","22.535506","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46850","22.535516","172.30.1.205","172.30.1.104","TCP","54","46960 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46851","22.537438","172.30.1.205","172.30.1.104","TCP","54","46960 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46852","22.537565","172.30.1.205","172.30.1.104","TCP","74","39598 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925763 TSecr=0 WS=128" "46853","22.537685","172.30.1.104","172.30.1.205","TCP","54","135 > 46960 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46854","22.537698","172.30.1.104","172.30.1.205","TCP","54","135 > 46960 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46855","22.537703","172.30.1.205","172.30.1.104","TCP","54","46960 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46856","22.537871","172.30.1.104","172.30.1.205","TCP","66","49671 > 39598 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46857","22.537880","172.30.1.205","172.30.1.104","TCP","54","39598 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46858","22.538225","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46859","22.538503","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46860","22.538510","172.30.1.205","172.30.1.104","TCP","54","39598 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46861","22.540389","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46862","22.540771","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46863","22.540787","172.30.1.205","172.30.1.104","TCP","54","39598 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46864","22.542158","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46865","22.545876","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46866","22.545893","172.30.1.205","172.30.1.104","TCP","54","39598 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46867","22.546923","172.30.1.205","172.30.1.104","TCP","74","46964 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925773 TSecr=0 WS=128" "46868","22.547264","172.30.1.104","172.30.1.205","TCP","66","135 > 46964 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46869","22.547276","172.30.1.205","172.30.1.104","TCP","54","46964 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46870","22.547632","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46871","22.547938","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46872","22.547947","172.30.1.205","172.30.1.104","TCP","54","46964 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46873","22.550168","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46874","22.550676","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46875","22.550685","172.30.1.205","172.30.1.104","TCP","54","46964 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46876","22.552571","172.30.1.205","172.30.1.104","TCP","54","46964 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46877","22.552691","172.30.1.205","172.30.1.104","TCP","74","39602 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925779 TSecr=0 WS=128" "46878","22.552828","172.30.1.104","172.30.1.205","TCP","54","135 > 46964 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46879","22.552867","172.30.1.104","172.30.1.205","TCP","54","135 > 46964 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46880","22.552874","172.30.1.205","172.30.1.104","TCP","54","46964 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46881","22.552976","172.30.1.104","172.30.1.205","TCP","66","49671 > 39602 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46882","22.552985","172.30.1.205","172.30.1.104","TCP","54","39602 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46883","22.553343","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46884","22.553666","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46885","22.553675","172.30.1.205","172.30.1.104","TCP","54","39602 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46886","22.555565","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46887","22.555959","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46888","22.555965","172.30.1.205","172.30.1.104","TCP","54","39602 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46889","22.557375","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46890","22.561169","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46891","22.561179","172.30.1.205","172.30.1.104","TCP","54","39602 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46892","22.562136","172.30.1.205","172.30.1.104","TCP","74","46968 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925788 TSecr=0 WS=128" "46893","22.562448","172.30.1.104","172.30.1.205","TCP","66","135 > 46968 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46894","22.562459","172.30.1.205","172.30.1.104","TCP","54","46968 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46895","22.562811","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46896","22.563136","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46897","22.563145","172.30.1.205","172.30.1.104","TCP","54","46968 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46898","22.565350","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46899","22.565796","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46900","22.565802","172.30.1.205","172.30.1.104","TCP","54","46968 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46901","22.567607","172.30.1.205","172.30.1.104","TCP","54","46968 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46902","22.567723","172.30.1.205","172.30.1.104","TCP","74","39606 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925794 TSecr=0 WS=128" "46903","22.567887","172.30.1.104","172.30.1.205","TCP","54","135 > 46968 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46904","22.567950","172.30.1.104","172.30.1.205","TCP","54","135 > 46968 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46905","22.567961","172.30.1.205","172.30.1.104","TCP","54","46968 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46906","22.568034","172.30.1.104","172.30.1.205","TCP","66","49671 > 39606 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46907","22.568042","172.30.1.205","172.30.1.104","TCP","54","39606 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46908","22.568388","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46909","22.568690","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46910","22.568699","172.30.1.205","172.30.1.104","TCP","54","39606 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46911","22.570592","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46912","22.571026","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46913","22.571032","172.30.1.205","172.30.1.104","TCP","54","39606 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46914","22.572375","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46915","22.576024","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46916","22.576034","172.30.1.205","172.30.1.104","TCP","54","39606 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46917","22.577001","172.30.1.205","172.30.1.104","TCP","74","46972 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925803 TSecr=0 WS=128" "46918","22.577365","172.30.1.104","172.30.1.205","TCP","66","135 > 46972 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46919","22.577387","172.30.1.205","172.30.1.104","TCP","54","46972 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46920","22.577967","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46921","22.578321","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46922","22.578330","172.30.1.205","172.30.1.104","TCP","54","46972 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46923","22.580510","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46924","22.580996","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46925","22.581003","172.30.1.205","172.30.1.104","TCP","54","46972 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46926","22.582811","172.30.1.205","172.30.1.104","TCP","54","46972 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46927","22.582922","172.30.1.205","172.30.1.104","TCP","74","39610 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925809 TSecr=0 WS=128" "46928","22.583130","172.30.1.104","172.30.1.205","TCP","54","135 > 46972 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46929","22.583239","172.30.1.104","172.30.1.205","TCP","66","49671 > 39610 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46930","22.583248","172.30.1.205","172.30.1.104","TCP","54","39610 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46931","22.583254","172.30.1.104","172.30.1.205","TCP","54","135 > 46972 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46932","22.583257","172.30.1.205","172.30.1.104","TCP","54","46972 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46933","22.583604","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46934","22.583907","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46935","22.583916","172.30.1.205","172.30.1.104","TCP","54","39610 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46936","22.585828","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46937","22.586240","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46938","22.586246","172.30.1.205","172.30.1.104","TCP","54","39610 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46939","22.587589","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46940","22.591373","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46941","22.591384","172.30.1.205","172.30.1.104","TCP","54","39610 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46942","22.592355","172.30.1.205","172.30.1.104","TCP","74","46976 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925818 TSecr=0 WS=128" "46943","22.592673","172.30.1.104","172.30.1.205","TCP","66","135 > 46976 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46944","22.592684","172.30.1.205","172.30.1.104","TCP","54","46976 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46945","22.593083","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46946","22.593421","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46947","22.593430","172.30.1.205","172.30.1.104","TCP","54","46976 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46948","22.595704","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46949","22.596156","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46950","22.596162","172.30.1.205","172.30.1.104","TCP","54","46976 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46951","22.598005","172.30.1.205","172.30.1.104","TCP","54","46976 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46952","22.598129","172.30.1.205","172.30.1.104","TCP","74","39614 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925824 TSecr=0 WS=128" "46953","22.598287","172.30.1.104","172.30.1.205","TCP","54","135 > 46976 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46954","22.598334","172.30.1.104","172.30.1.205","TCP","54","135 > 46976 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46955","22.598339","172.30.1.205","172.30.1.104","TCP","54","46976 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46956","22.598414","172.30.1.104","172.30.1.205","TCP","66","49671 > 39614 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46957","22.598423","172.30.1.205","172.30.1.104","TCP","54","39614 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46958","22.598769","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46959","22.599058","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46960","22.599066","172.30.1.205","172.30.1.104","TCP","54","39614 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46961","22.601016","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46962","22.601429","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46963","22.601435","172.30.1.205","172.30.1.104","TCP","54","39614 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46964","22.602800","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46965","22.606514","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46966","22.606524","172.30.1.205","172.30.1.104","TCP","54","39614 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46967","22.607456","172.30.1.205","172.30.1.104","TCP","74","46980 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925833 TSecr=0 WS=128" "46968","22.607835","172.30.1.104","172.30.1.205","TCP","66","135 > 46980 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46969","22.607846","172.30.1.205","172.30.1.104","TCP","54","46980 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46970","22.608201","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46971","22.608497","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46972","22.608506","172.30.1.205","172.30.1.104","TCP","54","46980 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46973","22.610717","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46974","22.611162","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "46975","22.611175","172.30.1.205","172.30.1.104","TCP","54","46980 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "46976","22.613141","172.30.1.205","172.30.1.104","TCP","54","46980 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "46977","22.613250","172.30.1.205","172.30.1.104","TCP","74","39618 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925839 TSecr=0 WS=128" "46978","22.613397","172.30.1.104","172.30.1.205","TCP","54","135 > 46980 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46979","22.613425","172.30.1.104","172.30.1.205","TCP","54","135 > 46980 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "46980","22.613430","172.30.1.205","172.30.1.104","TCP","54","46980 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "46981","22.613523","172.30.1.104","172.30.1.205","TCP","66","49671 > 39618 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46982","22.613531","172.30.1.205","172.30.1.104","TCP","54","39618 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46983","22.613877","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "46984","22.614142","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46985","22.614151","172.30.1.205","172.30.1.104","TCP","54","39618 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46986","22.616027","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "46987","22.616419","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "46988","22.616431","172.30.1.205","172.30.1.104","TCP","54","39618 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "46989","22.618034","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "46990","22.623922","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "46991","22.623933","172.30.1.205","172.30.1.104","TCP","54","39618 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "46992","22.624892","172.30.1.205","172.30.1.104","TCP","74","46984 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925851 TSecr=0 WS=128" "46993","22.625280","172.30.1.104","172.30.1.205","TCP","66","135 > 46984 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "46994","22.625290","172.30.1.205","172.30.1.104","TCP","54","46984 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "46995","22.625686","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "46996","22.625963","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "46997","22.625972","172.30.1.205","172.30.1.104","TCP","54","46984 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "46998","22.628213","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "46999","22.628607","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47000","22.628614","172.30.1.205","172.30.1.104","TCP","54","46984 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47001","22.629514","172.30.1.205","172.30.1.104","TCP","54","39578 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47002","22.629564","172.30.1.205","172.30.1.104","TCP","54","39582 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47003","22.629595","172.30.1.205","172.30.1.104","TCP","54","39586 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47004","22.629619","172.30.1.205","172.30.1.104","TCP","54","39590 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47005","22.629647","172.30.1.205","172.30.1.104","TCP","54","39594 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47006","22.629671","172.30.1.205","172.30.1.104","TCP","54","39598 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47007","22.629742","172.30.1.205","172.30.1.104","TCP","54","39602 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47008","22.629783","172.30.1.104","172.30.1.205","TCP","54","49671 > 39578 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47009","22.629799","172.30.1.205","172.30.1.104","TCP","54","39606 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47010","22.629836","172.30.1.205","172.30.1.104","TCP","54","39610 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47011","22.629868","172.30.1.205","172.30.1.104","TCP","54","39614 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47012","22.629893","172.30.1.205","172.30.1.104","TCP","54","39618 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47013","22.629916","172.30.1.104","172.30.1.205","TCP","54","49671 > 39582 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47014","22.629935","172.30.1.104","172.30.1.205","TCP","54","49671 > 39578 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47015","22.629941","172.30.1.205","172.30.1.104","TCP","54","39578 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47016","22.629956","172.30.1.104","172.30.1.205","TCP","54","49671 > 39582 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47017","22.629959","172.30.1.205","172.30.1.104","TCP","54","39582 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47018","22.630018","172.30.1.205","172.30.1.104","TCP","54","39574 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47019","22.630238","172.30.1.104","172.30.1.205","TCP","54","49671 > 39586 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47020","22.630255","172.30.1.104","172.30.1.205","TCP","54","49671 > 39590 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47021","22.630282","172.30.1.104","172.30.1.205","TCP","54","49671 > 39594 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47022","22.630309","172.30.1.104","172.30.1.205","TCP","54","49671 > 39598 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47023","22.630329","172.30.1.104","172.30.1.205","TCP","54","49671 > 39602 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47024","22.630349","172.30.1.104","172.30.1.205","TCP","54","49671 > 39606 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47025","22.630383","172.30.1.104","172.30.1.205","TCP","54","49671 > 39610 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47026","22.630405","172.30.1.104","172.30.1.205","TCP","54","49671 > 39610 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47027","22.630411","172.30.1.205","172.30.1.104","TCP","54","39610 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47028","22.630425","172.30.1.104","172.30.1.205","TCP","54","49671 > 39606 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47029","22.630427","172.30.1.205","172.30.1.104","TCP","54","39606 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47030","22.630454","172.30.1.104","172.30.1.205","TCP","54","49671 > 39602 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47031","22.630458","172.30.1.205","172.30.1.104","TCP","54","39602 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47032","22.630469","172.30.1.104","172.30.1.205","TCP","54","49671 > 39598 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47033","22.630472","172.30.1.205","172.30.1.104","TCP","54","39598 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47034","22.630489","172.30.1.104","172.30.1.205","TCP","54","49671 > 39586 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47035","22.630492","172.30.1.205","172.30.1.104","TCP","54","39586 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47036","22.630509","172.30.1.104","172.30.1.205","TCP","54","49671 > 39590 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47037","22.630512","172.30.1.205","172.30.1.104","TCP","54","39590 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47038","22.630528","172.30.1.104","172.30.1.205","TCP","54","49671 > 39594 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47039","22.630531","172.30.1.205","172.30.1.104","TCP","54","39594 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47040","22.630570","172.30.1.104","172.30.1.205","TCP","54","49671 > 39614 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47041","22.630744","172.30.1.104","172.30.1.205","TCP","54","49671 > 39618 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47042","22.630765","172.30.1.104","172.30.1.205","TCP","54","49671 > 39574 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47043","22.630786","172.30.1.104","172.30.1.205","TCP","54","49671 > 39614 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47044","22.630791","172.30.1.205","172.30.1.104","TCP","54","39614 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47045","22.631008","172.30.1.104","172.30.1.205","TCP","54","49671 > 39618 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47046","22.631012","172.30.1.205","172.30.1.104","TCP","54","39618 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47047","22.631018","172.30.1.104","172.30.1.205","TCP","54","49671 > 39574 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47048","22.631020","172.30.1.205","172.30.1.104","TCP","54","39574 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47049","22.631575","172.30.1.205","172.30.1.104","TCP","54","46984 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47050","22.631694","172.30.1.205","172.30.1.104","TCP","74","39622 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925858 TSecr=0 WS=128" "47051","22.631854","172.30.1.104","172.30.1.205","TCP","54","135 > 46984 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47052","22.631886","172.30.1.104","172.30.1.205","TCP","54","135 > 46984 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47053","22.631891","172.30.1.205","172.30.1.104","TCP","54","46984 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47054","22.631963","172.30.1.104","172.30.1.205","TCP","66","49671 > 39622 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47055","22.631972","172.30.1.205","172.30.1.104","TCP","54","39622 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47056","22.632324","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47057","22.632615","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47058","22.632623","172.30.1.205","172.30.1.104","TCP","54","39622 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47059","22.634545","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47060","22.634955","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47061","22.634961","172.30.1.205","172.30.1.104","TCP","54","39622 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47062","22.636316","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47063","22.640063","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47064","22.640072","172.30.1.205","172.30.1.104","TCP","54","39622 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47065","22.641048","172.30.1.205","172.30.1.104","TCP","74","46988 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925867 TSecr=0 WS=128" "47066","22.641376","172.30.1.104","172.30.1.205","TCP","66","135 > 46988 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47067","22.641387","172.30.1.205","172.30.1.104","TCP","54","46988 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47068","22.641740","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47069","22.642109","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47070","22.642118","172.30.1.205","172.30.1.104","TCP","54","46988 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47071","22.644298","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47072","22.644709","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47073","22.644715","172.30.1.205","172.30.1.104","TCP","54","46988 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47074","22.646517","172.30.1.205","172.30.1.104","TCP","54","46988 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47075","22.646627","172.30.1.205","172.30.1.104","TCP","74","39626 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925873 TSecr=0 WS=128" "47076","22.646775","172.30.1.104","172.30.1.205","TCP","54","135 > 46988 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47077","22.646820","172.30.1.104","172.30.1.205","TCP","54","135 > 46988 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47078","22.646826","172.30.1.205","172.30.1.104","TCP","54","46988 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47079","22.646905","172.30.1.104","172.30.1.205","TCP","66","49671 > 39626 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47080","22.646913","172.30.1.205","172.30.1.104","TCP","54","39626 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47081","22.647255","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47082","22.647555","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47083","22.647563","172.30.1.205","172.30.1.104","TCP","54","39626 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47084","22.649477","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47085","22.649817","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47086","22.649823","172.30.1.205","172.30.1.104","TCP","54","39626 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47087","22.651168","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47088","22.654807","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47089","22.654831","172.30.1.205","172.30.1.104","TCP","54","39626 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47090","22.655953","172.30.1.205","172.30.1.104","TCP","74","46992 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925882 TSecr=0 WS=128" "47091","22.656294","172.30.1.104","172.30.1.205","TCP","66","135 > 46992 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47092","22.656307","172.30.1.205","172.30.1.104","TCP","54","46992 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47093","22.656672","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47094","22.657001","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47095","22.657013","172.30.1.205","172.30.1.104","TCP","54","46992 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47096","22.659287","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47097","22.659728","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47098","22.659735","172.30.1.205","172.30.1.104","TCP","54","46992 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47099","22.661568","172.30.1.205","172.30.1.104","TCP","54","46992 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47100","22.661686","172.30.1.205","172.30.1.104","TCP","74","39630 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925888 TSecr=0 WS=128" "47101","22.661823","172.30.1.104","172.30.1.205","TCP","54","135 > 46992 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47102","22.661865","172.30.1.104","172.30.1.205","TCP","54","135 > 46992 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47103","22.661871","172.30.1.205","172.30.1.104","TCP","54","46992 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47104","22.661958","172.30.1.104","172.30.1.205","TCP","66","49671 > 39630 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47105","22.661967","172.30.1.205","172.30.1.104","TCP","54","39630 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47106","22.662317","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47107","22.663623","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47108","22.663632","172.30.1.205","172.30.1.104","TCP","54","39630 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47109","22.665571","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47110","22.666027","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47111","22.666035","172.30.1.205","172.30.1.104","TCP","54","39630 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47112","22.667403","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47113","22.671155","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47114","22.671165","172.30.1.205","172.30.1.104","TCP","54","39630 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47115","22.672148","172.30.1.205","172.30.1.104","TCP","74","46996 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925898 TSecr=0 WS=128" "47116","22.672494","172.30.1.104","172.30.1.205","TCP","66","135 > 46996 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47117","22.672504","172.30.1.205","172.30.1.104","TCP","54","46996 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47118","22.672903","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47119","22.673199","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47120","22.673208","172.30.1.205","172.30.1.104","TCP","54","46996 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47121","22.675425","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47122","22.675854","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47123","22.675860","172.30.1.205","172.30.1.104","TCP","54","46996 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47124","22.677711","172.30.1.205","172.30.1.104","TCP","54","46996 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47125","22.677825","172.30.1.205","172.30.1.104","TCP","74","39634 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925904 TSecr=0 WS=128" "47126","22.677986","172.30.1.104","172.30.1.205","TCP","54","135 > 46996 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47127","22.678037","172.30.1.104","172.30.1.205","TCP","54","135 > 46996 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47128","22.678043","172.30.1.205","172.30.1.104","TCP","54","46996 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47129","22.678143","172.30.1.104","172.30.1.205","TCP","66","49671 > 39634 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47130","22.678153","172.30.1.205","172.30.1.104","TCP","54","39634 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47131","22.678517","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47132","22.678821","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47133","22.678830","172.30.1.205","172.30.1.104","TCP","54","39634 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47134","22.680724","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47135","22.681094","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47136","22.681101","172.30.1.205","172.30.1.104","TCP","54","39634 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47137","22.682467","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47138","22.686191","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47139","22.686201","172.30.1.205","172.30.1.104","TCP","54","39634 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47140","22.687152","172.30.1.205","172.30.1.104","TCP","74","47000 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925913 TSecr=0 WS=128" "47141","22.687475","172.30.1.104","172.30.1.205","TCP","66","135 > 47000 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47142","22.687486","172.30.1.205","172.30.1.104","TCP","54","47000 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47143","22.687838","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47144","22.688167","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47145","22.688176","172.30.1.205","172.30.1.104","TCP","54","47000 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47146","22.690388","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47147","22.690866","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47148","22.690873","172.30.1.205","172.30.1.104","TCP","54","47000 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47149","22.692687","172.30.1.205","172.30.1.104","TCP","54","47000 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47150","22.692821","172.30.1.205","172.30.1.104","TCP","74","39638 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925919 TSecr=0 WS=128" "47151","22.692999","172.30.1.104","172.30.1.205","TCP","54","135 > 47000 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47152","22.693010","172.30.1.104","172.30.1.205","TCP","54","135 > 47000 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47153","22.693016","172.30.1.205","172.30.1.104","TCP","54","47000 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47154","22.693105","172.30.1.104","172.30.1.205","TCP","66","49671 > 39638 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47155","22.693114","172.30.1.205","172.30.1.104","TCP","54","39638 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47156","22.693463","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47157","22.693739","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47158","22.693748","172.30.1.205","172.30.1.104","TCP","54","39638 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47159","22.695613","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47160","22.695991","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47161","22.696016","172.30.1.205","172.30.1.104","TCP","54","39638 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47162","22.697402","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47163","22.701163","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47164","22.701173","172.30.1.205","172.30.1.104","TCP","54","39638 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47165","22.702146","172.30.1.205","172.30.1.104","TCP","74","47004 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925928 TSecr=0 WS=128" "47166","22.702491","172.30.1.104","172.30.1.205","TCP","66","135 > 47004 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47167","22.702502","172.30.1.205","172.30.1.104","TCP","54","47004 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47168","22.702855","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47169","22.703150","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47170","22.703160","172.30.1.205","172.30.1.104","TCP","54","47004 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47171","22.705417","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47172","22.705874","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47173","22.705881","172.30.1.205","172.30.1.104","TCP","54","47004 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47174","22.707753","172.30.1.205","172.30.1.104","TCP","54","47004 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47175","22.707862","172.30.1.205","172.30.1.104","TCP","74","39642 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925934 TSecr=0 WS=128" "47176","22.708215","172.30.1.104","172.30.1.205","TCP","66","49671 > 39642 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47177","22.708226","172.30.1.205","172.30.1.104","TCP","54","39642 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47178","22.708251","172.30.1.104","172.30.1.205","TCP","54","135 > 47004 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47179","22.708262","172.30.1.104","172.30.1.205","TCP","54","135 > 47004 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47180","22.708266","172.30.1.205","172.30.1.104","TCP","54","47004 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47181","22.708608","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47182","22.708903","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47183","22.708913","172.30.1.205","172.30.1.104","TCP","54","39642 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47184","22.710881","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47185","22.711251","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47186","22.711257","172.30.1.205","172.30.1.104","TCP","54","39642 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47187","22.712714","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47188","22.716456","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47189","22.716466","172.30.1.205","172.30.1.104","TCP","54","39642 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47190","22.717435","172.30.1.205","172.30.1.104","TCP","74","47008 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925943 TSecr=0 WS=128" "47191","22.717790","172.30.1.104","172.30.1.205","TCP","66","135 > 47008 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47192","22.717802","172.30.1.205","172.30.1.104","TCP","54","47008 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47193","22.718179","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47194","22.718534","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47195","22.718543","172.30.1.205","172.30.1.104","TCP","54","47008 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47196","22.720739","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47197","22.721164","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47198","22.721170","172.30.1.205","172.30.1.104","TCP","54","47008 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47199","22.722982","172.30.1.205","172.30.1.104","TCP","54","47008 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47200","22.723094","172.30.1.205","172.30.1.104","TCP","74","39646 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925949 TSecr=0 WS=128" "47201","22.723245","172.30.1.104","172.30.1.205","TCP","54","135 > 47008 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47202","22.723255","172.30.1.104","172.30.1.205","TCP","54","135 > 47008 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47203","22.723261","172.30.1.205","172.30.1.104","TCP","54","47008 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47204","22.723359","172.30.1.104","172.30.1.205","TCP","66","49671 > 39646 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47205","22.723367","172.30.1.205","172.30.1.104","TCP","54","39646 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47206","22.723737","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47207","22.724041","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47208","22.724057","172.30.1.205","172.30.1.104","TCP","54","39646 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47209","22.726212","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47210","22.727684","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47211","22.727691","172.30.1.205","172.30.1.104","TCP","54","39646 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47212","22.729104","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47213","22.732821","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47214","22.732830","172.30.1.205","172.30.1.104","TCP","54","39646 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47215","22.733798","172.30.1.205","172.30.1.104","TCP","74","47012 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925960 TSecr=0 WS=128" "47216","22.734149","172.30.1.104","172.30.1.205","TCP","66","135 > 47012 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47217","22.734161","172.30.1.205","172.30.1.104","TCP","54","47012 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47218","22.734521","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47219","22.734812","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47220","22.734821","172.30.1.205","172.30.1.104","TCP","54","47012 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47221","22.737036","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47222","22.737430","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47223","22.737438","172.30.1.205","172.30.1.104","TCP","54","47012 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47224","22.739276","172.30.1.205","172.30.1.104","TCP","54","47012 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47225","22.739389","172.30.1.205","172.30.1.104","TCP","74","39650 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925965 TSecr=0 WS=128" "47226","22.739544","172.30.1.104","172.30.1.205","TCP","54","135 > 47012 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47227","22.739574","172.30.1.104","172.30.1.205","TCP","54","135 > 47012 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47228","22.739580","172.30.1.205","172.30.1.104","TCP","54","47012 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47229","22.739681","172.30.1.104","172.30.1.205","TCP","66","49671 > 39650 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47230","22.739689","172.30.1.205","172.30.1.104","TCP","54","39650 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47231","22.740034","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47232","22.740327","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47233","22.740336","172.30.1.205","172.30.1.104","TCP","54","39650 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47234","22.742277","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47235","22.742633","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47236","22.742640","172.30.1.205","172.30.1.104","TCP","54","39650 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47237","22.743997","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47238","22.748162","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47239","22.748172","172.30.1.205","172.30.1.104","TCP","54","39650 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47240","22.749158","172.30.1.205","172.30.1.104","TCP","74","47016 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925975 TSecr=0 WS=128" "47241","22.749441","172.30.1.104","172.30.1.205","TCP","66","135 > 47016 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47242","22.749452","172.30.1.205","172.30.1.104","TCP","54","47016 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47243","22.749807","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47244","22.750087","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47245","22.750096","172.30.1.205","172.30.1.104","TCP","54","47016 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47246","22.752289","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47247","22.752684","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47248","22.752690","172.30.1.205","172.30.1.104","TCP","54","47016 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47249","22.754537","172.30.1.205","172.30.1.104","TCP","54","47016 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47250","22.754649","172.30.1.205","172.30.1.104","TCP","74","39654 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925981 TSecr=0 WS=128" "47251","22.754794","172.30.1.104","172.30.1.205","TCP","54","135 > 47016 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47252","22.754805","172.30.1.104","172.30.1.205","TCP","54","135 > 47016 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47253","22.754810","172.30.1.205","172.30.1.104","TCP","54","47016 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47254","22.754974","172.30.1.104","172.30.1.205","TCP","66","49671 > 39654 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47255","22.754982","172.30.1.205","172.30.1.104","TCP","54","39654 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47256","22.755344","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47257","22.755624","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47258","22.755633","172.30.1.205","172.30.1.104","TCP","54","39654 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47259","22.757569","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47260","22.758308","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47261","22.758316","172.30.1.205","172.30.1.104","TCP","54","39654 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47262","22.759688","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47263","22.763454","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47264","22.763465","172.30.1.205","172.30.1.104","TCP","54","39654 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47265","22.764425","172.30.1.205","172.30.1.104","TCP","74","47020 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925990 TSecr=0 WS=128" "47266","22.764769","172.30.1.104","172.30.1.205","TCP","66","135 > 47020 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47267","22.764789","172.30.1.205","172.30.1.104","TCP","54","47020 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47268","22.765155","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47269","22.765445","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47270","22.765454","172.30.1.205","172.30.1.104","TCP","54","47020 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47271","22.767662","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47272","22.768118","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47273","22.768124","172.30.1.205","172.30.1.104","TCP","54","47020 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47274","22.769977","172.30.1.205","172.30.1.104","TCP","54","47020 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47275","22.770110","172.30.1.205","172.30.1.104","TCP","74","39658 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499925996 TSecr=0 WS=128" "47276","22.770252","172.30.1.104","172.30.1.205","TCP","54","135 > 47020 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47277","22.770262","172.30.1.104","172.30.1.205","TCP","54","135 > 47020 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47278","22.770268","172.30.1.205","172.30.1.104","TCP","54","47020 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47279","22.770411","172.30.1.104","172.30.1.205","TCP","66","49671 > 39658 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47280","22.770419","172.30.1.205","172.30.1.104","TCP","54","39658 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47281","22.770766","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47282","22.771035","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47283","22.771044","172.30.1.205","172.30.1.104","TCP","54","39658 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47284","22.772945","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47285","22.774006","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47286","22.774013","172.30.1.205","172.30.1.104","TCP","54","39658 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47287","22.775374","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47288","22.779440","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47289","22.779450","172.30.1.205","172.30.1.104","TCP","54","39658 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47290","22.780433","172.30.1.205","172.30.1.104","TCP","74","47024 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926006 TSecr=0 WS=128" "47291","22.780792","172.30.1.104","172.30.1.205","TCP","66","135 > 47024 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47292","22.780804","172.30.1.205","172.30.1.104","TCP","54","47024 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47293","22.781175","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47294","22.781456","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47295","22.781465","172.30.1.205","172.30.1.104","TCP","54","47024 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47296","22.783692","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47297","22.784145","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47298","22.784152","172.30.1.205","172.30.1.104","TCP","54","47024 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47299","22.785996","172.30.1.205","172.30.1.104","TCP","54","47024 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47300","22.786112","172.30.1.205","172.30.1.104","TCP","74","39662 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926012 TSecr=0 WS=128" "47301","22.786265","172.30.1.104","172.30.1.205","TCP","54","135 > 47024 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47302","22.786277","172.30.1.104","172.30.1.205","TCP","54","135 > 47024 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47303","22.786284","172.30.1.205","172.30.1.104","TCP","54","47024 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47304","22.786414","172.30.1.104","172.30.1.205","TCP","66","49671 > 39662 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47305","22.786422","172.30.1.205","172.30.1.104","TCP","54","39662 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47306","22.786773","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47307","22.787100","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47308","22.787109","172.30.1.205","172.30.1.104","TCP","54","39662 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47309","22.789020","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47310","22.789382","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47311","22.789389","172.30.1.205","172.30.1.104","TCP","54","39662 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47312","22.790744","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47313","22.794490","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47314","22.794502","172.30.1.205","172.30.1.104","TCP","54","39662 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47315","22.795493","172.30.1.205","172.30.1.104","TCP","74","47028 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926021 TSecr=0 WS=128" "47316","22.795860","172.30.1.104","172.30.1.205","TCP","66","135 > 47028 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47317","22.795873","172.30.1.205","172.30.1.104","TCP","54","47028 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47318","22.796231","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47319","22.796534","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47320","22.796543","172.30.1.205","172.30.1.104","TCP","54","47028 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47321","22.798776","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47322","22.799255","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47323","22.799262","172.30.1.205","172.30.1.104","TCP","54","47028 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47324","22.801129","172.30.1.205","172.30.1.104","TCP","54","47028 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47325","22.801248","172.30.1.205","172.30.1.104","TCP","74","39666 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926027 TSecr=0 WS=128" "47326","22.801430","172.30.1.104","172.30.1.205","TCP","54","135 > 47028 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47327","22.801441","172.30.1.104","172.30.1.205","TCP","54","135 > 47028 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47328","22.801447","172.30.1.205","172.30.1.104","TCP","54","47028 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47329","22.801578","172.30.1.104","172.30.1.205","TCP","66","49671 > 39666 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47330","22.801586","172.30.1.205","172.30.1.104","TCP","54","39666 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47331","22.801951","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47332","22.802245","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47333","22.802254","172.30.1.205","172.30.1.104","TCP","54","39666 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47334","22.804132","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47335","22.804569","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47336","22.804576","172.30.1.205","172.30.1.104","TCP","54","39666 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47337","22.805953","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47338","22.809511","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47339","22.809524","172.30.1.205","172.30.1.104","TCP","54","39666 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47340","22.810757","172.30.1.205","172.30.1.104","TCP","74","47032 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926037 TSecr=0 WS=128" "47341","22.811100","172.30.1.104","172.30.1.205","TCP","66","135 > 47032 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47342","22.811112","172.30.1.205","172.30.1.104","TCP","54","47032 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47343","22.811472","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47344","22.811761","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47345","22.811770","172.30.1.205","172.30.1.104","TCP","54","47032 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47346","22.813971","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47347","22.814403","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47348","22.814410","172.30.1.205","172.30.1.104","TCP","54","47032 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47349","22.815262","172.30.1.205","172.30.1.104","TCP","54","39626 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47350","22.815311","172.30.1.205","172.30.1.104","TCP","54","39630 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47351","22.815349","172.30.1.205","172.30.1.104","TCP","54","39634 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47352","22.815383","172.30.1.205","172.30.1.104","TCP","54","39638 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47353","22.815411","172.30.1.205","172.30.1.104","TCP","54","39642 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47354","22.815440","172.30.1.205","172.30.1.104","TCP","54","39646 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47355","22.815472","172.30.1.205","172.30.1.104","TCP","54","39650 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47356","22.815506","172.30.1.205","172.30.1.104","TCP","54","39654 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47357","22.815532","172.30.1.205","172.30.1.104","TCP","54","39658 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47358","22.815560","172.30.1.205","172.30.1.104","TCP","54","39662 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47359","22.815591","172.30.1.205","172.30.1.104","TCP","54","39666 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47360","22.815661","172.30.1.205","172.30.1.104","TCP","54","39622 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47361","22.815905","172.30.1.104","172.30.1.205","TCP","54","49671 > 39626 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47362","22.815922","172.30.1.104","172.30.1.205","TCP","54","49671 > 39630 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47363","22.815940","172.30.1.104","172.30.1.205","TCP","54","49671 > 39626 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47364","22.815947","172.30.1.205","172.30.1.104","TCP","54","39626 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47365","22.815971","172.30.1.104","172.30.1.205","TCP","54","49671 > 39630 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47366","22.815975","172.30.1.205","172.30.1.104","TCP","54","39630 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47367","22.816019","172.30.1.104","172.30.1.205","TCP","54","49671 > 39634 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47368","22.816037","172.30.1.104","172.30.1.205","TCP","54","49671 > 39638 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47369","22.816062","172.30.1.104","172.30.1.205","TCP","54","49671 > 39634 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47370","22.816067","172.30.1.205","172.30.1.104","TCP","54","39634 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47371","22.816086","172.30.1.104","172.30.1.205","TCP","54","49671 > 39642 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47372","22.816164","172.30.1.104","172.30.1.205","TCP","54","49671 > 39638 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47373","22.816168","172.30.1.205","172.30.1.104","TCP","54","39638 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47374","22.816184","172.30.1.104","172.30.1.205","TCP","54","49671 > 39646 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47375","22.816207","172.30.1.104","172.30.1.205","TCP","54","49671 > 39650 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47376","22.816227","172.30.1.104","172.30.1.205","TCP","54","49671 > 39650 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47377","22.816230","172.30.1.205","172.30.1.104","TCP","54","39650 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47378","22.816274","172.30.1.104","172.30.1.205","TCP","54","49671 > 39654 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47379","22.816293","172.30.1.104","172.30.1.205","TCP","54","49671 > 39654 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47380","22.816297","172.30.1.205","172.30.1.104","TCP","54","39654 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47381","22.816313","172.30.1.104","172.30.1.205","TCP","54","49671 > 39658 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47382","22.816334","172.30.1.104","172.30.1.205","TCP","54","49671 > 39658 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47383","22.816338","172.30.1.205","172.30.1.104","TCP","54","39658 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47384","22.816355","172.30.1.104","172.30.1.205","TCP","54","49671 > 39662 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47385","22.816377","172.30.1.104","172.30.1.205","TCP","54","49671 > 39662 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47386","22.816380","172.30.1.205","172.30.1.104","TCP","54","39662 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47387","22.816482","172.30.1.104","172.30.1.205","TCP","54","49671 > 39666 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47388","22.816503","172.30.1.104","172.30.1.205","TCP","54","49671 > 39666 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47389","22.816506","172.30.1.205","172.30.1.104","TCP","54","39666 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47390","22.816772","172.30.1.104","172.30.1.205","TCP","54","49671 > 39642 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47391","22.816790","172.30.1.205","172.30.1.104","TCP","54","39642 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47392","22.816807","172.30.1.104","172.30.1.205","TCP","54","49671 > 39622 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47393","22.816817","172.30.1.104","172.30.1.205","TCP","54","49671 > 39646 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47394","22.816820","172.30.1.205","172.30.1.104","TCP","54","39646 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47395","22.816920","172.30.1.104","172.30.1.205","TCP","54","49671 > 39622 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47396","22.816925","172.30.1.205","172.30.1.104","TCP","54","39622 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47397","22.817331","172.30.1.205","172.30.1.104","TCP","54","47032 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47398","22.817442","172.30.1.205","172.30.1.104","TCP","74","39670 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926043 TSecr=0 WS=128" "47399","22.817915","172.30.1.104","172.30.1.205","TCP","54","135 > 47032 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47400","22.817956","172.30.1.104","172.30.1.205","TCP","54","135 > 47032 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47401","22.817960","172.30.1.205","172.30.1.104","TCP","54","47032 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47402","22.817992","172.30.1.104","172.30.1.205","TCP","66","49671 > 39670 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47403","22.818000","172.30.1.205","172.30.1.104","TCP","54","39670 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47404","22.818352","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47405","22.818666","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47406","22.818676","172.30.1.205","172.30.1.104","TCP","54","39670 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47407","22.820543","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47408","22.820925","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47409","22.820932","172.30.1.205","172.30.1.104","TCP","54","39670 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47410","22.822305","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47411","22.826054","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47412","22.826064","172.30.1.205","172.30.1.104","TCP","54","39670 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47413","22.827019","172.30.1.205","172.30.1.104","TCP","74","47036 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926053 TSecr=0 WS=128" "47414","22.827347","172.30.1.104","172.30.1.205","TCP","66","135 > 47036 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47415","22.827359","172.30.1.205","172.30.1.104","TCP","54","47036 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47416","22.827723","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47417","22.829962","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47418","22.829977","172.30.1.205","172.30.1.104","TCP","54","47036 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47419","22.832167","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47420","22.832638","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47421","22.832645","172.30.1.205","172.30.1.104","TCP","54","47036 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47422","22.834521","172.30.1.205","172.30.1.104","TCP","54","47036 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47423","22.834635","172.30.1.205","172.30.1.104","TCP","74","39674 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926061 TSecr=0 WS=128" "47424","22.834809","172.30.1.104","172.30.1.205","TCP","54","135 > 47036 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47425","22.834882","172.30.1.104","172.30.1.205","TCP","54","135 > 47036 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47426","22.834887","172.30.1.205","172.30.1.104","TCP","54","47036 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47427","22.834918","172.30.1.104","172.30.1.205","TCP","66","49671 > 39674 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47428","22.834926","172.30.1.205","172.30.1.104","TCP","54","39674 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47429","22.835268","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47430","22.835559","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47431","22.835568","172.30.1.205","172.30.1.104","TCP","54","39674 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47432","22.837478","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47433","22.837897","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47434","22.837904","172.30.1.205","172.30.1.104","TCP","54","39674 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47435","22.839273","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47436","22.842996","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47437","22.843007","172.30.1.205","172.30.1.104","TCP","54","39674 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47438","22.843972","172.30.1.205","172.30.1.104","TCP","74","47040 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926070 TSecr=0 WS=128" "47439","22.844287","172.30.1.104","172.30.1.205","TCP","66","135 > 47040 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47440","22.844299","172.30.1.205","172.30.1.104","TCP","54","47040 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47441","22.844653","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47442","22.844950","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47443","22.844960","172.30.1.205","172.30.1.104","TCP","54","47040 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47444","22.847178","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47445","22.847657","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47446","22.847664","172.30.1.205","172.30.1.104","TCP","54","47040 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47447","22.849498","172.30.1.205","172.30.1.104","TCP","54","47040 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47448","22.849610","172.30.1.205","172.30.1.104","TCP","74","39678 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926076 TSecr=0 WS=128" "47449","22.849776","172.30.1.104","172.30.1.205","TCP","54","135 > 47040 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47450","22.849800","172.30.1.104","172.30.1.205","TCP","54","135 > 47040 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47451","22.849806","172.30.1.205","172.30.1.104","TCP","54","47040 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47452","22.849874","172.30.1.104","172.30.1.205","TCP","66","49671 > 39678 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47453","22.849882","172.30.1.205","172.30.1.104","TCP","54","39678 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47454","22.850229","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47455","22.850517","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47456","22.850528","172.30.1.205","172.30.1.104","TCP","54","39678 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47457","22.852428","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47458","22.852928","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47459","22.852935","172.30.1.205","172.30.1.104","TCP","54","39678 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47460","22.854321","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47461","22.858101","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47462","22.858111","172.30.1.205","172.30.1.104","TCP","54","39678 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47463","22.859063","172.30.1.205","172.30.1.104","TCP","74","47044 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926085 TSecr=0 WS=128" "47464","22.859362","172.30.1.104","172.30.1.205","TCP","66","135 > 47044 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47465","22.859372","172.30.1.205","172.30.1.104","TCP","54","47044 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47466","22.859728","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47467","22.860029","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47468","22.860038","172.30.1.205","172.30.1.104","TCP","54","47044 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47469","22.862270","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47470","22.862763","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47471","22.862770","172.30.1.205","172.30.1.104","TCP","54","47044 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47472","22.864592","172.30.1.205","172.30.1.104","TCP","54","47044 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47473","22.864703","172.30.1.205","172.30.1.104","TCP","74","39682 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926091 TSecr=0 WS=128" "47474","22.864873","172.30.1.104","172.30.1.205","TCP","54","135 > 47044 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47475","22.864911","172.30.1.104","172.30.1.205","TCP","54","135 > 47044 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47476","22.864917","172.30.1.205","172.30.1.104","TCP","54","47044 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47477","22.864989","172.30.1.104","172.30.1.205","TCP","66","49671 > 39682 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47478","22.864997","172.30.1.205","172.30.1.104","TCP","54","39682 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47479","22.865351","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47480","22.866317","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47481","22.866326","172.30.1.205","172.30.1.104","TCP","54","39682 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47482","22.868205","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47483","22.868620","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47484","22.868626","172.30.1.205","172.30.1.104","TCP","54","39682 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47485","22.870027","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47486","22.873779","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47487","22.873789","172.30.1.205","172.30.1.104","TCP","54","39682 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47488","22.874800","172.30.1.205","172.30.1.104","TCP","74","47048 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926101 TSecr=0 WS=128" "47489","22.875114","172.30.1.104","172.30.1.205","TCP","66","135 > 47048 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47490","22.875125","172.30.1.205","172.30.1.104","TCP","54","47048 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47491","22.875486","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47492","22.875779","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47493","22.875788","172.30.1.205","172.30.1.104","TCP","54","47048 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47494","22.878024","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47495","22.878438","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47496","22.878444","172.30.1.205","172.30.1.104","TCP","54","47048 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47497","22.880261","172.30.1.205","172.30.1.104","TCP","54","47048 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47498","22.880372","172.30.1.205","172.30.1.104","TCP","74","39686 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926106 TSecr=0 WS=128" "47499","22.880538","172.30.1.104","172.30.1.205","TCP","54","135 > 47048 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47500","22.880549","172.30.1.104","172.30.1.205","TCP","54","135 > 47048 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47501","22.880554","172.30.1.205","172.30.1.104","TCP","54","47048 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47502","22.880661","172.30.1.104","172.30.1.205","TCP","66","49671 > 39686 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47503","22.880669","172.30.1.205","172.30.1.104","TCP","54","39686 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47504","22.881061","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47505","22.881364","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47506","22.881373","172.30.1.205","172.30.1.104","TCP","54","39686 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47507","22.883258","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47508","22.883619","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47509","22.883626","172.30.1.205","172.30.1.104","TCP","54","39686 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47510","22.885013","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47511","22.888798","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47512","22.888808","172.30.1.205","172.30.1.104","TCP","54","39686 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47513","22.889749","172.30.1.205","172.30.1.104","TCP","74","47052 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926116 TSecr=0 WS=128" "47514","22.890136","172.30.1.104","172.30.1.205","TCP","66","135 > 47052 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47515","22.890147","172.30.1.205","172.30.1.104","TCP","54","47052 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47516","22.890505","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47517","22.890786","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47518","22.890795","172.30.1.205","172.30.1.104","TCP","54","47052 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47519","22.893005","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47520","22.893468","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47521","22.893475","172.30.1.205","172.30.1.104","TCP","54","47052 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47522","22.895303","172.30.1.205","172.30.1.104","TCP","54","47052 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47523","22.895414","172.30.1.205","172.30.1.104","TCP","74","39690 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926121 TSecr=0 WS=128" "47524","22.895571","172.30.1.104","172.30.1.205","TCP","54","135 > 47052 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47525","22.895582","172.30.1.104","172.30.1.205","TCP","54","135 > 47052 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47526","22.895587","172.30.1.205","172.30.1.104","TCP","54","47052 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47527","22.895741","172.30.1.104","172.30.1.205","TCP","66","49671 > 39690 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47528","22.895750","172.30.1.205","172.30.1.104","TCP","54","39690 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47529","22.896097","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47530","22.896394","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47531","22.896411","172.30.1.205","172.30.1.104","TCP","54","39690 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47532","22.898555","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47533","22.898969","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47534","22.898975","172.30.1.205","172.30.1.104","TCP","54","39690 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47535","22.900331","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47536","22.904117","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47537","22.904136","172.30.1.205","172.30.1.104","TCP","54","39690 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47538","22.905297","172.30.1.205","172.30.1.104","TCP","74","47056 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926131 TSecr=0 WS=128" "47539","22.905630","172.30.1.104","172.30.1.205","TCP","66","135 > 47056 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47540","22.905642","172.30.1.205","172.30.1.104","TCP","54","47056 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47541","22.906011","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47542","22.906283","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47543","22.906292","172.30.1.205","172.30.1.104","TCP","54","47056 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47544","22.908501","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47545","22.908922","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47546","22.908928","172.30.1.205","172.30.1.104","TCP","54","47056 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47547","22.910750","172.30.1.205","172.30.1.104","TCP","54","47056 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47548","22.910864","172.30.1.205","172.30.1.104","TCP","74","39694 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926137 TSecr=0 WS=128" "47549","22.910991","172.30.1.104","172.30.1.205","TCP","54","135 > 47056 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47550","22.911004","172.30.1.104","172.30.1.205","TCP","54","135 > 47056 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47551","22.911009","172.30.1.205","172.30.1.104","TCP","54","47056 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47552","22.911144","172.30.1.104","172.30.1.205","TCP","66","49671 > 39694 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47553","22.911164","172.30.1.205","172.30.1.104","TCP","54","39694 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47554","22.911513","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47555","22.911814","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47556","22.911823","172.30.1.205","172.30.1.104","TCP","54","39694 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47557","22.913785","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47558","22.914187","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47559","22.914194","172.30.1.205","172.30.1.104","TCP","54","39694 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47560","22.915561","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47561","22.919322","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47562","22.919332","172.30.1.205","172.30.1.104","TCP","54","39694 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47563","22.920279","172.30.1.205","172.30.1.104","TCP","74","47060 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926146 TSecr=0 WS=128" "47564","22.920627","172.30.1.104","172.30.1.205","TCP","66","135 > 47060 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47565","22.920639","172.30.1.205","172.30.1.104","TCP","54","47060 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47566","22.921030","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47567","22.921324","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47568","22.921335","172.30.1.205","172.30.1.104","TCP","54","47060 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47569","22.923539","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47570","22.923954","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47571","22.923961","172.30.1.205","172.30.1.104","TCP","54","47060 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47572","22.925794","172.30.1.205","172.30.1.104","TCP","54","47060 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47573","22.925904","172.30.1.205","172.30.1.104","TCP","74","39698 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926152 TSecr=0 WS=128" "47574","22.926040","172.30.1.104","172.30.1.205","TCP","54","135 > 47060 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47575","22.926055","172.30.1.104","172.30.1.205","TCP","54","135 > 47060 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47576","22.926060","172.30.1.205","172.30.1.104","TCP","54","47060 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47577","22.926180","172.30.1.104","172.30.1.205","TCP","66","49671 > 39698 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47578","22.926189","172.30.1.205","172.30.1.104","TCP","54","39698 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47579","22.926538","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47580","22.926826","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47581","22.926834","172.30.1.205","172.30.1.104","TCP","54","39698 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47582","22.928735","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47583","22.929087","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47584","22.929094","172.30.1.205","172.30.1.104","TCP","54","39698 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47585","22.930497","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47586","22.934456","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47587","22.934466","172.30.1.205","172.30.1.104","TCP","54","39698 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47588","22.935460","172.30.1.205","172.30.1.104","TCP","74","47064 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926161 TSecr=0 WS=128" "47589","22.935805","172.30.1.104","172.30.1.205","TCP","66","135 > 47064 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47590","22.935817","172.30.1.205","172.30.1.104","TCP","54","47064 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47591","22.936168","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47592","22.936467","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47593","22.936476","172.30.1.205","172.30.1.104","TCP","54","47064 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47594","22.938684","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47595","22.939093","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47596","22.939107","172.30.1.205","172.30.1.104","TCP","54","47064 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47597","22.940936","172.30.1.205","172.30.1.104","TCP","54","47064 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47598","22.941046","172.30.1.205","172.30.1.104","TCP","74","39702 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926167 TSecr=0 WS=128" "47599","22.941221","172.30.1.104","172.30.1.205","TCP","54","135 > 47064 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47600","22.941232","172.30.1.104","172.30.1.205","TCP","54","135 > 47064 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47601","22.941237","172.30.1.205","172.30.1.104","TCP","54","47064 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47602","22.941319","172.30.1.104","172.30.1.205","TCP","66","49671 > 39702 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47603","22.941327","172.30.1.205","172.30.1.104","TCP","54","39702 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47604","22.941668","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47605","22.942132","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47606","22.942139","172.30.1.205","172.30.1.104","TCP","54","39702 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47607","22.943995","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47608","22.944390","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47609","22.944396","172.30.1.205","172.30.1.104","TCP","54","39702 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47610","22.945779","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47611","22.949402","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47612","22.949422","172.30.1.205","172.30.1.104","TCP","54","39702 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47613","22.950624","172.30.1.205","172.30.1.104","TCP","74","47068 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926177 TSecr=0 WS=128" "47614","22.950980","172.30.1.104","172.30.1.205","TCP","66","135 > 47068 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47615","22.950991","172.30.1.205","172.30.1.104","TCP","54","47068 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47616","22.951345","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47617","22.951666","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47618","22.951675","172.30.1.205","172.30.1.104","TCP","54","47068 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47619","22.953894","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47620","22.954380","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47621","22.954387","172.30.1.205","172.30.1.104","TCP","54","47068 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47622","22.956197","172.30.1.205","172.30.1.104","TCP","54","47068 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47623","22.956308","172.30.1.205","172.30.1.104","TCP","74","39706 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926182 TSecr=0 WS=128" "47624","22.956494","172.30.1.104","172.30.1.205","TCP","54","135 > 47068 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47625","22.956520","172.30.1.104","172.30.1.205","TCP","54","135 > 47068 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47626","22.956526","172.30.1.205","172.30.1.104","TCP","54","47068 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47627","22.956598","172.30.1.104","172.30.1.205","TCP","66","49671 > 39706 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47628","22.956606","172.30.1.205","172.30.1.104","TCP","54","39706 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47629","22.956988","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47630","22.957268","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47631","22.957277","172.30.1.205","172.30.1.104","TCP","54","39706 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47632","22.959168","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47633","22.959562","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47634","22.959569","172.30.1.205","172.30.1.104","TCP","54","39706 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47635","22.960946","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47636","22.964594","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47637","22.964604","172.30.1.205","172.30.1.104","TCP","54","39706 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47638","22.965579","172.30.1.205","172.30.1.104","TCP","74","47072 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926192 TSecr=0 WS=128" "47639","22.965931","172.30.1.104","172.30.1.205","TCP","66","135 > 47072 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47640","22.965943","172.30.1.205","172.30.1.104","TCP","54","47072 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47641","22.966311","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47642","22.966654","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47643","22.966663","172.30.1.205","172.30.1.104","TCP","54","47072 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47644","22.968871","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47645","22.969325","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47646","22.969332","172.30.1.205","172.30.1.104","TCP","54","47072 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47647","22.971147","172.30.1.205","172.30.1.104","TCP","54","47072 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47648","22.971258","172.30.1.205","172.30.1.104","TCP","74","39710 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926197 TSecr=0 WS=128" "47649","22.971426","172.30.1.104","172.30.1.205","TCP","54","135 > 47072 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47650","22.971473","172.30.1.104","172.30.1.205","TCP","54","135 > 47072 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47651","22.971479","172.30.1.205","172.30.1.104","TCP","54","47072 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47652","22.971561","172.30.1.104","172.30.1.205","TCP","66","49671 > 39710 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47653","22.971569","172.30.1.205","172.30.1.104","TCP","54","39710 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47654","22.971919","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47655","22.972227","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47656","22.972238","172.30.1.205","172.30.1.104","TCP","54","39710 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47657","22.974154","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47658","22.974569","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47659","22.974576","172.30.1.205","172.30.1.104","TCP","54","39710 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47660","22.975931","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47661","22.979607","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47662","22.979625","172.30.1.205","172.30.1.104","TCP","54","39710 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47663","22.980578","172.30.1.205","172.30.1.104","TCP","74","47076 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926207 TSecr=0 WS=128" "47664","22.980997","172.30.1.104","172.30.1.205","TCP","66","135 > 47076 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47665","22.981007","172.30.1.205","172.30.1.104","TCP","54","47076 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47666","22.981375","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47667","22.981696","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47668","22.981713","172.30.1.205","172.30.1.104","TCP","54","47076 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47669","22.984161","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47670","22.984601","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47671","22.984608","172.30.1.205","172.30.1.104","TCP","54","47076 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47672","22.986435","172.30.1.205","172.30.1.104","TCP","54","47076 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47673","22.986545","172.30.1.205","172.30.1.104","TCP","74","39714 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926212 TSecr=0 WS=128" "47674","22.986698","172.30.1.104","172.30.1.205","TCP","54","135 > 47076 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47675","22.986732","172.30.1.104","172.30.1.205","TCP","54","135 > 47076 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47676","22.986737","172.30.1.205","172.30.1.104","TCP","54","47076 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47677","22.986831","172.30.1.104","172.30.1.205","TCP","66","49671 > 39714 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47678","22.986839","172.30.1.205","172.30.1.104","TCP","54","39714 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47679","22.987184","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47680","22.987517","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47681","22.987526","172.30.1.205","172.30.1.104","TCP","54","39714 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47682","22.989412","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47683","22.989786","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47684","22.989793","172.30.1.205","172.30.1.104","TCP","54","39714 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47685","22.991179","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47686","22.994892","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47687","22.994914","172.30.1.205","172.30.1.104","TCP","54","39714 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47688","22.996060","172.30.1.205","172.30.1.104","TCP","74","47080 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926222 TSecr=0 WS=128" "47689","22.996361","172.30.1.104","172.30.1.205","TCP","66","135 > 47080 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47690","22.996371","172.30.1.205","172.30.1.104","TCP","54","47080 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47691","22.996728","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47692","22.997012","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47693","22.997021","172.30.1.205","172.30.1.104","TCP","54","47080 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47694","22.999209","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47695","22.999599","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47696","22.999605","172.30.1.205","172.30.1.104","TCP","54","47080 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47697","23.000450","172.30.1.205","172.30.1.104","TCP","54","39674 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47698","23.000507","172.30.1.205","172.30.1.104","TCP","54","39678 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47699","23.000544","172.30.1.205","172.30.1.104","TCP","54","39682 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47700","23.000574","172.30.1.205","172.30.1.104","TCP","54","39686 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47701","23.000607","172.30.1.205","172.30.1.104","TCP","54","39690 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47702","23.000635","172.30.1.205","172.30.1.104","TCP","54","39694 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47703","23.000666","172.30.1.205","172.30.1.104","TCP","54","39698 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47704","23.000698","172.30.1.205","172.30.1.104","TCP","54","39702 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47705","23.000720","172.30.1.205","172.30.1.104","TCP","54","39706 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47706","23.000750","172.30.1.104","172.30.1.205","TCP","54","49671 > 39674 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47707","23.000761","172.30.1.205","172.30.1.104","TCP","54","39710 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47708","23.000815","172.30.1.205","172.30.1.104","TCP","54","39714 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47709","23.000827","172.30.1.104","172.30.1.205","TCP","54","49671 > 39678 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47710","23.000846","172.30.1.104","172.30.1.205","TCP","54","49671 > 39682 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47711","23.000870","172.30.1.104","172.30.1.205","TCP","54","49671 > 39674 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47712","23.000876","172.30.1.205","172.30.1.104","TCP","54","39674 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47713","23.000890","172.30.1.104","172.30.1.205","TCP","54","49671 > 39686 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47714","23.000909","172.30.1.104","172.30.1.205","TCP","54","49671 > 39678 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47715","23.000913","172.30.1.205","172.30.1.104","TCP","54","39678 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47716","23.000959","172.30.1.205","172.30.1.104","TCP","54","39670 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "47717","23.001051","172.30.1.104","172.30.1.205","TCP","54","49671 > 39690 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47718","23.001065","172.30.1.104","172.30.1.205","TCP","54","49671 > 39694 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47719","23.001088","172.30.1.104","172.30.1.205","TCP","54","49671 > 39694 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47720","23.001093","172.30.1.205","172.30.1.104","TCP","54","39694 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47721","23.001109","172.30.1.104","172.30.1.205","TCP","54","49671 > 39690 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47722","23.001111","172.30.1.205","172.30.1.104","TCP","54","39690 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47723","23.001129","172.30.1.104","172.30.1.205","TCP","54","49671 > 39682 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47724","23.001137","172.30.1.205","172.30.1.104","TCP","54","39682 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47725","23.001161","172.30.1.104","172.30.1.205","TCP","54","49671 > 39686 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47726","23.001163","172.30.1.205","172.30.1.104","TCP","54","39686 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47727","23.001181","172.30.1.104","172.30.1.205","TCP","54","49671 > 39698 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47728","23.001201","172.30.1.104","172.30.1.205","TCP","54","49671 > 39702 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47729","23.001310","172.30.1.104","172.30.1.205","TCP","54","49671 > 39706 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47730","23.001329","172.30.1.104","172.30.1.205","TCP","54","49671 > 39698 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47731","23.001334","172.30.1.205","172.30.1.104","TCP","54","39698 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47732","23.001349","172.30.1.104","172.30.1.205","TCP","54","49671 > 39702 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47733","23.001352","172.30.1.205","172.30.1.104","TCP","54","39702 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47734","23.001373","172.30.1.104","172.30.1.205","TCP","54","49671 > 39706 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47735","23.001377","172.30.1.205","172.30.1.104","TCP","54","39706 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47736","23.001392","172.30.1.104","172.30.1.205","TCP","54","49671 > 39710 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47737","23.001413","172.30.1.104","172.30.1.205","TCP","54","49671 > 39714 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47738","23.001501","172.30.1.104","172.30.1.205","TCP","54","49671 > 39670 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47739","23.001520","172.30.1.104","172.30.1.205","TCP","54","49671 > 39710 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47740","23.001524","172.30.1.205","172.30.1.104","TCP","54","39710 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47741","23.001541","172.30.1.104","172.30.1.205","TCP","54","49671 > 39714 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47742","23.001544","172.30.1.205","172.30.1.104","TCP","54","39714 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47743","23.001571","172.30.1.104","172.30.1.205","TCP","54","49671 > 39670 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "47744","23.001573","172.30.1.205","172.30.1.104","TCP","54","39670 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "47745","23.002464","172.30.1.205","172.30.1.104","TCP","54","47080 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47746","23.002582","172.30.1.205","172.30.1.104","TCP","74","39718 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926229 TSecr=0 WS=128" "47747","23.002722","172.30.1.104","172.30.1.205","TCP","54","135 > 47080 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47748","23.002768","172.30.1.104","172.30.1.205","TCP","54","135 > 47080 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47749","23.002773","172.30.1.205","172.30.1.104","TCP","54","47080 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47750","23.002844","172.30.1.104","172.30.1.205","TCP","66","49671 > 39718 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47751","23.002852","172.30.1.205","172.30.1.104","TCP","54","39718 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47752","23.003206","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47753","23.003533","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47754","23.003542","172.30.1.205","172.30.1.104","TCP","54","39718 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47755","23.005470","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47756","23.005827","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47757","23.005834","172.30.1.205","172.30.1.104","TCP","54","39718 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47758","23.007192","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47759","23.010756","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47760","23.010767","172.30.1.205","172.30.1.104","TCP","54","39718 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47761","23.011754","172.30.1.205","172.30.1.104","TCP","74","47084 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926238 TSecr=0 WS=128" "47762","23.012064","172.30.1.104","172.30.1.205","TCP","66","135 > 47084 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47763","23.012077","172.30.1.205","172.30.1.104","TCP","54","47084 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47764","23.012441","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47765","23.012719","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47766","23.012728","172.30.1.205","172.30.1.104","TCP","54","47084 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47767","23.014927","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47768","23.015352","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47769","23.015359","172.30.1.205","172.30.1.104","TCP","54","47084 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47770","23.017204","172.30.1.205","172.30.1.104","TCP","54","47084 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47771","23.017324","172.30.1.205","172.30.1.104","TCP","74","39722 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926243 TSecr=0 WS=128" "47772","23.017511","172.30.1.104","172.30.1.205","TCP","54","135 > 47084 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47773","23.017559","172.30.1.104","172.30.1.205","TCP","54","135 > 47084 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47774","23.017565","172.30.1.205","172.30.1.104","TCP","54","47084 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47775","23.017647","172.30.1.104","172.30.1.205","TCP","66","49671 > 39722 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47776","23.017655","172.30.1.205","172.30.1.104","TCP","54","39722 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47777","23.017997","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47778","23.018281","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47779","23.018290","172.30.1.205","172.30.1.104","TCP","54","39722 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47780","23.020148","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47781","23.020509","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47782","23.020515","172.30.1.205","172.30.1.104","TCP","54","39722 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47783","23.021888","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47784","23.025541","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47785","23.025551","172.30.1.205","172.30.1.104","TCP","54","39722 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47786","23.026513","172.30.1.205","172.30.1.104","TCP","74","47088 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926252 TSecr=0 WS=128" "47787","23.026844","172.30.1.104","172.30.1.205","TCP","66","135 > 47088 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47788","23.026855","172.30.1.205","172.30.1.104","TCP","54","47088 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47789","23.027203","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47790","23.027511","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47791","23.027519","172.30.1.205","172.30.1.104","TCP","54","47088 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47792","23.029745","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47793","23.030127","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47794","23.030133","172.30.1.205","172.30.1.104","TCP","54","47088 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47795","23.031957","172.30.1.205","172.30.1.104","TCP","54","47088 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47796","23.032069","172.30.1.205","172.30.1.104","TCP","74","39726 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926258 TSecr=0 WS=128" "47797","23.032234","172.30.1.104","172.30.1.205","TCP","54","135 > 47088 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47798","23.032245","172.30.1.104","172.30.1.205","TCP","54","135 > 47088 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47799","23.032251","172.30.1.205","172.30.1.104","TCP","54","47088 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47800","23.032346","172.30.1.104","172.30.1.205","TCP","66","49671 > 39726 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47801","23.032354","172.30.1.205","172.30.1.104","TCP","54","39726 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47802","23.032700","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47803","23.032986","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47804","23.032995","172.30.1.205","172.30.1.104","TCP","54","39726 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47805","23.034891","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47806","23.035253","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47807","23.035259","172.30.1.205","172.30.1.104","TCP","54","39726 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47808","23.036614","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47809","23.040308","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47810","23.040318","172.30.1.205","172.30.1.104","TCP","54","39726 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47811","23.041310","172.30.1.205","172.30.1.104","TCP","74","47092 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926267 TSecr=0 WS=128" "47812","23.041648","172.30.1.104","172.30.1.205","TCP","66","135 > 47092 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47813","23.041658","172.30.1.205","172.30.1.104","TCP","54","47092 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47814","23.042013","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47815","23.042298","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47816","23.042309","172.30.1.205","172.30.1.104","TCP","54","47092 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47817","23.044523","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47818","23.044907","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47819","23.044914","172.30.1.205","172.30.1.104","TCP","54","47092 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47820","23.046737","172.30.1.205","172.30.1.104","TCP","54","47092 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47821","23.046849","172.30.1.205","172.30.1.104","TCP","74","39730 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926273 TSecr=0 WS=128" "47822","23.047001","172.30.1.104","172.30.1.205","TCP","54","135 > 47092 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47823","23.047013","172.30.1.104","172.30.1.205","TCP","54","135 > 47092 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47824","23.047018","172.30.1.205","172.30.1.104","TCP","54","47092 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47825","23.047130","172.30.1.104","172.30.1.205","TCP","66","49671 > 39730 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47826","23.047138","172.30.1.205","172.30.1.104","TCP","54","39730 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47827","23.047483","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47828","23.047777","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47829","23.047786","172.30.1.205","172.30.1.104","TCP","54","39730 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47830","23.049713","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47831","23.050095","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47832","23.050101","172.30.1.205","172.30.1.104","TCP","54","39730 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47833","23.051459","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47834","23.055109","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47835","23.055119","172.30.1.205","172.30.1.104","TCP","54","39730 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47836","23.056065","172.30.1.205","172.30.1.104","TCP","74","47096 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926282 TSecr=0 WS=128" "47837","23.056381","172.30.1.104","172.30.1.205","TCP","66","135 > 47096 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47838","23.056391","172.30.1.205","172.30.1.104","TCP","54","47096 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47839","23.056739","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47840","23.057046","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47841","23.057063","172.30.1.205","172.30.1.104","TCP","54","47096 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47842","23.059463","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47843","23.059905","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47844","23.059917","172.30.1.205","172.30.1.104","TCP","54","47096 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47845","23.061955","172.30.1.205","172.30.1.104","TCP","54","47096 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47846","23.062066","172.30.1.205","172.30.1.104","TCP","74","39734 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926288 TSecr=0 WS=128" "47847","23.062260","172.30.1.104","172.30.1.205","TCP","54","135 > 47096 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47848","23.062332","172.30.1.104","172.30.1.205","TCP","66","49671 > 39734 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47849","23.062340","172.30.1.205","172.30.1.104","TCP","54","39734 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47850","23.062351","172.30.1.104","172.30.1.205","TCP","54","135 > 47096 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47851","23.062359","172.30.1.205","172.30.1.104","TCP","54","47096 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47852","23.062702","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47853","23.063014","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47854","23.063023","172.30.1.205","172.30.1.104","TCP","54","39734 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47855","23.064935","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47856","23.065302","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47857","23.065309","172.30.1.205","172.30.1.104","TCP","54","39734 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47858","23.066659","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47859","23.070323","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47860","23.070343","172.30.1.205","172.30.1.104","TCP","54","39734 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47861","23.071448","172.30.1.205","172.30.1.104","TCP","74","47100 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926297 TSecr=0 WS=128" "47862","23.071783","172.30.1.104","172.30.1.205","TCP","66","135 > 47100 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47863","23.071795","172.30.1.205","172.30.1.104","TCP","54","47100 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47864","23.072149","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47865","23.072483","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47866","23.072492","172.30.1.205","172.30.1.104","TCP","54","47100 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47867","23.074703","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47868","23.075158","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47869","23.075164","172.30.1.205","172.30.1.104","TCP","54","47100 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47870","23.077028","172.30.1.205","172.30.1.104","TCP","54","47100 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47871","23.077137","172.30.1.205","172.30.1.104","TCP","74","39738 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926303 TSecr=0 WS=128" "47872","23.077287","172.30.1.104","172.30.1.205","TCP","54","135 > 47100 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47873","23.077308","172.30.1.104","172.30.1.205","TCP","54","135 > 47100 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47874","23.077314","172.30.1.205","172.30.1.104","TCP","54","47100 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47875","23.077420","172.30.1.104","172.30.1.205","TCP","66","49671 > 39738 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47876","23.077428","172.30.1.205","172.30.1.104","TCP","54","39738 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47877","23.077775","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47878","23.078073","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47879","23.078082","172.30.1.205","172.30.1.104","TCP","54","39738 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47880","23.079983","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47881","23.080402","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47882","23.080408","172.30.1.205","172.30.1.104","TCP","54","39738 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47883","23.081792","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47884","23.085521","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47885","23.085531","172.30.1.205","172.30.1.104","TCP","54","39738 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47886","23.086480","172.30.1.205","172.30.1.104","TCP","74","47104 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926312 TSecr=0 WS=128" "47887","23.086772","172.30.1.104","172.30.1.205","TCP","66","135 > 47104 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47888","23.086782","172.30.1.205","172.30.1.104","TCP","54","47104 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47889","23.087130","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47890","23.087506","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47891","23.087518","172.30.1.205","172.30.1.104","TCP","54","47104 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47892","23.089735","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47893","23.090156","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47894","23.090168","172.30.1.205","172.30.1.104","TCP","54","47104 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47895","23.092151","172.30.1.205","172.30.1.104","TCP","54","47104 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47896","23.092261","172.30.1.205","172.30.1.104","TCP","74","39742 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926318 TSecr=0 WS=128" "47897","23.092437","172.30.1.104","172.30.1.205","TCP","54","135 > 47104 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47898","23.092449","172.30.1.104","172.30.1.205","TCP","54","135 > 47104 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47899","23.092454","172.30.1.205","172.30.1.104","TCP","54","47104 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47900","23.092526","172.30.1.104","172.30.1.205","TCP","66","49671 > 39742 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47901","23.092535","172.30.1.205","172.30.1.104","TCP","54","39742 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47902","23.092913","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47903","23.093229","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47904","23.093236","172.30.1.205","172.30.1.104","TCP","54","39742 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47905","23.095105","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47906","23.095493","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47907","23.095499","172.30.1.205","172.30.1.104","TCP","54","39742 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47908","23.096892","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47909","23.100574","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47910","23.100583","172.30.1.205","172.30.1.104","TCP","54","39742 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47911","23.101551","172.30.1.205","172.30.1.104","TCP","74","47108 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926327 TSecr=0 WS=128" "47912","23.101875","172.30.1.104","172.30.1.205","TCP","66","135 > 47108 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47913","23.101886","172.30.1.205","172.30.1.104","TCP","54","47108 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47914","23.102243","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47915","23.102557","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47916","23.102568","172.30.1.205","172.30.1.104","TCP","54","47108 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47917","23.104791","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47918","23.105201","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47919","23.105213","172.30.1.205","172.30.1.104","TCP","54","47108 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47920","23.107167","172.30.1.205","172.30.1.104","TCP","54","47108 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47921","23.107279","172.30.1.205","172.30.1.104","TCP","74","39746 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926333 TSecr=0 WS=128" "47922","23.107435","172.30.1.104","172.30.1.205","TCP","54","135 > 47108 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47923","23.107445","172.30.1.104","172.30.1.205","TCP","54","135 > 47108 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47924","23.107450","172.30.1.205","172.30.1.104","TCP","54","47108 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47925","23.107558","172.30.1.104","172.30.1.205","TCP","66","49671 > 39746 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47926","23.107567","172.30.1.205","172.30.1.104","TCP","54","39746 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47927","23.107911","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47928","23.108198","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47929","23.108206","172.30.1.205","172.30.1.104","TCP","54","39746 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47930","23.110181","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47931","23.110560","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47932","23.110566","172.30.1.205","172.30.1.104","TCP","54","39746 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47933","23.111970","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47934","23.115582","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47935","23.115591","172.30.1.205","172.30.1.104","TCP","54","39746 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47936","23.116531","172.30.1.205","172.30.1.104","TCP","74","47112 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926342 TSecr=0 WS=128" "47937","23.116842","172.30.1.104","172.30.1.205","TCP","66","135 > 47112 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47938","23.116852","172.30.1.205","172.30.1.104","TCP","54","47112 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47939","23.117212","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47940","23.117497","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47941","23.117506","172.30.1.205","172.30.1.104","TCP","54","47112 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47942","23.119689","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47943","23.120098","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47944","23.120111","172.30.1.205","172.30.1.104","TCP","54","47112 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47945","23.121944","172.30.1.205","172.30.1.104","TCP","54","47112 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47946","23.122055","172.30.1.205","172.30.1.104","TCP","74","39750 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926348 TSecr=0 WS=128" "47947","23.122230","172.30.1.104","172.30.1.205","TCP","54","135 > 47112 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47948","23.122302","172.30.1.104","172.30.1.205","TCP","66","49671 > 39750 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47949","23.122311","172.30.1.205","172.30.1.104","TCP","54","39750 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47950","23.122672","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47951","23.124571","172.30.1.104","172.30.1.205","TCP","54","135 > 47112 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47952","23.124577","172.30.1.205","172.30.1.104","TCP","54","47112 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47953","23.124705","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47954","23.124714","172.30.1.205","172.30.1.104","TCP","54","39750 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47955","23.126605","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47956","23.127030","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47957","23.127036","172.30.1.205","172.30.1.104","TCP","54","39750 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47958","23.128378","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47959","23.131998","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47960","23.132009","172.30.1.205","172.30.1.104","TCP","54","39750 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47961","23.132986","172.30.1.205","172.30.1.104","TCP","74","47116 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926359 TSecr=0 WS=128" "47962","23.133343","172.30.1.104","172.30.1.205","TCP","66","135 > 47116 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47963","23.133354","172.30.1.205","172.30.1.104","TCP","54","47116 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47964","23.133707","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47965","23.134015","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47966","23.134024","172.30.1.205","172.30.1.104","TCP","54","47116 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47967","23.136209","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47968","23.136653","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47969","23.136659","172.30.1.205","172.30.1.104","TCP","54","47116 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47970","23.138491","172.30.1.205","172.30.1.104","TCP","54","47116 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47971","23.138602","172.30.1.205","172.30.1.104","TCP","74","39754 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926365 TSecr=0 WS=128" "47972","23.138827","172.30.1.104","172.30.1.205","TCP","54","135 > 47116 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47973","23.138836","172.30.1.104","172.30.1.205","TCP","54","135 > 47116 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47974","23.138841","172.30.1.205","172.30.1.104","TCP","54","47116 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "47975","23.138950","172.30.1.104","172.30.1.205","TCP","66","49671 > 39754 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47976","23.138958","172.30.1.205","172.30.1.104","TCP","54","39754 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47977","23.139302","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "47978","23.139609","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47979","23.139625","172.30.1.205","172.30.1.104","TCP","54","39754 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47980","23.141529","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "47981","23.141915","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "47982","23.141921","172.30.1.205","172.30.1.104","TCP","54","39754 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "47983","23.143265","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "47984","23.146912","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "47985","23.146923","172.30.1.205","172.30.1.104","TCP","54","39754 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "47986","23.147875","172.30.1.205","172.30.1.104","TCP","74","47120 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926374 TSecr=0 WS=128" "47987","23.148241","172.30.1.104","172.30.1.205","TCP","66","135 > 47120 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "47988","23.148252","172.30.1.205","172.30.1.104","TCP","54","47120 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "47989","23.148605","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "47990","23.148909","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "47991","23.148919","172.30.1.205","172.30.1.104","TCP","54","47120 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "47992","23.151126","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "47993","23.151533","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "47994","23.151540","172.30.1.205","172.30.1.104","TCP","54","47120 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "47995","23.153372","172.30.1.205","172.30.1.104","TCP","54","47120 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "47996","23.153519","172.30.1.205","172.30.1.104","TCP","74","39758 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926379 TSecr=0 WS=128" "47997","23.153732","172.30.1.104","172.30.1.205","TCP","54","135 > 47120 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47998","23.153752","172.30.1.104","172.30.1.205","TCP","54","135 > 47120 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "47999","23.153758","172.30.1.205","172.30.1.104","TCP","54","47120 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48000","23.153842","172.30.1.104","172.30.1.205","TCP","66","49671 > 39758 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48001","23.153850","172.30.1.205","172.30.1.104","TCP","54","39758 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48002","23.154256","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48003","23.154529","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48004","23.154538","172.30.1.205","172.30.1.104","TCP","54","39758 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48005","23.156433","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48006","23.156837","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48007","23.156843","172.30.1.205","172.30.1.104","TCP","54","39758 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48008","23.158225","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48009","23.161873","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48010","23.161884","172.30.1.205","172.30.1.104","TCP","54","39758 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48011","23.162844","172.30.1.205","172.30.1.104","TCP","74","47124 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926389 TSecr=0 WS=128" "48012","23.163177","172.30.1.104","172.30.1.205","TCP","66","135 > 47124 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48013","23.163188","172.30.1.205","172.30.1.104","TCP","54","47124 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48014","23.163543","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48015","23.163842","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48016","23.163854","172.30.1.205","172.30.1.104","TCP","54","47124 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48017","23.166092","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48018","23.166537","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48019","23.166544","172.30.1.205","172.30.1.104","TCP","54","47124 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48020","23.168349","172.30.1.205","172.30.1.104","TCP","54","47124 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48021","23.168459","172.30.1.205","172.30.1.104","TCP","74","39762 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926394 TSecr=0 WS=128" "48022","23.168619","172.30.1.104","172.30.1.205","TCP","54","135 > 47124 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48023","23.168666","172.30.1.104","172.30.1.205","TCP","54","135 > 47124 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48024","23.168671","172.30.1.205","172.30.1.104","TCP","54","47124 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48025","23.168824","172.30.1.104","172.30.1.205","TCP","66","49671 > 39762 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48026","23.168833","172.30.1.205","172.30.1.104","TCP","54","39762 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48027","23.169179","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48028","23.169466","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48029","23.169474","172.30.1.205","172.30.1.104","TCP","54","39762 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48030","23.171336","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48031","23.174795","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48032","23.174802","172.30.1.205","172.30.1.104","TCP","54","39762 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48033","23.176159","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48034","23.179828","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48035","23.179837","172.30.1.205","172.30.1.104","TCP","54","39762 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48036","23.180793","172.30.1.205","172.30.1.104","TCP","74","47128 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926407 TSecr=0 WS=128" "48037","23.181109","172.30.1.104","172.30.1.205","TCP","66","135 > 47128 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48038","23.181120","172.30.1.205","172.30.1.104","TCP","54","47128 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48039","23.181470","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48040","23.181745","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48041","23.181754","172.30.1.205","172.30.1.104","TCP","54","47128 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48042","23.183928","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48043","23.184358","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48044","23.184370","172.30.1.205","172.30.1.104","TCP","54","47128 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48045","23.185258","172.30.1.205","172.30.1.104","TCP","54","39722 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48046","23.185307","172.30.1.205","172.30.1.104","TCP","54","39726 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48047","23.185344","172.30.1.205","172.30.1.104","TCP","54","39730 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48048","23.185378","172.30.1.205","172.30.1.104","TCP","54","39734 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48049","23.185410","172.30.1.205","172.30.1.104","TCP","54","39738 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48050","23.185443","172.30.1.205","172.30.1.104","TCP","54","39742 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48051","23.185475","172.30.1.205","172.30.1.104","TCP","54","39746 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48052","23.185511","172.30.1.205","172.30.1.104","TCP","54","39750 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48053","23.185535","172.30.1.205","172.30.1.104","TCP","54","39754 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48054","23.185557","172.30.1.205","172.30.1.104","TCP","54","39758 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48055","23.185583","172.30.1.205","172.30.1.104","TCP","54","39762 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48056","23.185662","172.30.1.104","172.30.1.205","TCP","54","49671 > 39722 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48057","23.185671","172.30.1.104","172.30.1.205","TCP","54","49671 > 39726 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48058","23.185680","172.30.1.205","172.30.1.104","TCP","54","39718 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48059","23.185901","172.30.1.104","172.30.1.205","TCP","54","49671 > 39722 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48060","23.185908","172.30.1.205","172.30.1.104","TCP","54","39722 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48061","23.185915","172.30.1.104","172.30.1.205","TCP","54","49671 > 39730 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48062","23.185924","172.30.1.104","172.30.1.205","TCP","54","49671 > 39726 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48063","23.185926","172.30.1.205","172.30.1.104","TCP","54","39726 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48064","23.185928","172.30.1.104","172.30.1.205","TCP","54","49671 > 39730 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48065","23.185929","172.30.1.205","172.30.1.104","TCP","54","39730 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48066","23.185930","172.30.1.104","172.30.1.205","TCP","54","49671 > 39734 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48067","23.185934","172.30.1.104","172.30.1.205","TCP","54","49671 > 39738 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48068","23.185937","172.30.1.104","172.30.1.205","TCP","54","49671 > 39734 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48069","23.185938","172.30.1.205","172.30.1.104","TCP","54","39734 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48070","23.185940","172.30.1.104","172.30.1.205","TCP","54","49671 > 39742 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48071","23.186052","172.30.1.104","172.30.1.205","TCP","54","49671 > 39746 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48072","23.186075","172.30.1.104","172.30.1.205","TCP","54","49671 > 39738 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48073","23.186080","172.30.1.205","172.30.1.104","TCP","54","39738 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48074","23.186102","172.30.1.104","172.30.1.205","TCP","54","49671 > 39742 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48075","23.186105","172.30.1.205","172.30.1.104","TCP","54","39742 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48076","23.186126","172.30.1.104","172.30.1.205","TCP","54","49671 > 39746 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48077","23.186129","172.30.1.205","172.30.1.104","TCP","54","39746 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48078","23.186165","172.30.1.104","172.30.1.205","TCP","54","49671 > 39750 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48079","23.186180","172.30.1.104","172.30.1.205","TCP","54","49671 > 39754 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48080","23.186199","172.30.1.104","172.30.1.205","TCP","54","49671 > 39758 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48081","23.186217","172.30.1.104","172.30.1.205","TCP","54","49671 > 39750 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48082","23.186220","172.30.1.205","172.30.1.104","TCP","54","39750 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48083","23.186237","172.30.1.104","172.30.1.205","TCP","54","49671 > 39762 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48084","23.186520","172.30.1.104","172.30.1.205","TCP","54","49671 > 39762 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48085","23.186525","172.30.1.205","172.30.1.104","TCP","54","39762 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48086","23.186538","172.30.1.104","172.30.1.205","TCP","54","49671 > 39718 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48087","23.186560","172.30.1.104","172.30.1.205","TCP","54","49671 > 39718 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48088","23.186563","172.30.1.205","172.30.1.104","TCP","54","39718 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48089","23.186580","172.30.1.104","172.30.1.205","TCP","54","49671 > 39754 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48090","23.186583","172.30.1.205","172.30.1.104","TCP","54","39754 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48091","23.186601","172.30.1.104","172.30.1.205","TCP","54","49671 > 39758 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48092","23.186604","172.30.1.205","172.30.1.104","TCP","54","39758 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48093","23.187207","172.30.1.205","172.30.1.104","TCP","54","47128 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48094","23.187318","172.30.1.205","172.30.1.104","TCP","74","39766 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926413 TSecr=0 WS=128" "48095","23.187498","172.30.1.104","172.30.1.205","TCP","54","135 > 47128 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48096","23.187537","172.30.1.104","172.30.1.205","TCP","54","135 > 47128 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48097","23.187542","172.30.1.205","172.30.1.104","TCP","54","47128 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48098","23.187631","172.30.1.104","172.30.1.205","TCP","66","49671 > 39766 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48099","23.187644","172.30.1.205","172.30.1.104","TCP","54","39766 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48100","23.188021","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48101","23.188290","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48102","23.188297","172.30.1.205","172.30.1.104","TCP","54","39766 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48103","23.190289","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48104","23.190624","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48105","23.190630","172.30.1.205","172.30.1.104","TCP","54","39766 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48106","23.191988","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48107","23.195516","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48108","23.195527","172.30.1.205","172.30.1.104","TCP","54","39766 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48109","23.196518","172.30.1.205","172.30.1.104","TCP","74","47132 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926422 TSecr=0 WS=128" "48110","23.196850","172.30.1.104","172.30.1.205","TCP","66","135 > 47132 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48111","23.196862","172.30.1.205","172.30.1.104","TCP","54","47132 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48112","23.197238","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48113","23.197539","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48114","23.197548","172.30.1.205","172.30.1.104","TCP","54","47132 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48115","23.199722","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48116","23.200147","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48117","23.200154","172.30.1.205","172.30.1.104","TCP","54","47132 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48118","23.201990","172.30.1.205","172.30.1.104","TCP","54","47132 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48119","23.202103","172.30.1.205","172.30.1.104","TCP","74","39770 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926428 TSecr=0 WS=128" "48120","23.202255","172.30.1.104","172.30.1.205","TCP","54","135 > 47132 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48121","23.202269","172.30.1.104","172.30.1.205","TCP","54","135 > 47132 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48122","23.202274","172.30.1.205","172.30.1.104","TCP","54","47132 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48123","23.202374","172.30.1.104","172.30.1.205","TCP","66","49671 > 39770 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48124","23.202382","172.30.1.205","172.30.1.104","TCP","54","39770 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48125","23.202727","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48126","23.203023","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48127","23.203032","172.30.1.205","172.30.1.104","TCP","54","39770 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48128","23.204941","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48129","23.205276","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48130","23.205283","172.30.1.205","172.30.1.104","TCP","54","39770 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48131","23.206634","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48132","23.210236","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48133","23.210246","172.30.1.205","172.30.1.104","TCP","54","39770 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48134","23.211180","172.30.1.205","172.30.1.104","TCP","74","47136 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926437 TSecr=0 WS=128" "48135","23.211490","172.30.1.104","172.30.1.205","TCP","66","135 > 47136 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48136","23.211502","172.30.1.205","172.30.1.104","TCP","54","47136 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48137","23.211855","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48138","23.212150","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48139","23.212159","172.30.1.205","172.30.1.104","TCP","54","47136 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48140","23.214380","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48141","23.214736","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48142","23.214743","172.30.1.205","172.30.1.104","TCP","54","47136 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48143","23.216556","172.30.1.205","172.30.1.104","TCP","54","47136 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48144","23.216667","172.30.1.205","172.30.1.104","TCP","74","39774 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926443 TSecr=0 WS=128" "48145","23.216826","172.30.1.104","172.30.1.205","TCP","54","135 > 47136 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48146","23.216877","172.30.1.104","172.30.1.205","TCP","54","135 > 47136 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48147","23.216883","172.30.1.205","172.30.1.104","TCP","54","47136 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48148","23.216951","172.30.1.104","172.30.1.205","TCP","66","49671 > 39774 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48149","23.216959","172.30.1.205","172.30.1.104","TCP","54","39774 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48150","23.217314","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48151","23.217632","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48152","23.217641","172.30.1.205","172.30.1.104","TCP","54","39774 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48153","23.219526","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48154","23.219896","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48155","23.219902","172.30.1.205","172.30.1.104","TCP","54","39774 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48156","23.221284","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48157","23.224980","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48158","23.224989","172.30.1.205","172.30.1.104","TCP","54","39774 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48159","23.225935","172.30.1.205","172.30.1.104","TCP","74","47140 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926452 TSecr=0 WS=128" "48160","23.226273","172.30.1.104","172.30.1.205","TCP","66","135 > 47140 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48161","23.226284","172.30.1.205","172.30.1.104","TCP","54","47140 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48162","23.226637","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48163","23.226925","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48164","23.226934","172.30.1.205","172.30.1.104","TCP","54","47140 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48165","23.229148","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48166","23.229556","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48167","23.229568","172.30.1.205","172.30.1.104","TCP","54","47140 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48168","23.231588","172.30.1.205","172.30.1.104","TCP","54","47140 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48169","23.231698","172.30.1.205","172.30.1.104","TCP","74","39778 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926458 TSecr=0 WS=128" "48170","23.231858","172.30.1.104","172.30.1.205","TCP","54","135 > 47140 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48171","23.231889","172.30.1.104","172.30.1.205","TCP","54","135 > 47140 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48172","23.231894","172.30.1.205","172.30.1.104","TCP","54","47140 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48173","23.231984","172.30.1.104","172.30.1.205","TCP","66","49671 > 39778 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48174","23.231992","172.30.1.205","172.30.1.104","TCP","54","39778 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48175","23.232335","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48176","23.232610","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48177","23.232619","172.30.1.205","172.30.1.104","TCP","54","39778 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48178","23.234525","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48179","23.234909","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48180","23.234915","172.30.1.205","172.30.1.104","TCP","54","39778 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48181","23.236267","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48182","23.239952","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48183","23.239974","172.30.1.205","172.30.1.104","TCP","54","39778 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48184","23.241192","172.30.1.205","172.30.1.104","TCP","74","47144 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926467 TSecr=0 WS=128" "48185","23.241470","172.30.1.104","172.30.1.205","TCP","66","135 > 47144 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48186","23.241481","172.30.1.205","172.30.1.104","TCP","54","47144 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48187","23.241834","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48188","23.242119","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48189","23.242129","172.30.1.205","172.30.1.104","TCP","54","47144 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48190","23.244313","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48191","23.244731","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48192","23.244737","172.30.1.205","172.30.1.104","TCP","54","47144 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48193","23.246551","172.30.1.205","172.30.1.104","TCP","54","47144 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48194","23.246661","172.30.1.205","172.30.1.104","TCP","74","39782 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926473 TSecr=0 WS=128" "48195","23.246856","172.30.1.104","172.30.1.205","TCP","54","135 > 47144 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48196","23.246865","172.30.1.104","172.30.1.205","TCP","54","135 > 47144 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48197","23.246870","172.30.1.205","172.30.1.104","TCP","54","47144 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48198","23.246958","172.30.1.104","172.30.1.205","TCP","66","49671 > 39782 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48199","23.246966","172.30.1.205","172.30.1.104","TCP","54","39782 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48200","23.247312","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48201","23.247637","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48202","23.247645","172.30.1.205","172.30.1.104","TCP","54","39782 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48203","23.249570","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48204","23.249966","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48205","23.249978","172.30.1.205","172.30.1.104","TCP","54","39782 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48206","23.251553","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48207","23.255285","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48208","23.255294","172.30.1.205","172.30.1.104","TCP","54","39782 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48209","23.256235","172.30.1.205","172.30.1.104","TCP","74","47148 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926482 TSecr=0 WS=128" "48210","23.256638","172.30.1.104","172.30.1.205","TCP","66","135 > 47148 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48211","23.256650","172.30.1.205","172.30.1.104","TCP","54","47148 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48212","23.257036","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48213","23.257334","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48214","23.257344","172.30.1.205","172.30.1.104","TCP","54","47148 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48215","23.259532","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48216","23.259949","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48217","23.259956","172.30.1.205","172.30.1.104","TCP","54","47148 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48218","23.261795","172.30.1.205","172.30.1.104","TCP","54","47148 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48219","23.261905","172.30.1.205","172.30.1.104","TCP","74","39786 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926488 TSecr=0 WS=128" "48220","23.262080","172.30.1.104","172.30.1.205","TCP","54","135 > 47148 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48221","23.262206","172.30.1.104","172.30.1.205","TCP","66","49671 > 39786 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48222","23.262215","172.30.1.205","172.30.1.104","TCP","54","39786 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48223","23.262226","172.30.1.104","172.30.1.205","TCP","54","135 > 47148 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48224","23.262233","172.30.1.205","172.30.1.104","TCP","54","47148 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48225","23.262577","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48226","23.262934","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48227","23.262943","172.30.1.205","172.30.1.104","TCP","54","39786 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48228","23.264842","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48229","23.265210","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48230","23.265216","172.30.1.205","172.30.1.104","TCP","54","39786 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48231","23.266598","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48232","23.270323","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48233","23.270332","172.30.1.205","172.30.1.104","TCP","54","39786 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48234","23.271315","172.30.1.205","172.30.1.104","TCP","74","47152 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926497 TSecr=0 WS=128" "48235","23.271655","172.30.1.104","172.30.1.205","TCP","66","135 > 47152 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48236","23.271666","172.30.1.205","172.30.1.104","TCP","54","47152 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48237","23.272010","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48238","23.272300","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48239","23.272308","172.30.1.205","172.30.1.104","TCP","54","47152 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48240","23.274534","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48241","23.274983","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48242","23.274989","172.30.1.205","172.30.1.104","TCP","54","47152 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48243","23.276816","172.30.1.205","172.30.1.104","TCP","54","47152 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48244","23.276927","172.30.1.205","172.30.1.104","TCP","74","39790 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926503 TSecr=0 WS=128" "48245","23.277077","172.30.1.104","172.30.1.205","TCP","54","135 > 47152 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48246","23.277105","172.30.1.104","172.30.1.205","TCP","54","135 > 47152 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48247","23.277111","172.30.1.205","172.30.1.104","TCP","54","47152 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48248","23.277215","172.30.1.104","172.30.1.205","TCP","66","49671 > 39790 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48249","23.277223","172.30.1.205","172.30.1.104","TCP","54","39790 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48250","23.277569","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48251","23.277907","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48252","23.277916","172.30.1.205","172.30.1.104","TCP","54","39790 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48253","23.279800","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48254","23.281424","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48255","23.281433","172.30.1.205","172.30.1.104","TCP","54","39790 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48256","23.282807","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48257","23.286508","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48258","23.286518","172.30.1.205","172.30.1.104","TCP","54","39790 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48259","23.287471","172.30.1.205","172.30.1.104","TCP","74","47156 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926513 TSecr=0 WS=128" "48260","23.287898","172.30.1.104","172.30.1.205","TCP","66","135 > 47156 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48261","23.287910","172.30.1.205","172.30.1.104","TCP","54","47156 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48262","23.288261","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48263","23.288562","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48264","23.288571","172.30.1.205","172.30.1.104","TCP","54","47156 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48265","23.290805","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48266","23.291258","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48267","23.291264","172.30.1.205","172.30.1.104","TCP","54","47156 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48268","23.293096","172.30.1.205","172.30.1.104","TCP","54","47156 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48269","23.293205","172.30.1.205","172.30.1.104","TCP","74","39794 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926519 TSecr=0 WS=128" "48270","23.293428","172.30.1.104","172.30.1.205","TCP","54","135 > 47156 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48271","23.293483","172.30.1.104","172.30.1.205","TCP","66","49671 > 39794 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48272","23.293493","172.30.1.205","172.30.1.104","TCP","54","39794 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48273","23.293523","172.30.1.104","172.30.1.205","TCP","54","135 > 47156 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48274","23.293528","172.30.1.205","172.30.1.104","TCP","54","47156 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48275","23.293856","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48276","23.294168","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48277","23.294176","172.30.1.205","172.30.1.104","TCP","54","39794 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48278","23.296046","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48279","23.296407","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48280","23.296413","172.30.1.205","172.30.1.104","TCP","54","39794 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48281","23.297798","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48282","23.301506","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48283","23.301515","172.30.1.205","172.30.1.104","TCP","54","39794 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48284","23.302463","172.30.1.205","172.30.1.104","TCP","74","47160 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926528 TSecr=0 WS=128" "48285","23.302839","172.30.1.104","172.30.1.205","TCP","66","135 > 47160 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48286","23.302849","172.30.1.205","172.30.1.104","TCP","54","47160 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48287","23.303196","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48288","23.303499","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48289","23.303508","172.30.1.205","172.30.1.104","TCP","54","47160 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48290","23.305702","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48291","23.306131","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48292","23.306137","172.30.1.205","172.30.1.104","TCP","54","47160 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48293","23.307952","172.30.1.205","172.30.1.104","TCP","54","47160 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48294","23.308069","172.30.1.205","172.30.1.104","TCP","74","39798 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926534 TSecr=0 WS=128" "48295","23.308293","172.30.1.104","172.30.1.205","TCP","54","135 > 47160 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48296","23.308301","172.30.1.104","172.30.1.205","TCP","54","135 > 47160 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48297","23.308306","172.30.1.205","172.30.1.104","TCP","54","47160 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48298","23.308392","172.30.1.104","172.30.1.205","TCP","66","49671 > 39798 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48299","23.308400","172.30.1.205","172.30.1.104","TCP","54","39798 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48300","23.308742","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48301","23.309073","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48302","23.309082","172.30.1.205","172.30.1.104","TCP","54","39798 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48303","23.310951","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48304","23.311300","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48305","23.311307","172.30.1.205","172.30.1.104","TCP","54","39798 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48306","23.312667","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48307","23.316393","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48308","23.316414","172.30.1.205","172.30.1.104","TCP","54","39798 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48309","23.317507","172.30.1.205","172.30.1.104","TCP","74","47164 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926543 TSecr=0 WS=128" "48310","23.317907","172.30.1.104","172.30.1.205","TCP","66","135 > 47164 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48311","23.317918","172.30.1.205","172.30.1.104","TCP","54","47164 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48312","23.318295","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48313","23.318577","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48314","23.318586","172.30.1.205","172.30.1.104","TCP","54","47164 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48315","23.320765","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48316","23.321162","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48317","23.321169","172.30.1.205","172.30.1.104","TCP","54","47164 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48318","23.322973","172.30.1.205","172.30.1.104","TCP","54","47164 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48319","23.323090","172.30.1.205","172.30.1.104","TCP","74","39802 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926549 TSecr=0 WS=128" "48320","23.323288","172.30.1.104","172.30.1.205","TCP","54","135 > 47164 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48321","23.323297","172.30.1.104","172.30.1.205","TCP","54","135 > 47164 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48322","23.323302","172.30.1.205","172.30.1.104","TCP","54","47164 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48323","23.323377","172.30.1.104","172.30.1.205","TCP","66","49671 > 39802 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48324","23.323386","172.30.1.205","172.30.1.104","TCP","54","39802 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48325","23.323734","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48326","23.324045","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48327","23.324054","172.30.1.205","172.30.1.104","TCP","54","39802 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48328","23.325940","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48329","23.326331","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48330","23.326336","172.30.1.205","172.30.1.104","TCP","54","39802 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48331","23.327678","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48332","23.331379","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48333","23.331389","172.30.1.205","172.30.1.104","TCP","54","39802 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48334","23.332327","172.30.1.205","172.30.1.104","TCP","74","47168 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926558 TSecr=0 WS=128" "48335","23.332658","172.30.1.104","172.30.1.205","TCP","66","135 > 47168 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48336","23.332670","172.30.1.205","172.30.1.104","TCP","54","47168 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48337","23.333056","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48338","23.333409","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48339","23.333419","172.30.1.205","172.30.1.104","TCP","54","47168 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48340","23.335595","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48341","23.336021","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48342","23.336028","172.30.1.205","172.30.1.104","TCP","54","47168 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48343","23.337861","172.30.1.205","172.30.1.104","TCP","54","47168 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48344","23.337971","172.30.1.205","172.30.1.104","TCP","74","39806 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926564 TSecr=0 WS=128" "48345","23.338118","172.30.1.104","172.30.1.205","TCP","54","135 > 47168 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48346","23.338146","172.30.1.104","172.30.1.205","TCP","54","135 > 47168 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48347","23.338151","172.30.1.205","172.30.1.104","TCP","54","47168 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48348","23.338241","172.30.1.104","172.30.1.205","TCP","66","49671 > 39806 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48349","23.338249","172.30.1.205","172.30.1.104","TCP","54","39806 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48350","23.338596","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48351","23.338913","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48352","23.338921","172.30.1.205","172.30.1.104","TCP","54","39806 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48353","23.340862","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48354","23.342202","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48355","23.342208","172.30.1.205","172.30.1.104","TCP","54","39806 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48356","23.343549","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48357","23.347297","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48358","23.347307","172.30.1.205","172.30.1.104","TCP","54","39806 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48359","23.348243","172.30.1.205","172.30.1.104","TCP","74","47172 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926574 TSecr=0 WS=128" "48360","23.348617","172.30.1.104","172.30.1.205","TCP","66","135 > 47172 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48361","23.348628","172.30.1.205","172.30.1.104","TCP","54","47172 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48362","23.349008","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48363","23.349294","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48364","23.349304","172.30.1.205","172.30.1.104","TCP","54","47172 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48365","23.351489","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48366","23.351973","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48367","23.351980","172.30.1.205","172.30.1.104","TCP","54","47172 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48368","23.353810","172.30.1.205","172.30.1.104","TCP","54","47172 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48369","23.353922","172.30.1.205","172.30.1.104","TCP","74","39810 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926580 TSecr=0 WS=128" "48370","23.354207","172.30.1.104","172.30.1.205","TCP","54","135 > 47172 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48371","23.354217","172.30.1.104","172.30.1.205","TCP","66","49671 > 39810 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48372","23.354226","172.30.1.205","172.30.1.104","TCP","54","39810 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48373","23.354248","172.30.1.104","172.30.1.205","TCP","54","135 > 47172 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48374","23.354253","172.30.1.205","172.30.1.104","TCP","54","47172 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48375","23.354595","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48376","23.354898","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48377","23.354907","172.30.1.205","172.30.1.104","TCP","54","39810 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48378","23.356796","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48379","23.357200","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48380","23.357207","172.30.1.205","172.30.1.104","TCP","54","39810 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48381","23.358556","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48382","23.362399","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48383","23.362432","172.30.1.205","172.30.1.104","TCP","54","39810 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48384","23.363364","172.30.1.205","172.30.1.104","TCP","74","47176 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926589 TSecr=0 WS=128" "48385","23.363764","172.30.1.104","172.30.1.205","TCP","66","135 > 47176 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48386","23.363774","172.30.1.205","172.30.1.104","TCP","54","47176 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48387","23.364129","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48388","23.364441","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48389","23.364449","172.30.1.205","172.30.1.104","TCP","54","47176 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48390","23.366650","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48391","23.367144","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48392","23.367150","172.30.1.205","172.30.1.104","TCP","54","47176 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48393","23.368000","172.30.1.205","172.30.1.104","TCP","54","39770 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48394","23.368048","172.30.1.205","172.30.1.104","TCP","54","39774 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48395","23.368084","172.30.1.205","172.30.1.104","TCP","54","39778 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48396","23.368117","172.30.1.205","172.30.1.104","TCP","54","39782 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48397","23.368149","172.30.1.205","172.30.1.104","TCP","54","39786 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48398","23.368189","172.30.1.205","172.30.1.104","TCP","54","39790 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48399","23.368217","172.30.1.205","172.30.1.104","TCP","54","39794 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48400","23.368249","172.30.1.205","172.30.1.104","TCP","54","39798 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48401","23.368281","172.30.1.205","172.30.1.104","TCP","54","39802 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48402","23.368308","172.30.1.205","172.30.1.104","TCP","54","39806 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48403","23.368338","172.30.1.205","172.30.1.104","TCP","54","39810 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48404","23.368413","172.30.1.205","172.30.1.104","TCP","54","39766 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48405","23.368565","172.30.1.104","172.30.1.205","TCP","54","49671 > 39770 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48406","23.368581","172.30.1.104","172.30.1.205","TCP","54","49671 > 39774 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48407","23.368599","172.30.1.104","172.30.1.205","TCP","54","49671 > 39770 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48408","23.368605","172.30.1.205","172.30.1.104","TCP","54","39770 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48409","23.368619","172.30.1.104","172.30.1.205","TCP","54","49671 > 39778 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48410","23.368639","172.30.1.104","172.30.1.205","TCP","54","49671 > 39782 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48411","23.368683","172.30.1.104","172.30.1.205","TCP","54","49671 > 39774 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48412","23.368689","172.30.1.205","172.30.1.104","TCP","54","39774 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48413","23.368702","172.30.1.104","172.30.1.205","TCP","54","49671 > 39786 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48414","23.368727","172.30.1.104","172.30.1.205","TCP","54","49671 > 39786 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48415","23.368732","172.30.1.205","172.30.1.104","TCP","54","39786 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48416","23.368744","172.30.1.104","172.30.1.205","TCP","54","49671 > 39778 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48417","23.368747","172.30.1.205","172.30.1.104","TCP","54","39778 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48418","23.368764","172.30.1.104","172.30.1.205","TCP","54","49671 > 39790 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48419","23.368789","172.30.1.104","172.30.1.205","TCP","54","49671 > 39794 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48420","23.368803","172.30.1.104","172.30.1.205","TCP","54","49671 > 39794 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48421","23.368807","172.30.1.205","172.30.1.104","TCP","54","39794 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48422","23.368821","172.30.1.104","172.30.1.205","TCP","54","49671 > 39798 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48423","23.368841","172.30.1.104","172.30.1.205","TCP","54","49671 > 39802 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48424","23.368859","172.30.1.104","172.30.1.205","TCP","54","49671 > 39802 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48425","23.368863","172.30.1.205","172.30.1.104","TCP","54","39802 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48426","23.368877","172.30.1.104","172.30.1.205","TCP","54","49671 > 39806 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48427","23.368898","172.30.1.104","172.30.1.205","TCP","54","49671 > 39798 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48428","23.368902","172.30.1.205","172.30.1.104","TCP","54","39798 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48429","23.369016","172.30.1.104","172.30.1.205","TCP","54","49671 > 39810 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48430","23.369046","172.30.1.104","172.30.1.205","TCP","54","49671 > 39810 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48431","23.369051","172.30.1.205","172.30.1.104","TCP","54","39810 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48432","23.369052","172.30.1.104","172.30.1.205","TCP","54","49671 > 39806 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48433","23.369054","172.30.1.205","172.30.1.104","TCP","54","39806 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48434","23.369065","172.30.1.104","172.30.1.205","TCP","54","49671 > 39782 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48435","23.369068","172.30.1.205","172.30.1.104","TCP","54","39782 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48436","23.369084","172.30.1.104","172.30.1.205","TCP","54","49671 > 39790 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48437","23.369087","172.30.1.205","172.30.1.104","TCP","54","39790 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48438","23.369204","172.30.1.104","172.30.1.205","TCP","54","49671 > 39766 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48439","23.369223","172.30.1.104","172.30.1.205","TCP","54","49671 > 39766 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48440","23.369226","172.30.1.205","172.30.1.104","TCP","54","39766 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48441","23.370027","172.30.1.205","172.30.1.104","TCP","54","47176 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48442","23.370139","172.30.1.205","172.30.1.104","TCP","74","39814 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926596 TSecr=0 WS=128" "48443","23.370288","172.30.1.104","172.30.1.205","TCP","54","135 > 47176 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48444","23.370326","172.30.1.104","172.30.1.205","TCP","54","135 > 47176 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48445","23.370331","172.30.1.205","172.30.1.104","TCP","54","47176 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48446","23.370433","172.30.1.104","172.30.1.205","TCP","66","49671 > 39814 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48447","23.370441","172.30.1.205","172.30.1.104","TCP","54","39814 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48448","23.370811","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48449","23.371148","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48450","23.371157","172.30.1.205","172.30.1.104","TCP","54","39814 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48451","23.373062","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48452","23.373427","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48453","23.373433","172.30.1.205","172.30.1.104","TCP","54","39814 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48454","23.374785","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48455","23.378528","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48456","23.378538","172.30.1.205","172.30.1.104","TCP","54","39814 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48457","23.379477","172.30.1.205","172.30.1.104","TCP","74","47180 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926605 TSecr=0 WS=128" "48458","23.379836","172.30.1.104","172.30.1.205","TCP","66","135 > 47180 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48459","23.379847","172.30.1.205","172.30.1.104","TCP","54","47180 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48460","23.380200","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48461","23.380509","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48462","23.380519","172.30.1.205","172.30.1.104","TCP","54","47180 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48463","23.382709","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48464","23.383114","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48465","23.383120","172.30.1.205","172.30.1.104","TCP","54","47180 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48466","23.384942","172.30.1.205","172.30.1.104","TCP","54","47180 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48467","23.385050","172.30.1.205","172.30.1.104","TCP","74","39818 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926611 TSecr=0 WS=128" "48468","23.385222","172.30.1.104","172.30.1.205","TCP","54","135 > 47180 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48469","23.385232","172.30.1.104","172.30.1.205","TCP","54","135 > 47180 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48470","23.385237","172.30.1.205","172.30.1.104","TCP","54","47180 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48471","23.385327","172.30.1.104","172.30.1.205","TCP","66","49671 > 39818 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48472","23.385335","172.30.1.205","172.30.1.104","TCP","54","39818 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48473","23.385678","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48474","23.385966","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48475","23.385975","172.30.1.205","172.30.1.104","TCP","54","39818 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48476","23.387833","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48477","23.388206","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48478","23.388213","172.30.1.205","172.30.1.104","TCP","54","39818 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48479","23.389604","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48480","23.393267","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48481","23.393278","172.30.1.205","172.30.1.104","TCP","54","39818 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48482","23.394254","172.30.1.205","172.30.1.104","TCP","74","47184 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926620 TSecr=0 WS=128" "48483","23.394581","172.30.1.104","172.30.1.205","TCP","66","135 > 47184 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48484","23.394592","172.30.1.205","172.30.1.104","TCP","54","47184 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48485","23.394957","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48486","23.395253","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48487","23.395262","172.30.1.205","172.30.1.104","TCP","54","47184 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48488","23.397507","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48489","23.397917","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48490","23.397924","172.30.1.205","172.30.1.104","TCP","54","47184 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48491","23.399750","172.30.1.205","172.30.1.104","TCP","54","47184 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48492","23.399865","172.30.1.205","172.30.1.104","TCP","74","39822 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926626 TSecr=0 WS=128" "48493","23.400020","172.30.1.104","172.30.1.205","TCP","54","135 > 47184 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48494","23.400032","172.30.1.104","172.30.1.205","TCP","54","135 > 47184 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48495","23.400037","172.30.1.205","172.30.1.104","TCP","54","47184 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48496","23.400172","172.30.1.104","172.30.1.205","TCP","66","49671 > 39822 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48497","23.400180","172.30.1.205","172.30.1.104","TCP","54","39822 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48498","23.400526","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48499","23.400813","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48500","23.400822","172.30.1.205","172.30.1.104","TCP","54","39822 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48501","23.402721","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48502","23.403086","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48503","23.403093","172.30.1.205","172.30.1.104","TCP","54","39822 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48504","23.404441","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48505","23.408065","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48506","23.408075","172.30.1.205","172.30.1.104","TCP","54","39822 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48507","23.409046","172.30.1.205","172.30.1.104","TCP","74","47188 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926635 TSecr=0 WS=128" "48508","23.409389","172.30.1.104","172.30.1.205","TCP","66","135 > 47188 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48509","23.409399","172.30.1.205","172.30.1.104","TCP","54","47188 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48510","23.409750","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48511","23.410033","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48512","23.410042","172.30.1.205","172.30.1.104","TCP","54","47188 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48513","23.412226","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48514","23.412621","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48515","23.412628","172.30.1.205","172.30.1.104","TCP","54","47188 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48516","23.414464","172.30.1.205","172.30.1.104","TCP","54","47188 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48517","23.414575","172.30.1.205","172.30.1.104","TCP","74","39826 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926641 TSecr=0 WS=128" "48518","23.414722","172.30.1.104","172.30.1.205","TCP","54","135 > 47188 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48519","23.414779","172.30.1.104","172.30.1.205","TCP","54","135 > 47188 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48520","23.414785","172.30.1.205","172.30.1.104","TCP","54","47188 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48521","23.414863","172.30.1.104","172.30.1.205","TCP","66","49671 > 39826 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48522","23.414871","172.30.1.205","172.30.1.104","TCP","54","39826 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48523","23.415232","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48524","23.416735","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48525","23.416744","172.30.1.205","172.30.1.104","TCP","54","39826 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48526","23.418632","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48527","23.419068","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48528","23.419075","172.30.1.205","172.30.1.104","TCP","54","39826 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48529","23.420426","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48530","23.424140","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48531","23.424151","172.30.1.205","172.30.1.104","TCP","54","39826 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48532","23.425147","172.30.1.205","172.30.1.104","TCP","74","47192 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926651 TSecr=0 WS=128" "48533","23.425518","172.30.1.104","172.30.1.205","TCP","66","135 > 47192 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48534","23.425528","172.30.1.205","172.30.1.104","TCP","54","47192 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48535","23.425881","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48536","23.426186","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48537","23.426195","172.30.1.205","172.30.1.104","TCP","54","47192 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48538","23.428377","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48539","23.428819","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48540","23.428825","172.30.1.205","172.30.1.104","TCP","54","47192 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48541","23.430635","172.30.1.205","172.30.1.104","TCP","54","47192 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48542","23.430766","172.30.1.205","172.30.1.104","TCP","74","39830 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926657 TSecr=0 WS=128" "48543","23.430908","172.30.1.104","172.30.1.205","TCP","54","135 > 47192 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48544","23.430944","172.30.1.104","172.30.1.205","TCP","54","135 > 47192 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48545","23.430950","172.30.1.205","172.30.1.104","TCP","54","47192 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48546","23.431044","172.30.1.104","172.30.1.205","TCP","66","49671 > 39830 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48547","23.431053","172.30.1.205","172.30.1.104","TCP","54","39830 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48548","23.431421","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48549","23.431702","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48550","23.431710","172.30.1.205","172.30.1.104","TCP","54","39830 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48551","23.433628","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48552","23.434167","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48553","23.434174","172.30.1.205","172.30.1.104","TCP","54","39830 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48554","23.435523","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48555","23.439237","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48556","23.439246","172.30.1.205","172.30.1.104","TCP","54","39830 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48557","23.440190","172.30.1.205","172.30.1.104","TCP","74","47196 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926666 TSecr=0 WS=128" "48558","23.440572","172.30.1.104","172.30.1.205","TCP","66","135 > 47196 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48559","23.440584","172.30.1.205","172.30.1.104","TCP","54","47196 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48560","23.440973","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48561","23.441278","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48562","23.441287","172.30.1.205","172.30.1.104","TCP","54","47196 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48563","23.443478","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48564","23.443988","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48565","23.443994","172.30.1.205","172.30.1.104","TCP","54","47196 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48566","23.445834","172.30.1.205","172.30.1.104","TCP","54","47196 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48567","23.445945","172.30.1.205","172.30.1.104","TCP","74","39834 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926672 TSecr=0 WS=128" "48568","23.446140","172.30.1.104","172.30.1.205","TCP","54","135 > 47196 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48569","23.446151","172.30.1.104","172.30.1.205","TCP","54","135 > 47196 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48570","23.446156","172.30.1.205","172.30.1.104","TCP","54","47196 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48571","23.446229","172.30.1.104","172.30.1.205","TCP","66","49671 > 39834 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48572","23.446237","172.30.1.205","172.30.1.104","TCP","54","39834 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48573","23.446584","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48574","23.446869","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48575","23.446878","172.30.1.205","172.30.1.104","TCP","54","39834 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48576","23.448761","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48577","23.449164","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48578","23.449171","172.30.1.205","172.30.1.104","TCP","54","39834 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48579","23.450530","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48580","23.454305","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48581","23.454330","172.30.1.205","172.30.1.104","TCP","54","39834 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48582","23.455332","172.30.1.205","172.30.1.104","TCP","74","47200 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926681 TSecr=0 WS=128" "48583","23.455676","172.30.1.104","172.30.1.205","TCP","66","135 > 47200 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48584","23.455687","172.30.1.205","172.30.1.104","TCP","54","47200 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48585","23.456035","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48586","23.456324","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48587","23.456333","172.30.1.205","172.30.1.104","TCP","54","47200 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48588","23.458595","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48589","23.459014","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48590","23.459021","172.30.1.205","172.30.1.104","TCP","54","47200 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48591","23.460850","172.30.1.205","172.30.1.104","TCP","54","47200 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48592","23.460965","172.30.1.205","172.30.1.104","TCP","74","39838 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926687 TSecr=0 WS=128" "48593","23.461121","172.30.1.104","172.30.1.205","TCP","54","135 > 47200 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48594","23.461136","172.30.1.104","172.30.1.205","TCP","54","135 > 47200 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48595","23.461142","172.30.1.205","172.30.1.104","TCP","54","47200 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48596","23.461269","172.30.1.104","172.30.1.205","TCP","66","49671 > 39838 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48597","23.461277","172.30.1.205","172.30.1.104","TCP","54","39838 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48598","23.461621","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48599","23.461902","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48600","23.461912","172.30.1.205","172.30.1.104","TCP","54","39838 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48601","23.463787","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48602","23.464226","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48603","23.464232","172.30.1.205","172.30.1.104","TCP","54","39838 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48604","23.465631","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48605","23.469406","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48606","23.469417","172.30.1.205","172.30.1.104","TCP","54","39838 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48607","23.470401","172.30.1.205","172.30.1.104","TCP","74","47204 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926696 TSecr=0 WS=128" "48608","23.470702","172.30.1.104","172.30.1.205","TCP","66","135 > 47204 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48609","23.470714","172.30.1.205","172.30.1.104","TCP","54","47204 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48610","23.471124","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48611","23.471403","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48612","23.471412","172.30.1.205","172.30.1.104","TCP","54","47204 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48613","23.473641","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48614","23.474044","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48615","23.474050","172.30.1.205","172.30.1.104","TCP","54","47204 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48616","23.475861","172.30.1.205","172.30.1.104","TCP","54","47204 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48617","23.475970","172.30.1.205","172.30.1.104","TCP","74","39842 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926702 TSecr=0 WS=128" "48618","23.476112","172.30.1.104","172.30.1.205","TCP","54","135 > 47204 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48619","23.476126","172.30.1.104","172.30.1.205","TCP","54","135 > 47204 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48620","23.476131","172.30.1.205","172.30.1.104","TCP","54","47204 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48621","23.476249","172.30.1.104","172.30.1.205","TCP","66","49671 > 39842 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48622","23.476258","172.30.1.205","172.30.1.104","TCP","54","39842 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48623","23.476601","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48624","23.476878","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48625","23.476887","172.30.1.205","172.30.1.104","TCP","54","39842 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48626","23.478774","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48627","23.479132","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48628","23.479138","172.30.1.205","172.30.1.104","TCP","54","39842 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48629","23.480489","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48630","23.484268","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48631","23.484279","172.30.1.205","172.30.1.104","TCP","54","39842 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48632","23.485252","172.30.1.205","172.30.1.104","TCP","74","47208 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926711 TSecr=0 WS=128" "48633","23.485597","172.30.1.104","172.30.1.205","TCP","66","135 > 47208 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48634","23.485610","172.30.1.205","172.30.1.104","TCP","54","47208 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48635","23.485972","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48636","23.486293","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48637","23.486302","172.30.1.205","172.30.1.104","TCP","54","47208 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48638","23.488485","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48639","23.488912","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48640","23.488920","172.30.1.205","172.30.1.104","TCP","54","47208 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48641","23.490755","172.30.1.205","172.30.1.104","TCP","54","47208 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48642","23.490867","172.30.1.205","172.30.1.104","TCP","74","39846 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926717 TSecr=0 WS=128" "48643","23.491011","172.30.1.104","172.30.1.205","TCP","54","135 > 47208 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48644","23.491040","172.30.1.104","172.30.1.205","TCP","54","135 > 47208 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48645","23.491045","172.30.1.205","172.30.1.104","TCP","54","47208 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48646","23.491161","172.30.1.104","172.30.1.205","TCP","66","49671 > 39846 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48647","23.491169","172.30.1.205","172.30.1.104","TCP","54","39846 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48648","23.491517","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48649","23.491805","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48650","23.491814","172.30.1.205","172.30.1.104","TCP","54","39846 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48651","23.493710","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48652","23.494110","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48653","23.494116","172.30.1.205","172.30.1.104","TCP","54","39846 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48654","23.495454","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48655","23.499260","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48656","23.499271","172.30.1.205","172.30.1.104","TCP","54","39846 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48657","23.500216","172.30.1.205","172.30.1.104","TCP","74","47212 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926726 TSecr=0 WS=128" "48658","23.500528","172.30.1.104","172.30.1.205","TCP","66","135 > 47212 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48659","23.500538","172.30.1.205","172.30.1.104","TCP","54","47212 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48660","23.500915","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48661","23.501196","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48662","23.501205","172.30.1.205","172.30.1.104","TCP","54","47212 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48663","23.503392","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48664","23.503797","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48665","23.503804","172.30.1.205","172.30.1.104","TCP","54","47212 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48666","23.505637","172.30.1.205","172.30.1.104","TCP","54","47212 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48667","23.505758","172.30.1.205","172.30.1.104","TCP","74","39850 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926732 TSecr=0 WS=128" "48668","23.505906","172.30.1.104","172.30.1.205","TCP","54","135 > 47212 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48669","23.505959","172.30.1.104","172.30.1.205","TCP","54","135 > 47212 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48670","23.505965","172.30.1.205","172.30.1.104","TCP","54","47212 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48671","23.506081","172.30.1.104","172.30.1.205","TCP","66","49671 > 39850 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48672","23.506097","172.30.1.205","172.30.1.104","TCP","54","39850 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48673","23.506496","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48674","23.506770","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48675","23.506780","172.30.1.205","172.30.1.104","TCP","54","39850 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48676","23.508698","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48677","23.509096","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48678","23.509103","172.30.1.205","172.30.1.104","TCP","54","39850 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48679","23.510489","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48680","23.514318","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48681","23.514329","172.30.1.205","172.30.1.104","TCP","54","39850 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48682","23.515305","172.30.1.205","172.30.1.104","TCP","74","47216 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926741 TSecr=0 WS=128" "48683","23.515597","172.30.1.104","172.30.1.205","TCP","66","135 > 47216 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48684","23.515608","172.30.1.205","172.30.1.104","TCP","54","47216 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48685","23.515963","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48686","23.516248","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48687","23.516257","172.30.1.205","172.30.1.104","TCP","54","47216 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48688","23.518500","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48689","23.518915","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48690","23.518922","172.30.1.205","172.30.1.104","TCP","54","47216 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48691","23.520732","172.30.1.205","172.30.1.104","TCP","54","47216 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48692","23.520871","172.30.1.205","172.30.1.104","TCP","74","39854 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926747 TSecr=0 WS=128" "48693","23.520994","172.30.1.104","172.30.1.205","TCP","54","135 > 47216 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48694","23.521005","172.30.1.104","172.30.1.205","TCP","54","135 > 47216 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48695","23.521011","172.30.1.205","172.30.1.104","TCP","54","47216 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48696","23.521152","172.30.1.104","172.30.1.205","TCP","66","49671 > 39854 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48697","23.521161","172.30.1.205","172.30.1.104","TCP","54","39854 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48698","23.521517","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48699","23.521807","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48700","23.521825","172.30.1.205","172.30.1.104","TCP","54","39854 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48701","23.523947","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48702","23.524328","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48703","23.524335","172.30.1.205","172.30.1.104","TCP","54","39854 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48704","23.525715","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48705","23.529540","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48706","23.529550","172.30.1.205","172.30.1.104","TCP","54","39854 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48707","23.530504","172.30.1.205","172.30.1.104","TCP","74","47220 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926756 TSecr=0 WS=128" "48708","23.530855","172.30.1.104","172.30.1.205","TCP","66","135 > 47220 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48709","23.530867","172.30.1.205","172.30.1.104","TCP","54","47220 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48710","23.531226","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48711","23.531514","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48712","23.531524","172.30.1.205","172.30.1.104","TCP","54","47220 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48713","23.533750","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48714","23.534160","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48715","23.534167","172.30.1.205","172.30.1.104","TCP","54","47220 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48716","23.536007","172.30.1.205","172.30.1.104","TCP","54","47220 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48717","23.536119","172.30.1.205","172.30.1.104","TCP","74","39858 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926762 TSecr=0 WS=128" "48718","23.536257","172.30.1.104","172.30.1.205","TCP","54","135 > 47220 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48719","23.536284","172.30.1.104","172.30.1.205","TCP","54","135 > 47220 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48720","23.536290","172.30.1.205","172.30.1.104","TCP","54","47220 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48721","23.536419","172.30.1.104","172.30.1.205","TCP","66","49671 > 39858 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48722","23.536436","172.30.1.205","172.30.1.104","TCP","54","39858 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48723","23.537064","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48724","23.537339","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48725","23.537346","172.30.1.205","172.30.1.104","TCP","54","39858 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48726","23.539215","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48727","23.539577","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48728","23.539584","172.30.1.205","172.30.1.104","TCP","54","39858 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48729","23.540962","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48730","23.544752","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48731","23.544763","172.30.1.205","172.30.1.104","TCP","54","39858 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48732","23.545741","172.30.1.205","172.30.1.104","TCP","74","47224 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926772 TSecr=0 WS=128" "48733","23.546025","172.30.1.104","172.30.1.205","TCP","66","135 > 47224 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48734","23.546036","172.30.1.205","172.30.1.104","TCP","54","47224 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48735","23.546400","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48736","23.546680","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48737","23.546689","172.30.1.205","172.30.1.104","TCP","54","47224 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48738","23.548911","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48739","23.549328","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48740","23.549334","172.30.1.205","172.30.1.104","TCP","54","47224 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48741","23.550194","172.30.1.205","172.30.1.104","TCP","54","39818 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48742","23.550243","172.30.1.205","172.30.1.104","TCP","54","39822 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48743","23.550282","172.30.1.205","172.30.1.104","TCP","54","39826 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48744","23.550316","172.30.1.205","172.30.1.104","TCP","54","39830 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48745","23.550349","172.30.1.205","172.30.1.104","TCP","54","39834 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48746","23.550382","172.30.1.205","172.30.1.104","TCP","54","39838 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48747","23.550409","172.30.1.205","172.30.1.104","TCP","54","39842 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48748","23.550436","172.30.1.205","172.30.1.104","TCP","54","39846 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48749","23.550455","172.30.1.104","172.30.1.205","TCP","54","49671 > 39818 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48750","23.550500","172.30.1.205","172.30.1.104","TCP","54","39850 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48751","23.550533","172.30.1.205","172.30.1.104","TCP","54","39854 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48752","23.550559","172.30.1.205","172.30.1.104","TCP","54","39858 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48753","23.550570","172.30.1.104","172.30.1.205","TCP","54","49671 > 39822 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48754","23.550589","172.30.1.104","172.30.1.205","TCP","54","49671 > 39818 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48755","23.550595","172.30.1.205","172.30.1.104","TCP","54","39818 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48756","23.550608","172.30.1.104","172.30.1.205","TCP","54","49671 > 39830 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48757","23.550627","172.30.1.104","172.30.1.205","TCP","54","49671 > 39826 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48758","23.550686","172.30.1.205","172.30.1.104","TCP","54","39814 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "48759","23.550720","172.30.1.104","172.30.1.205","TCP","54","49671 > 39826 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48760","23.550725","172.30.1.205","172.30.1.104","TCP","54","39826 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48761","23.550739","172.30.1.104","172.30.1.205","TCP","54","49671 > 39838 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48762","23.550758","172.30.1.104","172.30.1.205","TCP","54","49671 > 39838 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48763","23.550761","172.30.1.205","172.30.1.104","TCP","54","39838 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48764","23.550778","172.30.1.104","172.30.1.205","TCP","54","49671 > 39834 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48765","23.550799","172.30.1.104","172.30.1.205","TCP","54","49671 > 39834 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48766","23.550804","172.30.1.205","172.30.1.104","TCP","54","39834 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48767","23.550818","172.30.1.104","172.30.1.205","TCP","54","49671 > 39822 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48768","23.550821","172.30.1.205","172.30.1.104","TCP","54","39822 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48769","23.550846","172.30.1.104","172.30.1.205","TCP","54","49671 > 39830 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48770","23.550850","172.30.1.205","172.30.1.104","TCP","54","39830 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48771","23.550873","172.30.1.104","172.30.1.205","TCP","54","49671 > 39842 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48772","23.551018","172.30.1.104","172.30.1.205","TCP","54","49671 > 39846 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48773","23.551037","172.30.1.104","172.30.1.205","TCP","54","49671 > 39850 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48774","23.551056","172.30.1.104","172.30.1.205","TCP","54","49671 > 39850 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48775","23.551061","172.30.1.205","172.30.1.104","TCP","54","39850 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48776","23.551077","172.30.1.104","172.30.1.205","TCP","54","49671 > 39842 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48777","23.551079","172.30.1.205","172.30.1.104","TCP","54","39842 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48778","23.551100","172.30.1.104","172.30.1.205","TCP","54","49671 > 39846 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48779","23.551103","172.30.1.205","172.30.1.104","TCP","54","39846 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48780","23.551128","172.30.1.104","172.30.1.205","TCP","54","49671 > 39854 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48781","23.551216","172.30.1.104","172.30.1.205","TCP","54","49671 > 39858 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48782","23.551234","172.30.1.104","172.30.1.205","TCP","54","49671 > 39854 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48783","23.551238","172.30.1.205","172.30.1.104","TCP","54","39854 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48784","23.551255","172.30.1.104","172.30.1.205","TCP","54","49671 > 39858 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48785","23.551257","172.30.1.205","172.30.1.104","TCP","54","39858 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48786","23.551283","172.30.1.104","172.30.1.205","TCP","54","49671 > 39814 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48787","23.551348","172.30.1.104","172.30.1.205","TCP","54","49671 > 39814 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "48788","23.551351","172.30.1.205","172.30.1.104","TCP","54","39814 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "48789","23.552212","172.30.1.205","172.30.1.104","TCP","54","47224 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48790","23.552326","172.30.1.205","172.30.1.104","TCP","74","39862 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926778 TSecr=0 WS=128" "48791","23.552471","172.30.1.104","172.30.1.205","TCP","54","135 > 47224 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48792","23.552485","172.30.1.104","172.30.1.205","TCP","54","135 > 47224 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48793","23.552490","172.30.1.205","172.30.1.104","TCP","54","47224 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48794","23.552639","172.30.1.104","172.30.1.205","TCP","66","49671 > 39862 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48795","23.552647","172.30.1.205","172.30.1.104","TCP","54","39862 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48796","23.553057","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48797","23.553345","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48798","23.553354","172.30.1.205","172.30.1.104","TCP","54","39862 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48799","23.555226","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48800","23.555612","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48801","23.555619","172.30.1.205","172.30.1.104","TCP","54","39862 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48802","23.557004","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48803","23.560719","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48804","23.560729","172.30.1.205","172.30.1.104","TCP","54","39862 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48805","23.561713","172.30.1.205","172.30.1.104","TCP","74","47228 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926788 TSecr=0 WS=128" "48806","23.562030","172.30.1.104","172.30.1.205","TCP","66","135 > 47228 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48807","23.562041","172.30.1.205","172.30.1.104","TCP","54","47228 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48808","23.562393","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48809","23.562670","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48810","23.562680","172.30.1.205","172.30.1.104","TCP","54","47228 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48811","23.564869","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48812","23.565296","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48813","23.565303","172.30.1.205","172.30.1.104","TCP","54","47228 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48814","23.567113","172.30.1.205","172.30.1.104","TCP","54","47228 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48815","23.567225","172.30.1.205","172.30.1.104","TCP","74","39866 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926793 TSecr=0 WS=128" "48816","23.567421","172.30.1.104","172.30.1.205","TCP","54","135 > 47228 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48817","23.567459","172.30.1.104","172.30.1.205","TCP","54","135 > 47228 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48818","23.567465","172.30.1.205","172.30.1.104","TCP","54","47228 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48819","23.567591","172.30.1.104","172.30.1.205","TCP","66","49671 > 39866 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48820","23.567602","172.30.1.205","172.30.1.104","TCP","54","39866 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48821","23.568231","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48822","23.568510","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48823","23.568519","172.30.1.205","172.30.1.104","TCP","54","39866 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48824","23.570435","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48825","23.570789","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48826","23.570795","172.30.1.205","172.30.1.104","TCP","54","39866 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48827","23.572139","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48828","23.577950","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48829","23.577969","172.30.1.205","172.30.1.104","TCP","54","39866 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48830","23.579074","172.30.1.205","172.30.1.104","TCP","74","47232 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926805 TSecr=0 WS=128" "48831","23.579453","172.30.1.104","172.30.1.205","TCP","66","135 > 47232 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48832","23.579465","172.30.1.205","172.30.1.104","TCP","54","47232 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48833","23.579823","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48834","23.580117","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48835","23.580125","172.30.1.205","172.30.1.104","TCP","54","47232 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48836","23.582342","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48837","23.582775","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48838","23.582789","172.30.1.205","172.30.1.104","TCP","54","47232 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48839","23.584620","172.30.1.205","172.30.1.104","TCP","54","47232 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48840","23.584732","172.30.1.205","172.30.1.104","TCP","74","39870 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926811 TSecr=0 WS=128" "48841","23.584874","172.30.1.104","172.30.1.205","TCP","54","135 > 47232 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48842","23.584907","172.30.1.104","172.30.1.205","TCP","54","135 > 47232 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48843","23.584913","172.30.1.205","172.30.1.104","TCP","54","47232 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48844","23.585007","172.30.1.104","172.30.1.205","TCP","66","49671 > 39870 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48845","23.585014","172.30.1.205","172.30.1.104","TCP","54","39870 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48846","23.585381","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48847","23.586770","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48848","23.586780","172.30.1.205","172.30.1.104","TCP","54","39870 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48849","23.588667","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48850","23.589030","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48851","23.589039","172.30.1.205","172.30.1.104","TCP","54","39870 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48852","23.590407","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48853","23.594181","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48854","23.594200","172.30.1.205","172.30.1.104","TCP","54","39870 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48855","23.595149","172.30.1.205","172.30.1.104","TCP","74","47236 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926821 TSecr=0 WS=128" "48856","23.595588","172.30.1.104","172.30.1.205","TCP","66","135 > 47236 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48857","23.595602","172.30.1.205","172.30.1.104","TCP","54","47236 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48858","23.595975","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48859","23.596269","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48860","23.596278","172.30.1.205","172.30.1.104","TCP","54","47236 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48861","23.598499","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48862","23.598909","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48863","23.598916","172.30.1.205","172.30.1.104","TCP","54","47236 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48864","23.600738","172.30.1.205","172.30.1.104","TCP","54","47236 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48865","23.600869","172.30.1.205","172.30.1.104","TCP","74","39874 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926827 TSecr=0 WS=128" "48866","23.600987","172.30.1.104","172.30.1.205","TCP","54","135 > 47236 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48867","23.600998","172.30.1.104","172.30.1.205","TCP","54","135 > 47236 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48868","23.601003","172.30.1.205","172.30.1.104","TCP","54","47236 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48869","23.601145","172.30.1.104","172.30.1.205","TCP","66","49671 > 39874 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48870","23.601153","172.30.1.205","172.30.1.104","TCP","54","39874 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48871","23.601500","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48872","23.601799","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48873","23.601808","172.30.1.205","172.30.1.104","TCP","54","39874 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48874","23.603703","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48875","23.604067","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48876","23.604073","172.30.1.205","172.30.1.104","TCP","54","39874 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48877","23.605460","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48878","23.609255","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48879","23.609266","172.30.1.205","172.30.1.104","TCP","54","39874 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48880","23.610235","172.30.1.205","172.30.1.104","TCP","74","47240 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926836 TSecr=0 WS=128" "48881","23.610545","172.30.1.104","172.30.1.205","TCP","66","135 > 47240 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48882","23.610555","172.30.1.205","172.30.1.104","TCP","54","47240 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48883","23.610912","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48884","23.611200","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48885","23.611209","172.30.1.205","172.30.1.104","TCP","54","47240 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48886","23.613435","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48887","23.613830","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48888","23.613837","172.30.1.205","172.30.1.104","TCP","54","47240 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48889","23.615664","172.30.1.205","172.30.1.104","TCP","54","47240 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48890","23.615776","172.30.1.205","172.30.1.104","TCP","74","39878 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926842 TSecr=0 WS=128" "48891","23.615943","172.30.1.104","172.30.1.205","TCP","54","135 > 47240 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48892","23.615978","172.30.1.104","172.30.1.205","TCP","54","135 > 47240 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48893","23.615983","172.30.1.205","172.30.1.104","TCP","54","47240 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48894","23.616064","172.30.1.104","172.30.1.205","TCP","66","49671 > 39878 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48895","23.616073","172.30.1.205","172.30.1.104","TCP","54","39878 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48896","23.616419","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48897","23.616700","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48898","23.616709","172.30.1.205","172.30.1.104","TCP","54","39878 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48899","23.618614","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48900","23.619019","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48901","23.619025","172.30.1.205","172.30.1.104","TCP","54","39878 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48902","23.620378","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48903","23.624142","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48904","23.624154","172.30.1.205","172.30.1.104","TCP","54","39878 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48905","23.625153","172.30.1.205","172.30.1.104","TCP","74","47244 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926851 TSecr=0 WS=128" "48906","23.625478","172.30.1.104","172.30.1.205","TCP","66","135 > 47244 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48907","23.625489","172.30.1.205","172.30.1.104","TCP","54","47244 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48908","23.625854","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48909","23.626161","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48910","23.626170","172.30.1.205","172.30.1.104","TCP","54","47244 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48911","23.628373","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48912","23.628791","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48913","23.628798","172.30.1.205","172.30.1.104","TCP","54","47244 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48914","23.630632","172.30.1.205","172.30.1.104","TCP","54","47244 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48915","23.630745","172.30.1.205","172.30.1.104","TCP","74","39882 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926857 TSecr=0 WS=128" "48916","23.630891","172.30.1.104","172.30.1.205","TCP","54","135 > 47244 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48917","23.630903","172.30.1.104","172.30.1.205","TCP","54","135 > 47244 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48918","23.630909","172.30.1.205","172.30.1.104","TCP","54","47244 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48919","23.631042","172.30.1.104","172.30.1.205","TCP","66","49671 > 39882 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48920","23.631050","172.30.1.205","172.30.1.104","TCP","54","39882 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48921","23.631404","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48922","23.635086","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48923","23.635096","172.30.1.205","172.30.1.104","TCP","54","39882 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48924","23.637098","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48925","23.637490","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48926","23.637496","172.30.1.205","172.30.1.104","TCP","54","39882 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48927","23.638872","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48928","23.647484","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48929","23.647495","172.30.1.205","172.30.1.104","TCP","54","39882 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48930","23.648489","172.30.1.205","172.30.1.104","TCP","74","47248 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926874 TSecr=0 WS=128" "48931","23.648883","172.30.1.104","172.30.1.205","TCP","66","135 > 47248 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48932","23.648896","172.30.1.205","172.30.1.104","TCP","54","47248 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48933","23.649253","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48934","23.649572","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48935","23.649581","172.30.1.205","172.30.1.104","TCP","54","47248 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48936","23.651786","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48937","23.652208","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48938","23.652215","172.30.1.205","172.30.1.104","TCP","54","47248 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48939","23.654058","172.30.1.205","172.30.1.104","TCP","54","47248 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48940","23.654177","172.30.1.205","172.30.1.104","TCP","74","39886 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926880 TSecr=0 WS=128" "48941","23.654324","172.30.1.104","172.30.1.205","TCP","54","135 > 47248 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48942","23.654333","172.30.1.104","172.30.1.205","TCP","54","135 > 47248 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48943","23.654339","172.30.1.205","172.30.1.104","TCP","54","47248 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48944","23.654451","172.30.1.104","172.30.1.205","TCP","66","49671 > 39886 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48945","23.654460","172.30.1.205","172.30.1.104","TCP","54","39886 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48946","23.654807","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48947","23.655130","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48948","23.655138","172.30.1.205","172.30.1.104","TCP","54","39886 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48949","23.657066","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48950","23.658402","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48951","23.658408","172.30.1.205","172.30.1.104","TCP","54","39886 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48952","23.659765","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48953","23.664549","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48954","23.664560","172.30.1.205","172.30.1.104","TCP","54","39886 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48955","23.665541","172.30.1.205","172.30.1.104","TCP","74","47252 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926891 TSecr=0 WS=128" "48956","23.665874","172.30.1.104","172.30.1.205","TCP","66","135 > 47252 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48957","23.665886","172.30.1.205","172.30.1.104","TCP","54","47252 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48958","23.666250","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48959","23.666562","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48960","23.666571","172.30.1.205","172.30.1.104","TCP","54","47252 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48961","23.668772","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48962","23.669208","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48963","23.669214","172.30.1.205","172.30.1.104","TCP","54","47252 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48964","23.671019","172.30.1.205","172.30.1.104","TCP","54","47252 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48965","23.671131","172.30.1.205","172.30.1.104","TCP","74","39890 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926897 TSecr=0 WS=128" "48966","23.671330","172.30.1.104","172.30.1.205","TCP","54","135 > 47252 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48967","23.671390","172.30.1.104","172.30.1.205","TCP","54","135 > 47252 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48968","23.671396","172.30.1.205","172.30.1.104","TCP","54","47252 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48969","23.671496","172.30.1.104","172.30.1.205","TCP","66","49671 > 39890 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48970","23.671507","172.30.1.205","172.30.1.104","TCP","54","39890 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48971","23.671874","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48972","23.674751","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48973","23.674772","172.30.1.205","172.30.1.104","TCP","54","39890 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48974","23.676804","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "48975","23.677193","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "48976","23.677200","172.30.1.205","172.30.1.104","TCP","54","39890 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "48977","23.678559","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "48978","23.682303","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "48979","23.682316","172.30.1.205","172.30.1.104","TCP","54","39890 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "48980","23.683334","172.30.1.205","172.30.1.104","TCP","74","47256 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926909 TSecr=0 WS=128" "48981","23.683654","172.30.1.104","172.30.1.205","TCP","66","135 > 47256 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48982","23.683666","172.30.1.205","172.30.1.104","TCP","54","47256 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48983","23.684024","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "48984","23.684375","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48985","23.684385","172.30.1.205","172.30.1.104","TCP","54","47256 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48986","23.686606","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "48987","23.687017","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "48988","23.687024","172.30.1.205","172.30.1.104","TCP","54","47256 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "48989","23.688844","172.30.1.205","172.30.1.104","TCP","54","47256 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "48990","23.688952","172.30.1.205","172.30.1.104","TCP","74","39894 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926915 TSecr=0 WS=128" "48991","23.689130","172.30.1.104","172.30.1.205","TCP","54","135 > 47256 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48992","23.689137","172.30.1.104","172.30.1.205","TCP","54","135 > 47256 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "48993","23.689142","172.30.1.205","172.30.1.104","TCP","54","47256 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "48994","23.689224","172.30.1.104","172.30.1.205","TCP","66","49671 > 39894 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "48995","23.689232","172.30.1.205","172.30.1.104","TCP","54","39894 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "48996","23.689574","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "48997","23.689864","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "48998","23.689872","172.30.1.205","172.30.1.104","TCP","54","39894 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "48999","23.691725","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49000","23.692084","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49001","23.692090","172.30.1.205","172.30.1.104","TCP","54","39894 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49002","23.693454","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49003","23.697227","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49004","23.697257","172.30.1.205","172.30.1.104","TCP","54","39894 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49005","23.698204","172.30.1.205","172.30.1.104","TCP","74","47260 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926924 TSecr=0 WS=128" "49006","23.698503","172.30.1.104","172.30.1.205","TCP","66","135 > 47260 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49007","23.698514","172.30.1.205","172.30.1.104","TCP","54","47260 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49008","23.698866","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49009","23.699146","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49010","23.699155","172.30.1.205","172.30.1.104","TCP","54","47260 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49011","23.701354","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49012","23.701769","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49013","23.701775","172.30.1.205","172.30.1.104","TCP","54","47260 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49014","23.703580","172.30.1.205","172.30.1.104","TCP","54","47260 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49015","23.703689","172.30.1.205","172.30.1.104","TCP","74","39898 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926930 TSecr=0 WS=128" "49016","23.703856","172.30.1.104","172.30.1.205","TCP","54","135 > 47260 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49017","23.703867","172.30.1.104","172.30.1.205","TCP","54","135 > 47260 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49018","23.703873","172.30.1.205","172.30.1.104","TCP","54","47260 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49019","23.703950","172.30.1.104","172.30.1.205","TCP","66","49671 > 39898 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49020","23.703958","172.30.1.205","172.30.1.104","TCP","54","39898 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49021","23.704299","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49022","23.704592","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49023","23.704601","172.30.1.205","172.30.1.104","TCP","54","39898 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49024","23.706491","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49025","23.706856","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49026","23.706862","172.30.1.205","172.30.1.104","TCP","54","39898 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49027","23.708195","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49028","23.712021","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49029","23.712031","172.30.1.205","172.30.1.104","TCP","54","39898 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49030","23.712994","172.30.1.205","172.30.1.104","TCP","74","47264 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926939 TSecr=0 WS=128" "49031","23.713380","172.30.1.104","172.30.1.205","TCP","66","135 > 47264 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49032","23.713391","172.30.1.205","172.30.1.104","TCP","54","47264 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49033","23.713748","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49034","23.714099","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49035","23.714108","172.30.1.205","172.30.1.104","TCP","54","47264 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49036","23.716280","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49037","23.716695","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49038","23.716701","172.30.1.205","172.30.1.104","TCP","54","47264 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49039","23.718517","172.30.1.205","172.30.1.104","TCP","54","47264 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49040","23.718627","172.30.1.205","172.30.1.104","TCP","74","39902 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926945 TSecr=0 WS=128" "49041","23.718837","172.30.1.104","172.30.1.205","TCP","54","135 > 47264 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49042","23.718872","172.30.1.104","172.30.1.205","TCP","54","135 > 47264 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49043","23.718878","172.30.1.205","172.30.1.104","TCP","54","47264 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49044","23.718977","172.30.1.104","172.30.1.205","TCP","66","49671 > 39902 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49045","23.718985","172.30.1.205","172.30.1.104","TCP","54","39902 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49046","23.719332","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49047","23.719625","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49048","23.719634","172.30.1.205","172.30.1.104","TCP","54","39902 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49049","23.721545","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49050","23.722006","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49051","23.722012","172.30.1.205","172.30.1.104","TCP","54","39902 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49052","23.723348","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49053","23.727087","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49054","23.727098","172.30.1.205","172.30.1.104","TCP","54","39902 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49055","23.728037","172.30.1.205","172.30.1.104","TCP","74","47268 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926954 TSecr=0 WS=128" "49056","23.728354","172.30.1.104","172.30.1.205","TCP","66","135 > 47268 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49057","23.728374","172.30.1.205","172.30.1.104","TCP","54","47268 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49058","23.728909","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49059","23.729266","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49060","23.729275","172.30.1.205","172.30.1.104","TCP","54","47268 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49061","23.731448","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49062","23.731953","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49063","23.731960","172.30.1.205","172.30.1.104","TCP","54","47268 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49064","23.733770","172.30.1.205","172.30.1.104","TCP","54","47268 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49065","23.733878","172.30.1.205","172.30.1.104","TCP","74","39906 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926960 TSecr=0 WS=128" "49066","23.734048","172.30.1.104","172.30.1.205","TCP","54","135 > 47268 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49067","23.734090","172.30.1.104","172.30.1.205","TCP","54","135 > 47268 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49068","23.734101","172.30.1.205","172.30.1.104","TCP","54","47268 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49069","23.734168","172.30.1.104","172.30.1.205","TCP","66","49671 > 39906 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49070","23.734181","172.30.1.205","172.30.1.104","TCP","54","39906 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49071","23.734603","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49072","23.735606","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49073","23.735616","172.30.1.205","172.30.1.104","TCP","54","39906 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49074","23.737539","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49075","23.737919","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49076","23.737926","172.30.1.205","172.30.1.104","TCP","54","39906 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49077","23.739277","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49078","23.743067","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49079","23.743078","172.30.1.205","172.30.1.104","TCP","54","39906 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49080","23.744038","172.30.1.205","172.30.1.104","TCP","74","47272 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926970 TSecr=0 WS=128" "49081","23.744379","172.30.1.104","172.30.1.205","TCP","66","135 > 47272 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49082","23.744392","172.30.1.205","172.30.1.104","TCP","54","47272 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49083","23.744762","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49084","23.745095","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49085","23.745105","172.30.1.205","172.30.1.104","TCP","54","47272 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49086","23.747307","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49087","23.747773","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49088","23.747779","172.30.1.205","172.30.1.104","TCP","54","47272 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49089","23.748628","172.30.1.205","172.30.1.104","TCP","54","39862 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49090","23.748681","172.30.1.205","172.30.1.104","TCP","54","39866 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49091","23.748715","172.30.1.205","172.30.1.104","TCP","54","39870 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49092","23.748741","172.30.1.205","172.30.1.104","TCP","54","39874 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49093","23.748769","172.30.1.205","172.30.1.104","TCP","54","39878 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49094","23.748822","172.30.1.205","172.30.1.104","TCP","54","39882 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49095","23.748851","172.30.1.205","172.30.1.104","TCP","54","39886 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49096","23.748875","172.30.1.205","172.30.1.104","TCP","54","39890 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49097","23.748902","172.30.1.205","172.30.1.104","TCP","54","39894 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49098","23.748924","172.30.1.205","172.30.1.104","TCP","54","39898 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49099","23.748945","172.30.1.205","172.30.1.104","TCP","54","39902 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49100","23.748966","172.30.1.205","172.30.1.104","TCP","54","39906 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49101","23.748979","172.30.1.104","172.30.1.205","TCP","54","49671 > 39862 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49102","23.749032","172.30.1.104","172.30.1.205","TCP","54","49671 > 39862 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49103","23.749039","172.30.1.205","172.30.1.104","TCP","54","39862 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49104","23.749043","172.30.1.104","172.30.1.205","TCP","54","49671 > 39866 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49105","23.749066","172.30.1.104","172.30.1.205","TCP","54","49671 > 39870 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49106","23.749087","172.30.1.104","172.30.1.205","TCP","54","49671 > 39866 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49107","23.749091","172.30.1.205","172.30.1.104","TCP","54","39866 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49108","23.749108","172.30.1.104","172.30.1.205","TCP","54","49671 > 39870 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49109","23.749114","172.30.1.205","172.30.1.104","TCP","54","39870 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49110","23.749335","172.30.1.104","172.30.1.205","TCP","54","49671 > 39874 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49111","23.749351","172.30.1.104","172.30.1.205","TCP","54","49671 > 39878 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49112","23.749372","172.30.1.104","172.30.1.205","TCP","54","49671 > 39874 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49113","23.749378","172.30.1.205","172.30.1.104","TCP","54","39874 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49114","23.749391","172.30.1.104","172.30.1.205","TCP","54","49671 > 39878 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49115","23.749393","172.30.1.205","172.30.1.104","TCP","54","39878 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49116","23.749411","172.30.1.104","172.30.1.205","TCP","54","49671 > 39882 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49117","23.749432","172.30.1.104","172.30.1.205","TCP","54","49671 > 39882 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49118","23.749435","172.30.1.205","172.30.1.104","TCP","54","39882 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49119","23.749519","172.30.1.104","172.30.1.205","TCP","54","49671 > 39886 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49120","23.749537","172.30.1.104","172.30.1.205","TCP","54","49671 > 39890 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49121","23.749557","172.30.1.104","172.30.1.205","TCP","54","49671 > 39894 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49122","23.749586","172.30.1.104","172.30.1.205","TCP","54","49671 > 39898 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49123","23.749611","172.30.1.104","172.30.1.205","TCP","54","49671 > 39902 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49124","23.749667","172.30.1.104","172.30.1.205","TCP","54","49671 > 39906 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49125","23.749687","172.30.1.104","172.30.1.205","TCP","54","49671 > 39902 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49126","23.749692","172.30.1.205","172.30.1.104","TCP","54","39902 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49127","23.749708","172.30.1.104","172.30.1.205","TCP","54","49671 > 39898 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49128","23.749711","172.30.1.205","172.30.1.104","TCP","54","39898 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49129","23.749730","172.30.1.104","172.30.1.205","TCP","54","49671 > 39886 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49130","23.749732","172.30.1.205","172.30.1.104","TCP","54","39886 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49131","23.749750","172.30.1.104","172.30.1.205","TCP","54","49671 > 39906 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49132","23.749752","172.30.1.205","172.30.1.104","TCP","54","39906 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49133","23.749770","172.30.1.104","172.30.1.205","TCP","54","49671 > 39890 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49134","23.749773","172.30.1.205","172.30.1.104","TCP","54","39890 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49135","23.749791","172.30.1.104","172.30.1.205","TCP","54","49671 > 39894 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49136","23.749794","172.30.1.205","172.30.1.104","TCP","54","39894 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49137","23.750607","172.30.1.205","172.30.1.104","TCP","54","47272 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49138","23.750719","172.30.1.205","172.30.1.104","TCP","74","39910 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926977 TSecr=0 WS=128" "49139","23.750907","172.30.1.104","172.30.1.205","TCP","54","135 > 47272 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49140","23.750928","172.30.1.104","172.30.1.205","TCP","54","135 > 47272 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49141","23.750933","172.30.1.205","172.30.1.104","TCP","54","47272 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49142","23.751004","172.30.1.104","172.30.1.205","TCP","66","49671 > 39910 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49143","23.751012","172.30.1.205","172.30.1.104","TCP","54","39910 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49144","23.751368","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49145","23.751651","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49146","23.751661","172.30.1.205","172.30.1.104","TCP","54","39910 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49147","23.753614","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49148","23.754032","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49149","23.754038","172.30.1.205","172.30.1.104","TCP","54","39910 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49150","23.755390","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49151","23.759153","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49152","23.759162","172.30.1.205","172.30.1.104","TCP","54","39910 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49153","23.760116","172.30.1.205","172.30.1.104","TCP","74","47276 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926986 TSecr=0 WS=128" "49154","23.760436","172.30.1.104","172.30.1.205","TCP","66","135 > 47276 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49155","23.760447","172.30.1.205","172.30.1.104","TCP","54","47276 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49156","23.760831","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49157","23.761112","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49158","23.761121","172.30.1.205","172.30.1.104","TCP","54","47276 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49159","23.763298","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49160","23.763727","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49161","23.763734","172.30.1.205","172.30.1.104","TCP","54","47276 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49162","23.765577","172.30.1.205","172.30.1.104","TCP","54","47276 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49163","23.765688","172.30.1.205","172.30.1.104","TCP","74","39914 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499926992 TSecr=0 WS=128" "49164","23.765827","172.30.1.104","172.30.1.205","TCP","54","135 > 47276 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49165","23.765842","172.30.1.104","172.30.1.205","TCP","54","135 > 47276 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49166","23.765847","172.30.1.205","172.30.1.104","TCP","54","47276 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49167","23.765955","172.30.1.104","172.30.1.205","TCP","66","49671 > 39914 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49168","23.765964","172.30.1.205","172.30.1.104","TCP","54","39914 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49169","23.766308","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49170","23.766597","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49171","23.766606","172.30.1.205","172.30.1.104","TCP","54","39914 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49172","23.768481","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49173","23.768897","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49174","23.768903","172.30.1.205","172.30.1.104","TCP","54","39914 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49175","23.770265","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49176","23.774066","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49177","23.774076","172.30.1.205","172.30.1.104","TCP","54","39914 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49178","23.775020","172.30.1.205","172.30.1.104","TCP","74","47280 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927001 TSecr=0 WS=128" "49179","23.775375","172.30.1.104","172.30.1.205","TCP","66","135 > 47280 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49180","23.775386","172.30.1.205","172.30.1.104","TCP","54","47280 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49181","23.775733","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49182","23.776068","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49183","23.776085","172.30.1.205","172.30.1.104","TCP","54","47280 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49184","23.778517","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49185","23.778990","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49186","23.778997","172.30.1.205","172.30.1.104","TCP","54","47280 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49187","23.780844","172.30.1.205","172.30.1.104","TCP","54","47280 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49188","23.780953","172.30.1.205","172.30.1.104","TCP","74","39918 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927007 TSecr=0 WS=128" "49189","23.781146","172.30.1.104","172.30.1.205","TCP","54","135 > 47280 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49190","23.781186","172.30.1.104","172.30.1.205","TCP","54","135 > 47280 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49191","23.781196","172.30.1.205","172.30.1.104","TCP","54","47280 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49192","23.781291","172.30.1.104","172.30.1.205","TCP","66","49671 > 39918 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49193","23.781303","172.30.1.205","172.30.1.104","TCP","54","39918 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49194","23.781716","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49195","23.783696","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49196","23.783705","172.30.1.205","172.30.1.104","TCP","54","39918 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49197","23.785617","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49198","23.786021","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49199","23.786028","172.30.1.205","172.30.1.104","TCP","54","39918 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49200","23.787386","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49201","23.791149","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49202","23.791159","172.30.1.205","172.30.1.104","TCP","54","39918 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49203","23.792113","172.30.1.205","172.30.1.104","TCP","74","47284 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927018 TSecr=0 WS=128" "49204","23.792438","172.30.1.104","172.30.1.205","TCP","66","135 > 47284 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49205","23.792461","172.30.1.205","172.30.1.104","TCP","54","47284 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49206","23.793046","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49207","23.793440","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49208","23.793454","172.30.1.205","172.30.1.104","TCP","54","47284 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49209","23.795640","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49210","23.796093","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49211","23.796100","172.30.1.205","172.30.1.104","TCP","54","47284 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49212","23.797967","172.30.1.205","172.30.1.104","TCP","54","47284 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49213","23.798080","172.30.1.205","172.30.1.104","TCP","74","39922 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927024 TSecr=0 WS=128" "49214","23.798227","172.30.1.104","172.30.1.205","TCP","54","135 > 47284 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49215","23.798251","172.30.1.104","172.30.1.205","TCP","54","135 > 47284 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49216","23.798256","172.30.1.205","172.30.1.104","TCP","54","47284 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49217","23.798360","172.30.1.104","172.30.1.205","TCP","66","49671 > 39922 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49218","23.798369","172.30.1.205","172.30.1.104","TCP","54","39922 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49219","23.798715","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49220","23.799094","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49221","23.799101","172.30.1.205","172.30.1.104","TCP","54","39922 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49222","23.801028","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49223","23.801406","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49224","23.801413","172.30.1.205","172.30.1.104","TCP","54","39922 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49225","23.802766","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49226","23.806534","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49227","23.806545","172.30.1.205","172.30.1.104","TCP","54","39922 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49228","23.807501","172.30.1.205","172.30.1.104","TCP","74","47288 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927033 TSecr=0 WS=128" "49229","23.807823","172.30.1.104","172.30.1.205","TCP","66","135 > 47288 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49230","23.807833","172.30.1.205","172.30.1.104","TCP","54","47288 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49231","23.808180","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49232","23.808463","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49233","23.808472","172.30.1.205","172.30.1.104","TCP","54","47288 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49234","23.810666","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49235","23.811101","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49236","23.811108","172.30.1.205","172.30.1.104","TCP","54","47288 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49237","23.812942","172.30.1.205","172.30.1.104","TCP","54","47288 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49238","23.813050","172.30.1.205","172.30.1.104","TCP","74","39926 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927039 TSecr=0 WS=128" "49239","23.813198","172.30.1.104","172.30.1.205","TCP","54","135 > 47288 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49240","23.813209","172.30.1.104","172.30.1.205","TCP","54","135 > 47288 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49241","23.813215","172.30.1.205","172.30.1.104","TCP","54","47288 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49242","23.813368","172.30.1.104","172.30.1.205","TCP","66","49671 > 39926 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49243","23.813376","172.30.1.205","172.30.1.104","TCP","54","39926 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49244","23.813719","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49245","23.814010","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49246","23.814018","172.30.1.205","172.30.1.104","TCP","54","39926 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49247","23.815883","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49248","23.816298","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49249","23.816304","172.30.1.205","172.30.1.104","TCP","54","39926 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49250","23.817675","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49251","23.821360","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49252","23.821370","172.30.1.205","172.30.1.104","TCP","54","39926 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49253","23.822303","172.30.1.205","172.30.1.104","TCP","74","47292 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927048 TSecr=0 WS=128" "49254","23.822627","172.30.1.104","172.30.1.205","TCP","66","135 > 47292 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49255","23.822638","172.30.1.205","172.30.1.104","TCP","54","47292 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49256","23.822986","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49257","23.823282","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49258","23.823291","172.30.1.205","172.30.1.104","TCP","54","47292 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49259","23.825501","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49260","23.825919","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49261","23.825926","172.30.1.205","172.30.1.104","TCP","54","47292 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49262","23.827747","172.30.1.205","172.30.1.104","TCP","54","47292 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49263","23.827860","172.30.1.205","172.30.1.104","TCP","74","39930 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927054 TSecr=0 WS=128" "49264","23.828045","172.30.1.104","172.30.1.205","TCP","54","135 > 47292 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49265","23.828082","172.30.1.104","172.30.1.205","TCP","54","135 > 47292 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49266","23.828088","172.30.1.205","172.30.1.104","TCP","54","47292 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49267","23.828161","172.30.1.104","172.30.1.205","TCP","66","49671 > 39930 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49268","23.828170","172.30.1.205","172.30.1.104","TCP","54","39930 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49269","23.828514","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49270","23.828835","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49271","23.828844","172.30.1.205","172.30.1.104","TCP","54","39930 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49272","23.830744","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49273","23.831117","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49274","23.831123","172.30.1.205","172.30.1.104","TCP","54","39930 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49275","23.832481","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49276","23.836169","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49277","23.836180","172.30.1.205","172.30.1.104","TCP","54","39930 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49278","23.837165","172.30.1.205","172.30.1.104","TCP","74","47296 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927063 TSecr=0 WS=128" "49279","23.837488","172.30.1.104","172.30.1.205","TCP","66","135 > 47296 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49280","23.837500","172.30.1.205","172.30.1.104","TCP","54","47296 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49281","23.837857","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49282","23.838987","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49283","23.838996","172.30.1.205","172.30.1.104","TCP","54","47296 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49284","23.841207","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49285","23.841625","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49286","23.841632","172.30.1.205","172.30.1.104","TCP","54","47296 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49287","23.843468","172.30.1.205","172.30.1.104","TCP","54","47296 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49288","23.843578","172.30.1.205","172.30.1.104","TCP","74","39934 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927070 TSecr=0 WS=128" "49289","23.843725","172.30.1.104","172.30.1.205","TCP","54","135 > 47296 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49290","23.843841","172.30.1.104","172.30.1.205","TCP","66","49671 > 39934 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49291","23.843851","172.30.1.205","172.30.1.104","TCP","54","39934 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49292","23.844193","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49293","23.844312","172.30.1.104","172.30.1.205","TCP","54","135 > 47296 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49294","23.844319","172.30.1.205","172.30.1.104","TCP","54","47296 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49295","23.844464","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49296","23.844472","172.30.1.205","172.30.1.104","TCP","54","39934 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49297","23.846364","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49298","23.846735","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49299","23.846741","172.30.1.205","172.30.1.104","TCP","54","39934 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49300","23.848095","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49301","23.852010","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49302","23.852021","172.30.1.205","172.30.1.104","TCP","54","39934 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49303","23.853009","172.30.1.205","172.30.1.104","TCP","74","47300 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927079 TSecr=0 WS=128" "49304","23.853295","172.30.1.104","172.30.1.205","TCP","66","135 > 47300 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49305","23.853306","172.30.1.205","172.30.1.104","TCP","54","47300 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49306","23.853659","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49307","23.853960","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49308","23.853969","172.30.1.205","172.30.1.104","TCP","54","47300 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49309","23.856158","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49310","23.856600","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49311","23.856607","172.30.1.205","172.30.1.104","TCP","54","47300 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49312","23.858421","172.30.1.205","172.30.1.104","TCP","54","47300 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49313","23.858533","172.30.1.205","172.30.1.104","TCP","74","39938 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927084 TSecr=0 WS=128" "49314","23.858701","172.30.1.104","172.30.1.205","TCP","54","135 > 47300 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49315","23.858711","172.30.1.104","172.30.1.205","TCP","54","135 > 47300 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49316","23.858717","172.30.1.205","172.30.1.104","TCP","54","47300 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49317","23.858828","172.30.1.104","172.30.1.205","TCP","66","49671 > 39938 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49318","23.858836","172.30.1.205","172.30.1.104","TCP","54","39938 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49319","23.859180","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49320","23.859460","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49321","23.859467","172.30.1.205","172.30.1.104","TCP","54","39938 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49322","23.861370","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49323","23.861732","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49324","23.861738","172.30.1.205","172.30.1.104","TCP","54","39938 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49325","23.863085","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49326","23.866664","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49327","23.866674","172.30.1.205","172.30.1.104","TCP","54","39938 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49328","23.867614","172.30.1.205","172.30.1.104","TCP","74","47304 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927094 TSecr=0 WS=128" "49329","23.867952","172.30.1.104","172.30.1.205","TCP","66","135 > 47304 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49330","23.867973","172.30.1.205","172.30.1.104","TCP","54","47304 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49331","23.868329","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49332","23.868650","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49333","23.868659","172.30.1.205","172.30.1.104","TCP","54","47304 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49334","23.870880","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49335","23.871262","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49336","23.871269","172.30.1.205","172.30.1.104","TCP","54","47304 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49337","23.873100","172.30.1.205","172.30.1.104","TCP","54","47304 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49338","23.873208","172.30.1.205","172.30.1.104","TCP","74","39942 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927099 TSecr=0 WS=128" "49339","23.873359","172.30.1.104","172.30.1.205","TCP","54","135 > 47304 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49340","23.873370","172.30.1.104","172.30.1.205","TCP","54","135 > 47304 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49341","23.873375","172.30.1.205","172.30.1.104","TCP","54","47304 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49342","23.873484","172.30.1.104","172.30.1.205","TCP","66","49671 > 39942 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49343","23.873492","172.30.1.205","172.30.1.104","TCP","54","39942 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49344","23.873835","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49345","23.874105","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49346","23.874114","172.30.1.205","172.30.1.104","TCP","54","39942 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49347","23.875982","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49348","23.876377","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49349","23.876383","172.30.1.205","172.30.1.104","TCP","54","39942 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49350","23.877744","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49351","23.882617","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49352","23.882629","172.30.1.205","172.30.1.104","TCP","54","39942 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49353","23.883602","172.30.1.205","172.30.1.104","TCP","74","47308 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927110 TSecr=0 WS=128" "49354","23.883978","172.30.1.104","172.30.1.205","TCP","66","135 > 47308 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49355","23.883989","172.30.1.205","172.30.1.104","TCP","54","47308 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49356","23.884345","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49357","23.884717","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49358","23.884725","172.30.1.205","172.30.1.104","TCP","54","47308 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49359","23.886915","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49360","23.887340","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49361","23.887347","172.30.1.205","172.30.1.104","TCP","54","47308 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49362","23.889215","172.30.1.205","172.30.1.104","TCP","54","47308 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49363","23.889324","172.30.1.205","172.30.1.104","TCP","74","39946 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927115 TSecr=0 WS=128" "49364","23.889502","172.30.1.104","172.30.1.205","TCP","54","135 > 47308 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49365","23.889543","172.30.1.104","172.30.1.205","TCP","54","135 > 47308 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49366","23.889549","172.30.1.205","172.30.1.104","TCP","54","47308 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49367","23.889629","172.30.1.104","172.30.1.205","TCP","66","49671 > 39946 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49368","23.889637","172.30.1.205","172.30.1.104","TCP","54","39946 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49369","23.889983","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49370","23.890278","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49371","23.890285","172.30.1.205","172.30.1.104","TCP","54","39946 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49372","23.892163","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49373","23.892533","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49374","23.892539","172.30.1.205","172.30.1.104","TCP","54","39946 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49375","23.893898","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49376","23.897631","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49377","23.897640","172.30.1.205","172.30.1.104","TCP","54","39946 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49378","23.898581","172.30.1.205","172.30.1.104","TCP","74","47312 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927125 TSecr=0 WS=128" "49379","23.898991","172.30.1.104","172.30.1.205","TCP","66","135 > 47312 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49380","23.899002","172.30.1.205","172.30.1.104","TCP","54","47312 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49381","23.899357","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49382","23.899674","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49383","23.899683","172.30.1.205","172.30.1.104","TCP","54","47312 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49384","23.901888","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49385","23.902312","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49386","23.902318","172.30.1.205","172.30.1.104","TCP","54","47312 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49387","23.904114","172.30.1.205","172.30.1.104","TCP","54","47312 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49388","23.904227","172.30.1.205","172.30.1.104","TCP","74","39950 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927130 TSecr=0 WS=128" "49389","23.904395","172.30.1.104","172.30.1.205","TCP","54","135 > 47312 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49390","23.904404","172.30.1.104","172.30.1.205","TCP","54","135 > 47312 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49391","23.904409","172.30.1.205","172.30.1.104","TCP","54","47312 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49392","23.904586","172.30.1.104","172.30.1.205","TCP","66","49671 > 39950 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49393","23.904594","172.30.1.205","172.30.1.104","TCP","54","39950 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49394","23.904969","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49395","23.905302","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49396","23.905310","172.30.1.205","172.30.1.104","TCP","54","39950 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49397","23.907172","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49398","23.907568","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49399","23.907575","172.30.1.205","172.30.1.104","TCP","54","39950 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49400","23.908980","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49401","23.913142","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49402","23.913151","172.30.1.205","172.30.1.104","TCP","54","39950 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49403","23.914099","172.30.1.205","172.30.1.104","TCP","74","47316 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927140 TSecr=0 WS=128" "49404","23.914408","172.30.1.104","172.30.1.205","TCP","66","135 > 47316 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49405","23.914419","172.30.1.205","172.30.1.104","TCP","54","47316 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49406","23.914773","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49407","23.915083","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49408","23.915092","172.30.1.205","172.30.1.104","TCP","54","47316 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49409","23.917294","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49410","23.918332","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49411","23.918338","172.30.1.205","172.30.1.104","TCP","54","47316 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49412","23.920155","172.30.1.205","172.30.1.104","TCP","54","47316 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49413","23.920270","172.30.1.205","172.30.1.104","TCP","74","39954 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927146 TSecr=0 WS=128" "49414","23.920428","172.30.1.104","172.30.1.205","TCP","54","135 > 47316 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49415","23.920459","172.30.1.104","172.30.1.205","TCP","54","135 > 47316 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49416","23.920465","172.30.1.205","172.30.1.104","TCP","54","47316 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49417","23.920563","172.30.1.104","172.30.1.205","TCP","66","49671 > 39954 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49418","23.920572","172.30.1.205","172.30.1.104","TCP","54","39954 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49419","23.920950","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49420","23.921259","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49421","23.921266","172.30.1.205","172.30.1.104","TCP","54","39954 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49422","23.923125","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49423","23.923507","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49424","23.923513","172.30.1.205","172.30.1.104","TCP","54","39954 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49425","23.924873","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49426","23.928643","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49427","23.928661","172.30.1.205","172.30.1.104","TCP","54","39954 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49428","23.929722","172.30.1.205","172.30.1.104","TCP","74","47320 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927156 TSecr=0 WS=128" "49429","23.930075","172.30.1.104","172.30.1.205","TCP","66","135 > 47320 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49430","23.930086","172.30.1.205","172.30.1.104","TCP","54","47320 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49431","23.930447","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49432","23.930747","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49433","23.930756","172.30.1.205","172.30.1.104","TCP","54","47320 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49434","23.932970","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49435","23.933438","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49436","23.933444","172.30.1.205","172.30.1.104","TCP","54","47320 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49437","23.934296","172.30.1.205","172.30.1.104","TCP","54","39914 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49438","23.934343","172.30.1.205","172.30.1.104","TCP","54","39918 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49439","23.934380","172.30.1.205","172.30.1.104","TCP","54","39922 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49440","23.934412","172.30.1.205","172.30.1.104","TCP","54","39926 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49441","23.934440","172.30.1.205","172.30.1.104","TCP","54","39930 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49442","23.934467","172.30.1.205","172.30.1.104","TCP","54","39934 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49443","23.934494","172.30.1.205","172.30.1.104","TCP","54","39938 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49444","23.934525","172.30.1.205","172.30.1.104","TCP","54","39942 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49445","23.934547","172.30.1.205","172.30.1.104","TCP","54","39946 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49446","23.934572","172.30.1.104","172.30.1.205","TCP","54","49671 > 39914 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49447","23.934595","172.30.1.205","172.30.1.104","TCP","54","39950 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49448","23.934607","172.30.1.104","172.30.1.205","TCP","54","49671 > 39918 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49449","23.934637","172.30.1.205","172.30.1.104","TCP","54","39954 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49450","23.934710","172.30.1.205","172.30.1.104","TCP","54","39910 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49451","23.934980","172.30.1.104","172.30.1.205","TCP","54","49671 > 39914 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49452","23.934988","172.30.1.205","172.30.1.104","TCP","54","39914 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49453","23.934996","172.30.1.104","172.30.1.205","TCP","54","49671 > 39922 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49454","23.935012","172.30.1.104","172.30.1.205","TCP","54","49671 > 39918 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49455","23.935016","172.30.1.205","172.30.1.104","TCP","54","39918 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49456","23.935017","172.30.1.104","172.30.1.205","TCP","54","49671 > 39922 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49457","23.935019","172.30.1.205","172.30.1.104","TCP","54","39922 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49458","23.935038","172.30.1.104","172.30.1.205","TCP","54","49671 > 39926 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49459","23.935073","172.30.1.104","172.30.1.205","TCP","54","49671 > 39926 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49460","23.935078","172.30.1.205","172.30.1.104","TCP","54","39926 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49461","23.935118","172.30.1.104","172.30.1.205","TCP","54","49671 > 39930 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49462","23.935124","172.30.1.104","172.30.1.205","TCP","54","49671 > 39930 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49463","23.935127","172.30.1.205","172.30.1.104","TCP","54","39930 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49464","23.935149","172.30.1.104","172.30.1.205","TCP","54","49671 > 39934 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49465","23.935174","172.30.1.104","172.30.1.205","TCP","54","49671 > 39938 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49466","23.935206","172.30.1.104","172.30.1.205","TCP","54","49671 > 39934 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49467","23.935209","172.30.1.205","172.30.1.104","TCP","54","39934 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49468","23.935227","172.30.1.104","172.30.1.205","TCP","54","49671 > 39942 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49469","23.935248","172.30.1.104","172.30.1.205","TCP","54","49671 > 39938 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49470","23.935252","172.30.1.205","172.30.1.104","TCP","54","39938 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49471","23.935268","172.30.1.104","172.30.1.205","TCP","54","49671 > 39946 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49472","23.935296","172.30.1.104","172.30.1.205","TCP","54","49671 > 39942 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49473","23.935300","172.30.1.205","172.30.1.104","TCP","54","39942 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49474","23.935317","172.30.1.104","172.30.1.205","TCP","54","49671 > 39910 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49475","23.935321","172.30.1.104","172.30.1.205","TCP","54","49671 > 39950 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49476","23.935336","172.30.1.104","172.30.1.205","TCP","54","49671 > 39954 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49477","23.935353","172.30.1.104","172.30.1.205","TCP","54","49671 > 39910 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49478","23.935357","172.30.1.205","172.30.1.104","TCP","54","39910 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49479","23.935359","172.30.1.104","172.30.1.205","TCP","54","49671 > 39954 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49480","23.935361","172.30.1.205","172.30.1.104","TCP","54","39954 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49481","23.935376","172.30.1.104","172.30.1.205","TCP","54","49671 > 39946 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49482","23.935379","172.30.1.205","172.30.1.104","TCP","54","39946 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49483","23.935395","172.30.1.104","172.30.1.205","TCP","54","49671 > 39950 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49484","23.935398","172.30.1.205","172.30.1.104","TCP","54","39950 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49485","23.936207","172.30.1.205","172.30.1.104","TCP","54","47320 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49486","23.936317","172.30.1.205","172.30.1.104","TCP","74","39958 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927162 TSecr=0 WS=128" "49487","23.936457","172.30.1.104","172.30.1.205","TCP","54","135 > 47320 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49488","23.936478","172.30.1.104","172.30.1.205","TCP","54","135 > 47320 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49489","23.936483","172.30.1.205","172.30.1.104","TCP","54","47320 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49490","23.936591","172.30.1.104","172.30.1.205","TCP","66","49671 > 39958 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49491","23.936599","172.30.1.205","172.30.1.104","TCP","54","39958 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49492","23.936994","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49493","23.937277","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49494","23.937285","172.30.1.205","172.30.1.104","TCP","54","39958 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49495","23.939146","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49496","23.939610","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49497","23.939616","172.30.1.205","172.30.1.104","TCP","54","39958 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49498","23.940995","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49499","23.944806","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49500","23.944816","172.30.1.205","172.30.1.104","TCP","54","39958 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49501","23.945756","172.30.1.205","172.30.1.104","TCP","74","47324 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927172 TSecr=0 WS=128" "49502","23.946043","172.30.1.104","172.30.1.205","TCP","66","135 > 47324 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49503","23.946054","172.30.1.205","172.30.1.104","TCP","54","47324 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49504","23.946405","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49505","23.946732","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49506","23.946742","172.30.1.205","172.30.1.104","TCP","54","47324 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49507","23.948930","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49508","23.949339","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49509","23.949346","172.30.1.205","172.30.1.104","TCP","54","47324 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49510","23.951149","172.30.1.205","172.30.1.104","TCP","54","47324 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49511","23.951258","172.30.1.205","172.30.1.104","TCP","74","39962 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927177 TSecr=0 WS=128" "49512","23.951393","172.30.1.104","172.30.1.205","TCP","54","135 > 47324 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49513","23.951407","172.30.1.104","172.30.1.205","TCP","54","135 > 47324 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49514","23.951412","172.30.1.205","172.30.1.104","TCP","54","47324 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49515","23.951533","172.30.1.104","172.30.1.205","TCP","66","49671 > 39962 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49516","23.951542","172.30.1.205","172.30.1.104","TCP","54","39962 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49517","23.951881","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49518","23.952160","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49519","23.952167","172.30.1.205","172.30.1.104","TCP","54","39962 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49520","23.954059","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49521","23.954419","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49522","23.954425","172.30.1.205","172.30.1.104","TCP","54","39962 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49523","23.955765","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49524","23.959594","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49525","23.959609","172.30.1.205","172.30.1.104","TCP","54","39962 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49526","23.960654","172.30.1.205","172.30.1.104","TCP","74","47328 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927187 TSecr=0 WS=128" "49527","23.961032","172.30.1.104","172.30.1.205","TCP","66","135 > 47328 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49528","23.961044","172.30.1.205","172.30.1.104","TCP","54","47328 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49529","23.961404","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49530","23.961700","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49531","23.961710","172.30.1.205","172.30.1.104","TCP","54","47328 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49532","23.963932","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49533","23.964372","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49534","23.964379","172.30.1.205","172.30.1.104","TCP","54","47328 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49535","23.966239","172.30.1.205","172.30.1.104","TCP","54","47328 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49536","23.966353","172.30.1.205","172.30.1.104","TCP","74","39966 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927192 TSecr=0 WS=128" "49537","23.966509","172.30.1.104","172.30.1.205","TCP","54","135 > 47328 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49538","23.966553","172.30.1.104","172.30.1.205","TCP","54","135 > 47328 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49539","23.966559","172.30.1.205","172.30.1.104","TCP","54","47328 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49540","23.966682","172.30.1.104","172.30.1.205","TCP","66","49671 > 39966 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49541","23.966691","172.30.1.205","172.30.1.104","TCP","54","39966 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49542","23.967039","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49543","23.967357","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49544","23.967366","172.30.1.205","172.30.1.104","TCP","54","39966 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49545","23.969277","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49546","23.969680","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49547","23.969685","172.30.1.205","172.30.1.104","TCP","54","39966 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49548","23.971039","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49549","23.974843","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49550","23.974853","172.30.1.205","172.30.1.104","TCP","54","39966 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49551","23.975800","172.30.1.205","172.30.1.104","TCP","74","47332 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927202 TSecr=0 WS=128" "49552","23.976117","172.30.1.104","172.30.1.205","TCP","66","135 > 47332 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49553","23.976128","172.30.1.205","172.30.1.104","TCP","54","47332 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49554","23.976479","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49555","23.976791","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49556","23.976801","172.30.1.205","172.30.1.104","TCP","54","47332 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49557","23.979004","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49558","23.979405","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49559","23.979411","172.30.1.205","172.30.1.104","TCP","54","47332 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49560","23.981251","172.30.1.205","172.30.1.104","TCP","54","47332 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49561","23.981362","172.30.1.205","172.30.1.104","TCP","74","39970 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927207 TSecr=0 WS=128" "49562","23.981515","172.30.1.104","172.30.1.205","TCP","54","135 > 47332 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49563","23.981554","172.30.1.104","172.30.1.205","TCP","54","135 > 47332 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49564","23.981560","172.30.1.205","172.30.1.104","TCP","54","47332 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49565","23.981642","172.30.1.104","172.30.1.205","TCP","66","49671 > 39970 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49566","23.981651","172.30.1.205","172.30.1.104","TCP","54","39970 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49567","23.982005","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49568","23.982301","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49569","23.982312","172.30.1.205","172.30.1.104","TCP","54","39970 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49570","23.984228","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49571","23.984627","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49572","23.984640","172.30.1.205","172.30.1.104","TCP","54","39970 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49573","23.986108","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49574","23.989890","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49575","23.989900","172.30.1.205","172.30.1.104","TCP","54","39970 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49576","23.990857","172.30.1.205","172.30.1.104","TCP","74","47336 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927217 TSecr=0 WS=128" "49577","23.991219","172.30.1.104","172.30.1.205","TCP","66","135 > 47336 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49578","23.991230","172.30.1.205","172.30.1.104","TCP","54","47336 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49579","23.991581","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49580","23.991869","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49581","23.991878","172.30.1.205","172.30.1.104","TCP","54","47336 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49582","23.994087","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49583","23.994469","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49584","23.994475","172.30.1.205","172.30.1.104","TCP","54","47336 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49585","23.996291","172.30.1.205","172.30.1.104","TCP","54","47336 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49586","23.996401","172.30.1.205","172.30.1.104","TCP","74","39974 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927222 TSecr=0 WS=128" "49587","23.996629","172.30.1.104","172.30.1.205","TCP","54","135 > 47336 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49588","23.996672","172.30.1.104","172.30.1.205","TCP","54","135 > 47336 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49589","23.996677","172.30.1.205","172.30.1.104","TCP","54","47336 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49590","23.996696","172.30.1.104","172.30.1.205","TCP","66","49671 > 39974 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49591","23.996704","172.30.1.205","172.30.1.104","TCP","54","39974 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49592","23.997074","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49593","23.997444","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49594","23.997453","172.30.1.205","172.30.1.104","TCP","54","39974 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49595","23.999335","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49596","23.999716","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49597","23.999723","172.30.1.205","172.30.1.104","TCP","54","39974 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49598","24.001146","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49599","24.004832","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49600","24.004851","172.30.1.205","172.30.1.104","TCP","54","39974 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49601","24.005859","172.30.1.205","172.30.1.104","TCP","74","47340 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927232 TSecr=0 WS=128" "49602","24.006218","172.30.1.104","172.30.1.205","TCP","66","135 > 47340 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49603","24.006229","172.30.1.205","172.30.1.104","TCP","54","47340 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49604","24.006583","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49605","24.006869","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49606","24.006878","172.30.1.205","172.30.1.104","TCP","54","47340 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49607","24.009127","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49608","24.009531","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49609","24.009537","172.30.1.205","172.30.1.104","TCP","54","47340 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49610","24.011363","172.30.1.205","172.30.1.104","TCP","54","47340 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49611","24.011484","172.30.1.205","172.30.1.104","TCP","74","39978 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927237 TSecr=0 WS=128" "49612","24.011625","172.30.1.104","172.30.1.205","TCP","54","135 > 47340 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49613","24.011638","172.30.1.104","172.30.1.205","TCP","54","135 > 47340 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49614","24.011644","172.30.1.205","172.30.1.104","TCP","54","47340 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49615","24.011760","172.30.1.104","172.30.1.205","TCP","66","49671 > 39978 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49616","24.011769","172.30.1.205","172.30.1.104","TCP","54","39978 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49617","24.012121","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49618","24.012412","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49619","24.012422","172.30.1.205","172.30.1.104","TCP","54","39978 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49620","24.014405","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49621","24.016079","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49622","24.016088","172.30.1.205","172.30.1.104","TCP","54","39978 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49623","24.017560","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49624","24.022274","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49625","24.022285","172.30.1.205","172.30.1.104","TCP","54","39978 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49626","24.023341","172.30.1.205","172.30.1.104","TCP","74","47344 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927249 TSecr=0 WS=128" "49627","24.023646","172.30.1.104","172.30.1.205","TCP","66","135 > 47344 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49628","24.023659","172.30.1.205","172.30.1.104","TCP","54","47344 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49629","24.024015","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49630","24.024317","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49631","24.024326","172.30.1.205","172.30.1.104","TCP","54","47344 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49632","24.026562","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49633","24.026970","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49634","24.026976","172.30.1.205","172.30.1.104","TCP","54","47344 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49635","24.028829","172.30.1.205","172.30.1.104","TCP","54","47344 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49636","24.028939","172.30.1.205","172.30.1.104","TCP","74","39982 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927255 TSecr=0 WS=128" "49637","24.029086","172.30.1.104","172.30.1.205","TCP","54","135 > 47344 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49638","24.029102","172.30.1.104","172.30.1.205","TCP","54","135 > 47344 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49639","24.029108","172.30.1.205","172.30.1.104","TCP","54","47344 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49640","24.029222","172.30.1.104","172.30.1.205","TCP","66","49671 > 39982 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49641","24.029230","172.30.1.205","172.30.1.104","TCP","54","39982 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49642","24.029572","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49643","24.029870","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49644","24.029876","172.30.1.205","172.30.1.104","TCP","54","39982 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49645","24.031744","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49646","24.032108","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49647","24.032114","172.30.1.205","172.30.1.104","TCP","54","39982 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49648","24.033491","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49649","24.037265","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49650","24.037275","172.30.1.205","172.30.1.104","TCP","54","39982 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49651","24.038222","172.30.1.205","172.30.1.104","TCP","74","47348 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927264 TSecr=0 WS=128" "49652","24.038517","172.30.1.104","172.30.1.205","TCP","66","135 > 47348 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49653","24.038527","172.30.1.205","172.30.1.104","TCP","54","47348 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49654","24.038873","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49655","24.039160","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49656","24.039169","172.30.1.205","172.30.1.104","TCP","54","47348 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49657","24.041400","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49658","24.041811","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49659","24.041817","172.30.1.205","172.30.1.104","TCP","54","47348 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49660","24.043619","172.30.1.205","172.30.1.104","TCP","54","47348 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49661","24.043728","172.30.1.205","172.30.1.104","TCP","74","39986 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927270 TSecr=0 WS=128" "49662","24.043903","172.30.1.104","172.30.1.205","TCP","54","135 > 47348 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49663","24.043931","172.30.1.104","172.30.1.205","TCP","54","135 > 47348 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49664","24.043939","172.30.1.205","172.30.1.104","TCP","54","47348 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49665","24.043973","172.30.1.104","172.30.1.205","TCP","66","49671 > 39986 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49666","24.043983","172.30.1.205","172.30.1.104","TCP","54","39986 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49667","24.044375","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49668","24.044674","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49669","24.044684","172.30.1.205","172.30.1.104","TCP","54","39986 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49670","24.046607","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49671","24.047060","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49672","24.047072","172.30.1.205","172.30.1.104","TCP","54","39986 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49673","24.048488","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49674","24.052227","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49675","24.052238","172.30.1.205","172.30.1.104","TCP","54","39986 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49676","24.053238","172.30.1.205","172.30.1.104","TCP","74","47352 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927279 TSecr=0 WS=128" "49677","24.053602","172.30.1.104","172.30.1.205","TCP","66","135 > 47352 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49678","24.053614","172.30.1.205","172.30.1.104","TCP","54","47352 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49679","24.053974","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49680","24.054296","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49681","24.054305","172.30.1.205","172.30.1.104","TCP","54","47352 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49682","24.056504","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49683","24.056899","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49684","24.056905","172.30.1.205","172.30.1.104","TCP","54","47352 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49685","24.058711","172.30.1.205","172.30.1.104","TCP","54","47352 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49686","24.058821","172.30.1.205","172.30.1.104","TCP","74","39990 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927285 TSecr=0 WS=128" "49687","24.058980","172.30.1.104","172.30.1.205","TCP","54","135 > 47352 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49688","24.059104","172.30.1.104","172.30.1.205","TCP","66","49671 > 39990 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49689","24.059118","172.30.1.205","172.30.1.104","TCP","54","39990 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49690","24.059131","172.30.1.104","172.30.1.205","TCP","54","135 > 47352 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49691","24.059141","172.30.1.205","172.30.1.104","TCP","54","47352 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49692","24.059545","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49693","24.059867","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49694","24.059876","172.30.1.205","172.30.1.104","TCP","54","39990 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49695","24.061809","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49696","24.062179","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49697","24.062186","172.30.1.205","172.30.1.104","TCP","54","39990 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49698","24.063545","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49699","24.067274","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49700","24.067284","172.30.1.205","172.30.1.104","TCP","54","39990 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49701","24.068236","172.30.1.205","172.30.1.104","TCP","74","47356 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927294 TSecr=0 WS=128" "49702","24.068539","172.30.1.104","172.30.1.205","TCP","66","135 > 47356 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49703","24.068551","172.30.1.205","172.30.1.104","TCP","54","47356 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49704","24.068941","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49705","24.069213","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49706","24.069222","172.30.1.205","172.30.1.104","TCP","54","47356 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49707","24.071420","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49708","24.071819","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49709","24.071826","172.30.1.205","172.30.1.104","TCP","54","47356 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49710","24.073664","172.30.1.205","172.30.1.104","TCP","54","47356 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49711","24.073776","172.30.1.205","172.30.1.104","TCP","74","39994 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927300 TSecr=0 WS=128" "49712","24.073926","172.30.1.104","172.30.1.205","TCP","54","135 > 47356 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49713","24.073938","172.30.1.104","172.30.1.205","TCP","54","135 > 47356 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49714","24.073943","172.30.1.205","172.30.1.104","TCP","54","47356 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49715","24.074043","172.30.1.104","172.30.1.205","TCP","66","49671 > 39994 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49716","24.074052","172.30.1.205","172.30.1.104","TCP","54","39994 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49717","24.074399","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49718","24.074740","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49719","24.074747","172.30.1.205","172.30.1.104","TCP","54","39994 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49720","24.076603","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49721","24.076973","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49722","24.076981","172.30.1.205","172.30.1.104","TCP","54","39994 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49723","24.078342","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49724","24.082069","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49725","24.082079","172.30.1.205","172.30.1.104","TCP","54","39994 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49726","24.083037","172.30.1.205","172.30.1.104","TCP","74","47360 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927309 TSecr=0 WS=128" "49727","24.083354","172.30.1.104","172.30.1.205","TCP","66","135 > 47360 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49728","24.083365","172.30.1.205","172.30.1.104","TCP","54","47360 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49729","24.083715","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49730","24.084010","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49731","24.084018","172.30.1.205","172.30.1.104","TCP","54","47360 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49732","24.086253","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49733","24.086773","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49734","24.086779","172.30.1.205","172.30.1.104","TCP","54","47360 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49735","24.088589","172.30.1.205","172.30.1.104","TCP","54","47360 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49736","24.088706","172.30.1.205","172.30.1.104","TCP","74","39998 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927315 TSecr=0 WS=128" "49737","24.088881","172.30.1.104","172.30.1.205","TCP","54","135 > 47360 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49738","24.088916","172.30.1.104","172.30.1.205","TCP","54","135 > 47360 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49739","24.088922","172.30.1.205","172.30.1.104","TCP","54","47360 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49740","24.089116","172.30.1.104","172.30.1.205","TCP","66","49671 > 39998 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49741","24.089124","172.30.1.205","172.30.1.104","TCP","54","39998 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49742","24.089480","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49743","24.089781","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49744","24.089797","172.30.1.205","172.30.1.104","TCP","54","39998 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49745","24.091878","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49746","24.092241","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49747","24.092248","172.30.1.205","172.30.1.104","TCP","54","39998 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49748","24.093647","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49749","24.097240","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49750","24.097250","172.30.1.205","172.30.1.104","TCP","54","39998 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49751","24.098216","172.30.1.205","172.30.1.104","TCP","74","47364 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927324 TSecr=0 WS=128" "49752","24.098578","172.30.1.104","172.30.1.205","TCP","66","135 > 47364 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49753","24.098589","172.30.1.205","172.30.1.104","TCP","54","47364 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49754","24.098962","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49755","24.099331","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49756","24.099340","172.30.1.205","172.30.1.104","TCP","54","47364 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49757","24.101549","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49758","24.101999","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49759","24.102006","172.30.1.205","172.30.1.104","TCP","54","47364 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49760","24.103812","172.30.1.205","172.30.1.104","TCP","54","47364 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49761","24.103923","172.30.1.205","172.30.1.104","TCP","74","40002 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927330 TSecr=0 WS=128" "49762","24.104077","172.30.1.104","172.30.1.205","TCP","54","135 > 47364 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49763","24.104101","172.30.1.104","172.30.1.205","TCP","54","135 > 47364 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49764","24.104106","172.30.1.205","172.30.1.104","TCP","54","47364 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49765","24.104191","172.30.1.104","172.30.1.205","TCP","66","49671 > 40002 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49766","24.104200","172.30.1.205","172.30.1.104","TCP","54","40002 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49767","24.104545","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49768","24.104842","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49769","24.104851","172.30.1.205","172.30.1.104","TCP","54","40002 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49770","24.106737","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49771","24.107121","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49772","24.107127","172.30.1.205","172.30.1.104","TCP","54","40002 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49773","24.108473","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49774","24.112172","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49775","24.112182","172.30.1.205","172.30.1.104","TCP","54","40002 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49776","24.113154","172.30.1.205","172.30.1.104","TCP","74","47368 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927339 TSecr=0 WS=128" "49777","24.113463","172.30.1.104","172.30.1.205","TCP","66","135 > 47368 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49778","24.113474","172.30.1.205","172.30.1.104","TCP","54","47368 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49779","24.113823","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49780","24.114102","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49781","24.114111","172.30.1.205","172.30.1.104","TCP","54","47368 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49782","24.116310","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49783","24.116728","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49784","24.116740","172.30.1.205","172.30.1.104","TCP","54","47368 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49785","24.117856","172.30.1.205","172.30.1.104","TCP","54","39962 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49786","24.117932","172.30.1.205","172.30.1.104","TCP","54","39966 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49787","24.117982","172.30.1.205","172.30.1.104","TCP","54","39970 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49788","24.118016","172.30.1.205","172.30.1.104","TCP","54","39974 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49789","24.118045","172.30.1.205","172.30.1.104","TCP","54","39978 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49790","24.118073","172.30.1.205","172.30.1.104","TCP","54","39982 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49791","24.118107","172.30.1.205","172.30.1.104","TCP","54","39986 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49792","24.118129","172.30.1.205","172.30.1.104","TCP","54","39990 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49793","24.118155","172.30.1.104","172.30.1.205","TCP","54","49671 > 39962 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49794","24.118167","172.30.1.205","172.30.1.104","TCP","54","39994 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49795","24.118179","172.30.1.104","172.30.1.205","TCP","54","49671 > 39962 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49796","24.118184","172.30.1.205","172.30.1.104","TCP","54","39962 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49797","24.118214","172.30.1.205","172.30.1.104","TCP","54","39998 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49798","24.118243","172.30.1.205","172.30.1.104","TCP","54","40002 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49799","24.118315","172.30.1.205","172.30.1.104","TCP","54","39958 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "49800","24.118325","172.30.1.104","172.30.1.205","TCP","54","49671 > 39966 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49801","24.118349","172.30.1.104","172.30.1.205","TCP","54","49671 > 39966 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49802","24.118354","172.30.1.205","172.30.1.104","TCP","54","39966 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49803","24.118376","172.30.1.104","172.30.1.205","TCP","54","49671 > 39970 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49804","24.118403","172.30.1.104","172.30.1.205","TCP","54","49671 > 39974 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49805","24.118609","172.30.1.104","172.30.1.205","TCP","54","49671 > 39978 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49806","24.118616","172.30.1.104","172.30.1.205","TCP","54","49671 > 39982 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49807","24.118635","172.30.1.104","172.30.1.205","TCP","54","49671 > 39970 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49808","24.118641","172.30.1.205","172.30.1.104","TCP","54","39970 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49809","24.118661","172.30.1.104","172.30.1.205","TCP","54","49671 > 39982 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49810","24.118664","172.30.1.205","172.30.1.104","TCP","54","39982 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49811","24.118692","172.30.1.104","172.30.1.205","TCP","54","49671 > 39974 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49812","24.118695","172.30.1.205","172.30.1.104","TCP","54","39974 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49813","24.118719","172.30.1.104","172.30.1.205","TCP","54","49671 > 39978 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49814","24.118723","172.30.1.205","172.30.1.104","TCP","54","39978 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49815","24.118748","172.30.1.104","172.30.1.205","TCP","54","49671 > 39990 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49816","24.118773","172.30.1.104","172.30.1.205","TCP","54","49671 > 39986 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49817","24.118801","172.30.1.104","172.30.1.205","TCP","54","49671 > 39990 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49818","24.118806","172.30.1.205","172.30.1.104","TCP","54","39990 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49819","24.118827","172.30.1.104","172.30.1.205","TCP","54","49671 > 39994 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49820","24.118854","172.30.1.104","172.30.1.205","TCP","54","49671 > 39986 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49821","24.118861","172.30.1.205","172.30.1.104","TCP","54","39986 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49822","24.119015","172.30.1.104","172.30.1.205","TCP","54","49671 > 39994 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49823","24.119020","172.30.1.205","172.30.1.104","TCP","54","39994 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49824","24.119038","172.30.1.104","172.30.1.205","TCP","54","49671 > 39998 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49825","24.119065","172.30.1.104","172.30.1.205","TCP","54","49671 > 39998 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49826","24.119069","172.30.1.205","172.30.1.104","TCP","54","39998 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49827","24.119141","172.30.1.104","172.30.1.205","TCP","54","49671 > 40002 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49828","24.119168","172.30.1.104","172.30.1.205","TCP","54","49671 > 39958 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49829","24.119195","172.30.1.104","172.30.1.205","TCP","54","49671 > 40002 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49830","24.119199","172.30.1.205","172.30.1.104","TCP","54","40002 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49831","24.119229","172.30.1.104","172.30.1.205","TCP","54","49671 > 39958 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "49832","24.119233","172.30.1.205","172.30.1.104","TCP","54","39958 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "49833","24.119869","172.30.1.205","172.30.1.104","TCP","54","47368 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49834","24.119981","172.30.1.205","172.30.1.104","TCP","74","40006 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927346 TSecr=0 WS=128" "49835","24.120122","172.30.1.104","172.30.1.205","TCP","54","135 > 47368 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49836","24.120147","172.30.1.104","172.30.1.205","TCP","54","135 > 47368 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49837","24.120152","172.30.1.205","172.30.1.104","TCP","54","47368 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49838","24.120300","172.30.1.104","172.30.1.205","TCP","66","49671 > 40006 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49839","24.120308","172.30.1.205","172.30.1.104","TCP","54","40006 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49840","24.120668","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49841","24.120998","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49842","24.121008","172.30.1.205","172.30.1.104","TCP","54","40006 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49843","24.122916","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49844","24.123319","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49845","24.123325","172.30.1.205","172.30.1.104","TCP","54","40006 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49846","24.124687","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49847","24.129430","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49848","24.129440","172.30.1.205","172.30.1.104","TCP","54","40006 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49849","24.130389","172.30.1.205","172.30.1.104","TCP","74","47372 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927356 TSecr=0 WS=128" "49850","24.130713","172.30.1.104","172.30.1.205","TCP","66","135 > 47372 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49851","24.130724","172.30.1.205","172.30.1.104","TCP","54","47372 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49852","24.131086","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49853","24.131398","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49854","24.131408","172.30.1.205","172.30.1.104","TCP","54","47372 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49855","24.133623","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49856","24.134072","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49857","24.134079","172.30.1.205","172.30.1.104","TCP","54","47372 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49858","24.135936","172.30.1.205","172.30.1.104","TCP","54","47372 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49859","24.136074","172.30.1.205","172.30.1.104","TCP","74","40010 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927362 TSecr=0 WS=128" "49860","24.136253","172.30.1.104","172.30.1.205","TCP","54","135 > 47372 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49861","24.136263","172.30.1.104","172.30.1.205","TCP","54","135 > 47372 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49862","24.136268","172.30.1.205","172.30.1.104","TCP","54","47372 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49863","24.136338","172.30.1.104","172.30.1.205","TCP","66","49671 > 40010 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49864","24.136346","172.30.1.205","172.30.1.104","TCP","54","40010 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49865","24.136694","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49866","24.136993","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49867","24.137002","172.30.1.205","172.30.1.104","TCP","54","40010 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49868","24.138895","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49869","24.139279","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49870","24.139285","172.30.1.205","172.30.1.104","TCP","54","40010 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49871","24.140646","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49872","24.144552","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49873","24.144562","172.30.1.205","172.30.1.104","TCP","54","40010 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49874","24.145520","172.30.1.205","172.30.1.104","TCP","74","47376 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927371 TSecr=0 WS=128" "49875","24.145845","172.30.1.104","172.30.1.205","TCP","66","135 > 47376 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49876","24.145858","172.30.1.205","172.30.1.104","TCP","54","47376 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49877","24.146224","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49878","24.146581","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49879","24.146590","172.30.1.205","172.30.1.104","TCP","54","47376 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49880","24.148804","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49881","24.149268","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49882","24.149275","172.30.1.205","172.30.1.104","TCP","54","47376 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49883","24.151087","172.30.1.205","172.30.1.104","TCP","54","47376 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49884","24.151202","172.30.1.205","172.30.1.104","TCP","74","40014 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927377 TSecr=0 WS=128" "49885","24.151384","172.30.1.104","172.30.1.205","TCP","54","135 > 47376 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49886","24.151394","172.30.1.104","172.30.1.205","TCP","54","135 > 47376 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49887","24.151400","172.30.1.205","172.30.1.104","TCP","54","47376 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49888","24.151490","172.30.1.104","172.30.1.205","TCP","66","49671 > 40014 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49889","24.151499","172.30.1.205","172.30.1.104","TCP","54","40014 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49890","24.151860","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49891","24.152133","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49892","24.152141","172.30.1.205","172.30.1.104","TCP","54","40014 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49893","24.154047","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49894","24.154456","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49895","24.154462","172.30.1.205","172.30.1.104","TCP","54","40014 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49896","24.155811","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49897","24.159372","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49898","24.159381","172.30.1.205","172.30.1.104","TCP","54","40014 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49899","24.160343","172.30.1.205","172.30.1.104","TCP","74","47380 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927386 TSecr=0 WS=128" "49900","24.160738","172.30.1.104","172.30.1.205","TCP","66","135 > 47380 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49901","24.160749","172.30.1.205","172.30.1.104","TCP","54","47380 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49902","24.161108","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49903","24.163973","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49904","24.163991","172.30.1.205","172.30.1.104","TCP","54","47380 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49905","24.166273","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49906","24.166790","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49907","24.166797","172.30.1.205","172.30.1.104","TCP","54","47380 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49908","24.168643","172.30.1.205","172.30.1.104","TCP","54","47380 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49909","24.168752","172.30.1.205","172.30.1.104","TCP","74","40018 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927395 TSecr=0 WS=128" "49910","24.168964","172.30.1.104","172.30.1.205","TCP","54","135 > 47380 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49911","24.169074","172.30.1.104","172.30.1.205","TCP","66","49671 > 40018 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49912","24.169083","172.30.1.205","172.30.1.104","TCP","54","40018 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49913","24.169430","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49914","24.169743","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49915","24.169752","172.30.1.205","172.30.1.104","TCP","54","40018 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49916","24.170034","172.30.1.104","172.30.1.205","TCP","54","135 > 47380 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49917","24.170041","172.30.1.205","172.30.1.104","TCP","54","47380 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49918","24.171653","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49919","24.172107","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49920","24.172113","172.30.1.205","172.30.1.104","TCP","54","40018 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49921","24.173496","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49922","24.177313","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49923","24.177323","172.30.1.205","172.30.1.104","TCP","54","40018 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49924","24.178273","172.30.1.205","172.30.1.104","TCP","74","47384 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927404 TSecr=0 WS=128" "49925","24.178605","172.30.1.104","172.30.1.205","TCP","66","135 > 47384 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49926","24.178617","172.30.1.205","172.30.1.104","TCP","54","47384 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49927","24.178967","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49928","24.179250","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49929","24.179259","172.30.1.205","172.30.1.104","TCP","54","47384 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49930","24.181459","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49931","24.181877","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49932","24.181883","172.30.1.205","172.30.1.104","TCP","54","47384 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49933","24.183692","172.30.1.205","172.30.1.104","TCP","54","47384 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49934","24.183802","172.30.1.205","172.30.1.104","TCP","74","40022 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927410 TSecr=0 WS=128" "49935","24.183956","172.30.1.104","172.30.1.205","TCP","54","135 > 47384 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49936","24.184051","172.30.1.104","172.30.1.205","TCP","54","135 > 47384 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49937","24.184057","172.30.1.205","172.30.1.104","TCP","54","47384 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49938","24.184131","172.30.1.104","172.30.1.205","TCP","66","49671 > 40022 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49939","24.184147","172.30.1.205","172.30.1.104","TCP","54","40022 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49940","24.184538","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49941","24.184852","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49942","24.184862","172.30.1.205","172.30.1.104","TCP","54","40022 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49943","24.186763","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49944","24.187140","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49945","24.187147","172.30.1.205","172.30.1.104","TCP","54","40022 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49946","24.188495","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49947","24.192283","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49948","24.192292","172.30.1.205","172.30.1.104","TCP","54","40022 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49949","24.193273","172.30.1.205","172.30.1.104","TCP","74","47388 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927419 TSecr=0 WS=128" "49950","24.193575","172.30.1.104","172.30.1.205","TCP","66","135 > 47388 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49951","24.193585","172.30.1.205","172.30.1.104","TCP","54","47388 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49952","24.193940","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49953","24.194199","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49954","24.194208","172.30.1.205","172.30.1.104","TCP","54","47388 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49955","24.196385","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49956","24.196805","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49957","24.196811","172.30.1.205","172.30.1.104","TCP","54","47388 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49958","24.198726","172.30.1.205","172.30.1.104","TCP","54","47388 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49959","24.198836","172.30.1.205","172.30.1.104","TCP","74","40026 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927425 TSecr=0 WS=128" "49960","24.198969","172.30.1.104","172.30.1.205","TCP","54","135 > 47388 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49961","24.199059","172.30.1.104","172.30.1.205","TCP","54","135 > 47388 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49962","24.199065","172.30.1.205","172.30.1.104","TCP","54","47388 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49963","24.199128","172.30.1.104","172.30.1.205","TCP","66","49671 > 40026 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49964","24.199136","172.30.1.205","172.30.1.104","TCP","54","40026 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49965","24.199486","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49966","24.199766","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49967","24.199774","172.30.1.205","172.30.1.104","TCP","54","40026 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49968","24.201690","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49969","24.202049","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49970","24.202069","172.30.1.205","172.30.1.104","TCP","54","40026 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49971","24.203583","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49972","24.207322","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49973","24.207332","172.30.1.205","172.30.1.104","TCP","54","40026 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49974","24.208269","172.30.1.205","172.30.1.104","TCP","74","47392 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927434 TSecr=0 WS=128" "49975","24.208597","172.30.1.104","172.30.1.205","TCP","66","135 > 47392 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49976","24.208616","172.30.1.205","172.30.1.104","TCP","54","47392 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49977","24.208996","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "49978","24.209267","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49979","24.209276","172.30.1.205","172.30.1.104","TCP","54","47392 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49980","24.211469","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "49981","24.211916","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "49982","24.211923","172.30.1.205","172.30.1.104","TCP","54","47392 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "49983","24.213752","172.30.1.205","172.30.1.104","TCP","54","47392 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "49984","24.213862","172.30.1.205","172.30.1.104","TCP","74","40030 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927440 TSecr=0 WS=128" "49985","24.214063","172.30.1.104","172.30.1.205","TCP","54","135 > 47392 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49986","24.214084","172.30.1.104","172.30.1.205","TCP","54","135 > 47392 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "49987","24.214089","172.30.1.205","172.30.1.104","TCP","54","47392 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "49988","24.214169","172.30.1.104","172.30.1.205","TCP","66","49671 > 40030 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "49989","24.214178","172.30.1.205","172.30.1.104","TCP","54","40030 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "49990","24.214522","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "49991","24.214828","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "49992","24.214836","172.30.1.205","172.30.1.104","TCP","54","40030 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "49993","24.216746","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "49994","24.217130","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "49995","24.217136","172.30.1.205","172.30.1.104","TCP","54","40030 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "49996","24.218496","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "49997","24.222216","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "49998","24.222225","172.30.1.205","172.30.1.104","TCP","54","40030 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "49999","24.223215","172.30.1.205","172.30.1.104","TCP","74","47396 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927449 TSecr=0 WS=128" "50000","24.223509","172.30.1.104","172.30.1.205","TCP","66","135 > 47396 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50001","24.223521","172.30.1.205","172.30.1.104","TCP","54","47396 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50002","24.223870","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50003","24.224221","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50004","24.224230","172.30.1.205","172.30.1.104","TCP","54","47396 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50005","24.226494","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50006","24.226932","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50007","24.226945","172.30.1.205","172.30.1.104","TCP","54","47396 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50008","24.229023","172.30.1.205","172.30.1.104","TCP","54","47396 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50009","24.229131","172.30.1.205","172.30.1.104","TCP","74","40034 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927455 TSecr=0 WS=128" "50010","24.229280","172.30.1.104","172.30.1.205","TCP","54","135 > 47396 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50011","24.229291","172.30.1.104","172.30.1.205","TCP","54","135 > 47396 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50012","24.229296","172.30.1.205","172.30.1.104","TCP","54","47396 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50013","24.229388","172.30.1.104","172.30.1.205","TCP","66","49671 > 40034 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50014","24.229396","172.30.1.205","172.30.1.104","TCP","54","40034 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50015","24.229738","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50016","24.230983","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50017","24.230992","172.30.1.205","172.30.1.104","TCP","54","40034 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50018","24.232890","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50019","24.233258","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50020","24.233264","172.30.1.205","172.30.1.104","TCP","54","40034 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50021","24.234611","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50022","24.238384","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50023","24.238403","172.30.1.205","172.30.1.104","TCP","54","40034 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50024","24.239450","172.30.1.205","172.30.1.104","TCP","74","47400 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927465 TSecr=0 WS=128" "50025","24.239817","172.30.1.104","172.30.1.205","TCP","66","135 > 47400 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50026","24.239829","172.30.1.205","172.30.1.104","TCP","54","47400 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50027","24.240179","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50028","24.240476","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50029","24.240485","172.30.1.205","172.30.1.104","TCP","54","47400 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50030","24.242677","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50031","24.243081","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50032","24.243093","172.30.1.205","172.30.1.104","TCP","54","47400 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50033","24.245086","172.30.1.205","172.30.1.104","TCP","54","47400 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50034","24.245193","172.30.1.205","172.30.1.104","TCP","74","40038 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927471 TSecr=0 WS=128" "50035","24.245353","172.30.1.104","172.30.1.205","TCP","54","135 > 47400 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50036","24.245384","172.30.1.104","172.30.1.205","TCP","54","135 > 47400 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50037","24.245389","172.30.1.205","172.30.1.104","TCP","54","47400 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50038","24.245473","172.30.1.104","172.30.1.205","TCP","66","49671 > 40038 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50039","24.245487","172.30.1.205","172.30.1.104","TCP","54","40038 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50040","24.245872","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50041","24.246178","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50042","24.246186","172.30.1.205","172.30.1.104","TCP","54","40038 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50043","24.248089","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50044","24.248502","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50045","24.248508","172.30.1.205","172.30.1.104","TCP","54","40038 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50046","24.249885","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50047","24.253601","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50048","24.253611","172.30.1.205","172.30.1.104","TCP","54","40038 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50049","24.254561","172.30.1.205","172.30.1.104","TCP","74","47404 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927480 TSecr=0 WS=128" "50050","24.254860","172.30.1.104","172.30.1.205","TCP","66","135 > 47404 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50051","24.254870","172.30.1.205","172.30.1.104","TCP","54","47404 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50052","24.255224","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50053","24.255505","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50054","24.255513","172.30.1.205","172.30.1.104","TCP","54","47404 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50055","24.257727","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50056","24.258114","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50057","24.258124","172.30.1.205","172.30.1.104","TCP","54","47404 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50058","24.260016","172.30.1.205","172.30.1.104","TCP","54","47404 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50059","24.260140","172.30.1.205","172.30.1.104","TCP","74","40042 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927486 TSecr=0 WS=128" "50060","24.260281","172.30.1.104","172.30.1.205","TCP","54","135 > 47404 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50061","24.260292","172.30.1.104","172.30.1.205","TCP","54","135 > 47404 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50062","24.260297","172.30.1.205","172.30.1.104","TCP","54","47404 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50063","24.260406","172.30.1.104","172.30.1.205","TCP","66","49671 > 40042 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50064","24.260415","172.30.1.205","172.30.1.104","TCP","54","40042 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50065","24.260771","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50066","24.261069","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50067","24.261078","172.30.1.205","172.30.1.104","TCP","54","40042 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50068","24.262975","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50069","24.264183","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50070","24.264199","172.30.1.205","172.30.1.104","TCP","54","40042 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50071","24.265753","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50072","24.269454","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50073","24.269465","172.30.1.205","172.30.1.104","TCP","54","40042 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50074","24.270450","172.30.1.205","172.30.1.104","TCP","74","47408 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927496 TSecr=0 WS=128" "50075","24.270771","172.30.1.104","172.30.1.205","TCP","66","135 > 47408 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50076","24.270783","172.30.1.205","172.30.1.104","TCP","54","47408 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50077","24.271150","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50078","24.271421","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50079","24.271434","172.30.1.205","172.30.1.104","TCP","54","47408 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50080","24.273731","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50081","24.274114","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50082","24.274120","172.30.1.205","172.30.1.104","TCP","54","47408 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50083","24.275932","172.30.1.205","172.30.1.104","TCP","54","47408 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50084","24.276050","172.30.1.205","172.30.1.104","TCP","74","40046 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927502 TSecr=0 WS=128" "50085","24.276264","172.30.1.104","172.30.1.205","TCP","54","135 > 47408 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50086","24.276275","172.30.1.104","172.30.1.205","TCP","54","135 > 47408 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50087","24.276281","172.30.1.205","172.30.1.104","TCP","54","47408 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50088","24.276415","172.30.1.104","172.30.1.205","TCP","66","49671 > 40046 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50089","24.276424","172.30.1.205","172.30.1.104","TCP","54","40046 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50090","24.276812","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50091","24.277128","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50092","24.277138","172.30.1.205","172.30.1.104","TCP","54","40046 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50093","24.279034","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50094","24.279397","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50095","24.279403","172.30.1.205","172.30.1.104","TCP","54","40046 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50096","24.280756","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50097","24.284508","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50098","24.284519","172.30.1.205","172.30.1.104","TCP","54","40046 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50099","24.285501","172.30.1.205","172.30.1.104","TCP","74","47412 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927511 TSecr=0 WS=128" "50100","24.285805","172.30.1.104","172.30.1.205","TCP","66","135 > 47412 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50101","24.285816","172.30.1.205","172.30.1.104","TCP","54","47412 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50102","24.286171","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50103","24.286466","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50104","24.286477","172.30.1.205","172.30.1.104","TCP","54","47412 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50105","24.288672","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50106","24.289040","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50107","24.289047","172.30.1.205","172.30.1.104","TCP","54","47412 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50108","24.290844","172.30.1.205","172.30.1.104","TCP","54","47412 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50109","24.290954","172.30.1.205","172.30.1.104","TCP","74","40050 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927517 TSecr=0 WS=128" "50110","24.291103","172.30.1.104","172.30.1.205","TCP","54","135 > 47412 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50111","24.291148","172.30.1.104","172.30.1.205","TCP","54","135 > 47412 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50112","24.291154","172.30.1.205","172.30.1.104","TCP","54","47412 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50113","24.291236","172.30.1.104","172.30.1.205","TCP","66","49671 > 40050 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50114","24.291244","172.30.1.205","172.30.1.104","TCP","54","40050 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50115","24.291587","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50116","24.291875","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50117","24.291884","172.30.1.205","172.30.1.104","TCP","54","40050 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50118","24.293803","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50119","24.294195","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50120","24.294202","172.30.1.205","172.30.1.104","TCP","54","40050 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50121","24.295542","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50122","24.299281","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50123","24.299290","172.30.1.205","172.30.1.104","TCP","54","40050 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50124","24.300228","172.30.1.205","172.30.1.104","TCP","74","47416 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927526 TSecr=0 WS=128" "50125","24.300588","172.30.1.104","172.30.1.205","TCP","66","135 > 47416 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50126","24.300599","172.30.1.205","172.30.1.104","TCP","54","47416 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50127","24.300986","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50128","24.301287","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50129","24.301296","172.30.1.205","172.30.1.104","TCP","54","47416 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50130","24.303465","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50131","24.303899","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50132","24.303905","172.30.1.205","172.30.1.104","TCP","54","47416 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50133","24.304751","172.30.1.205","172.30.1.104","TCP","54","40010 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50134","24.304820","172.30.1.205","172.30.1.104","TCP","54","40014 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50135","24.304859","172.30.1.205","172.30.1.104","TCP","54","40018 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50136","24.304892","172.30.1.205","172.30.1.104","TCP","54","40022 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50137","24.304920","172.30.1.205","172.30.1.104","TCP","54","40026 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50138","24.304951","172.30.1.205","172.30.1.104","TCP","54","40030 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50139","24.304978","172.30.1.205","172.30.1.104","TCP","54","40034 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50140","24.305000","172.30.1.205","172.30.1.104","TCP","54","40038 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50141","24.305022","172.30.1.205","172.30.1.104","TCP","54","40042 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50142","24.305029","172.30.1.104","172.30.1.205","TCP","54","49671 > 40010 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50143","24.305040","172.30.1.104","172.30.1.205","TCP","54","49671 > 40010 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50144","24.305049","172.30.1.205","172.30.1.104","TCP","54","40010 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50145","24.305082","172.30.1.205","172.30.1.104","TCP","54","40046 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50146","24.305113","172.30.1.205","172.30.1.104","TCP","54","40050 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50147","24.305183","172.30.1.205","172.30.1.104","TCP","54","40006 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50148","24.305267","172.30.1.104","172.30.1.205","TCP","54","49671 > 40014 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50149","24.305283","172.30.1.104","172.30.1.205","TCP","54","49671 > 40014 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50150","24.305288","172.30.1.205","172.30.1.104","TCP","54","40014 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50151","24.305302","172.30.1.104","172.30.1.205","TCP","54","49671 > 40022 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50152","24.305329","172.30.1.104","172.30.1.205","TCP","54","49671 > 40018 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50153","24.305351","172.30.1.104","172.30.1.205","TCP","54","49671 > 40022 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50154","24.305355","172.30.1.205","172.30.1.104","TCP","54","40022 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50155","24.305370","172.30.1.104","172.30.1.205","TCP","54","49671 > 40026 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50156","24.305726","172.30.1.104","172.30.1.205","TCP","54","49671 > 40030 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50157","24.305734","172.30.1.104","172.30.1.205","TCP","54","49671 > 40030 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50158","24.305739","172.30.1.205","172.30.1.104","TCP","54","40030 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50159","24.305746","172.30.1.104","172.30.1.205","TCP","54","49671 > 40018 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50160","24.305748","172.30.1.205","172.30.1.104","TCP","54","40018 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50161","24.305749","172.30.1.104","172.30.1.205","TCP","54","49671 > 40026 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50162","24.305751","172.30.1.205","172.30.1.104","TCP","54","40026 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50163","24.305753","172.30.1.104","172.30.1.205","TCP","54","49671 > 40034 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50164","24.305760","172.30.1.104","172.30.1.205","TCP","54","49671 > 40038 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50165","24.305763","172.30.1.104","172.30.1.205","TCP","54","49671 > 40034 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50166","24.305765","172.30.1.205","172.30.1.104","TCP","54","40034 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50167","24.305767","172.30.1.104","172.30.1.205","TCP","54","49671 > 40042 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50168","24.305769","172.30.1.104","172.30.1.205","TCP","54","49671 > 40046 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50169","24.305772","172.30.1.104","172.30.1.205","TCP","54","49671 > 40038 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50170","24.305773","172.30.1.205","172.30.1.104","TCP","54","40038 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50171","24.305843","172.30.1.104","172.30.1.205","TCP","54","49671 > 40050 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50172","24.305859","172.30.1.104","172.30.1.205","TCP","54","49671 > 40050 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50173","24.305863","172.30.1.205","172.30.1.104","TCP","54","40050 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50174","24.305881","172.30.1.104","172.30.1.205","TCP","54","49671 > 40042 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50175","24.305884","172.30.1.205","172.30.1.104","TCP","54","40042 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50176","24.305904","172.30.1.104","172.30.1.205","TCP","54","49671 > 40046 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50177","24.305907","172.30.1.205","172.30.1.104","TCP","54","40046 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50178","24.305925","172.30.1.104","172.30.1.205","TCP","54","49671 > 40006 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50179","24.306081","172.30.1.104","172.30.1.205","TCP","54","49671 > 40006 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50180","24.306085","172.30.1.205","172.30.1.104","TCP","54","40006 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50181","24.306668","172.30.1.205","172.30.1.104","TCP","54","47416 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50182","24.306776","172.30.1.205","172.30.1.104","TCP","74","40054 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927533 TSecr=0 WS=128" "50183","24.306928","172.30.1.104","172.30.1.205","TCP","54","135 > 47416 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50184","24.306949","172.30.1.104","172.30.1.205","TCP","54","135 > 47416 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50185","24.306954","172.30.1.205","172.30.1.104","TCP","54","47416 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50186","24.307077","172.30.1.104","172.30.1.205","TCP","66","49671 > 40054 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50187","24.307085","172.30.1.205","172.30.1.104","TCP","54","40054 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50188","24.307441","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50189","24.307724","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50190","24.307731","172.30.1.205","172.30.1.104","TCP","54","40054 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50191","24.309625","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50192","24.309975","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50193","24.309981","172.30.1.205","172.30.1.104","TCP","54","40054 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50194","24.311322","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50195","24.315034","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50196","24.315044","172.30.1.205","172.30.1.104","TCP","54","40054 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50197","24.315992","172.30.1.205","172.30.1.104","TCP","74","47420 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927542 TSecr=0 WS=128" "50198","24.316275","172.30.1.104","172.30.1.205","TCP","66","135 > 47420 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50199","24.316286","172.30.1.205","172.30.1.104","TCP","54","47420 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50200","24.316636","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50201","24.316960","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50202","24.316969","172.30.1.205","172.30.1.104","TCP","54","47420 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50203","24.319143","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50204","24.319545","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50205","24.319551","172.30.1.205","172.30.1.104","TCP","54","47420 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50206","24.321375","172.30.1.205","172.30.1.104","TCP","54","47420 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50207","24.321485","172.30.1.205","172.30.1.104","TCP","74","40058 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927547 TSecr=0 WS=128" "50208","24.321687","172.30.1.104","172.30.1.205","TCP","54","135 > 47420 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50209","24.321710","172.30.1.104","172.30.1.205","TCP","54","135 > 47420 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50210","24.321715","172.30.1.205","172.30.1.104","TCP","54","47420 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50211","24.321806","172.30.1.104","172.30.1.205","TCP","66","49671 > 40058 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50212","24.321814","172.30.1.205","172.30.1.104","TCP","54","40058 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50213","24.322161","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50214","24.322473","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50215","24.322482","172.30.1.205","172.30.1.104","TCP","54","40058 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50216","24.324346","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50217","24.324906","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50218","24.324913","172.30.1.205","172.30.1.104","TCP","54","40058 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50219","24.326267","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50220","24.329991","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50221","24.330000","172.30.1.205","172.30.1.104","TCP","54","40058 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50222","24.330957","172.30.1.205","172.30.1.104","TCP","74","47424 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927557 TSecr=0 WS=128" "50223","24.331290","172.30.1.104","172.30.1.205","TCP","66","135 > 47424 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50224","24.331301","172.30.1.205","172.30.1.104","TCP","54","47424 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50225","24.331647","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50226","24.331966","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50227","24.331974","172.30.1.205","172.30.1.104","TCP","54","47424 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50228","24.334189","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50229","24.334649","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50230","24.334655","172.30.1.205","172.30.1.104","TCP","54","47424 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50231","24.336455","172.30.1.205","172.30.1.104","TCP","54","47424 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50232","24.336567","172.30.1.205","172.30.1.104","TCP","74","40062 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927562 TSecr=0 WS=128" "50233","24.336722","172.30.1.104","172.30.1.205","TCP","54","135 > 47424 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50234","24.336743","172.30.1.104","172.30.1.205","TCP","54","135 > 47424 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50235","24.336749","172.30.1.205","172.30.1.104","TCP","54","47424 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50236","24.336866","172.30.1.104","172.30.1.205","TCP","66","49671 > 40062 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50237","24.336875","172.30.1.205","172.30.1.104","TCP","54","40062 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50238","24.337225","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50239","24.338111","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50240","24.338121","172.30.1.205","172.30.1.104","TCP","54","40062 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50241","24.339992","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50242","24.340446","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50243","24.340452","172.30.1.205","172.30.1.104","TCP","54","40062 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50244","24.341819","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50245","24.345738","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50246","24.345748","172.30.1.205","172.30.1.104","TCP","54","40062 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50247","24.346700","172.30.1.205","172.30.1.104","TCP","74","47428 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927573 TSecr=0 WS=128" "50248","24.347040","172.30.1.104","172.30.1.205","TCP","66","135 > 47428 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50249","24.347051","172.30.1.205","172.30.1.104","TCP","54","47428 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50250","24.347404","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50251","24.347702","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50252","24.347712","172.30.1.205","172.30.1.104","TCP","54","47428 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50253","24.349922","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50254","24.350338","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50255","24.350345","172.30.1.205","172.30.1.104","TCP","54","47428 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50256","24.352176","172.30.1.205","172.30.1.104","TCP","54","47428 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50257","24.352293","172.30.1.205","172.30.1.104","TCP","74","40066 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927578 TSecr=0 WS=128" "50258","24.352477","172.30.1.104","172.30.1.205","TCP","54","135 > 47428 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50259","24.352488","172.30.1.104","172.30.1.205","TCP","54","135 > 47428 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50260","24.352493","172.30.1.205","172.30.1.104","TCP","54","47428 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50261","24.352566","172.30.1.104","172.30.1.205","TCP","66","49671 > 40066 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50262","24.352575","172.30.1.205","172.30.1.104","TCP","54","40066 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50263","24.352948","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50264","24.353245","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50265","24.353254","172.30.1.205","172.30.1.104","TCP","54","40066 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50266","24.355105","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50267","24.355513","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50268","24.355519","172.30.1.205","172.30.1.104","TCP","54","40066 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50269","24.356899","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50270","24.361400","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50271","24.361410","172.30.1.205","172.30.1.104","TCP","54","40066 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50272","24.362360","172.30.1.205","172.30.1.104","TCP","74","47432 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927588 TSecr=0 WS=128" "50273","24.362713","172.30.1.104","172.30.1.205","TCP","66","135 > 47432 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50274","24.362724","172.30.1.205","172.30.1.104","TCP","54","47432 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50275","24.363078","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50276","24.363376","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50277","24.363384","172.30.1.205","172.30.1.104","TCP","54","47432 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50278","24.365573","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50279","24.366027","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50280","24.366039","172.30.1.205","172.30.1.104","TCP","54","47432 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50281","24.368037","172.30.1.205","172.30.1.104","TCP","54","47432 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50282","24.368146","172.30.1.205","172.30.1.104","TCP","74","40070 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927594 TSecr=0 WS=128" "50283","24.368326","172.30.1.104","172.30.1.205","TCP","54","135 > 47432 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50284","24.368392","172.30.1.104","172.30.1.205","TCP","54","135 > 47432 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50285","24.368397","172.30.1.205","172.30.1.104","TCP","54","47432 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50286","24.368470","172.30.1.104","172.30.1.205","TCP","66","49671 > 40070 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50287","24.368479","172.30.1.205","172.30.1.104","TCP","54","40070 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50288","24.368844","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50289","24.369134","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50290","24.369145","172.30.1.205","172.30.1.104","TCP","54","40070 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50291","24.371291","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50292","24.371692","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50293","24.371699","172.30.1.205","172.30.1.104","TCP","54","40070 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50294","24.373121","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50295","24.376901","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50296","24.376910","172.30.1.205","172.30.1.104","TCP","54","40070 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50297","24.377852","172.30.1.205","172.30.1.104","TCP","74","47436 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927604 TSecr=0 WS=128" "50298","24.378170","172.30.1.104","172.30.1.205","TCP","66","135 > 47436 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50299","24.378182","172.30.1.205","172.30.1.104","TCP","54","47436 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50300","24.378537","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50301","24.378829","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50302","24.378838","172.30.1.205","172.30.1.104","TCP","54","47436 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50303","24.381026","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50304","24.381416","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50305","24.381422","172.30.1.205","172.30.1.104","TCP","54","47436 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50306","24.383237","172.30.1.205","172.30.1.104","TCP","54","47436 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50307","24.383346","172.30.1.205","172.30.1.104","TCP","74","40074 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927609 TSecr=0 WS=128" "50308","24.383511","172.30.1.104","172.30.1.205","TCP","54","135 > 47436 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50309","24.383526","172.30.1.104","172.30.1.205","TCP","54","135 > 47436 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50310","24.383532","172.30.1.205","172.30.1.104","TCP","54","47436 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50311","24.383604","172.30.1.104","172.30.1.205","TCP","66","49671 > 40074 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50312","24.383612","172.30.1.205","172.30.1.104","TCP","54","40074 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50313","24.383953","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50314","24.384270","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50315","24.384279","172.30.1.205","172.30.1.104","TCP","54","40074 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50316","24.386189","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50317","24.386554","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50318","24.386560","172.30.1.205","172.30.1.104","TCP","54","40074 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50319","24.387903","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50320","24.391642","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50321","24.391651","172.30.1.205","172.30.1.104","TCP","54","40074 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50322","24.392594","172.30.1.205","172.30.1.104","TCP","74","47440 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927619 TSecr=0 WS=128" "50323","24.392928","172.30.1.104","172.30.1.205","TCP","66","135 > 47440 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50324","24.392939","172.30.1.205","172.30.1.104","TCP","54","47440 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50325","24.393292","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50326","24.393576","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50327","24.393585","172.30.1.205","172.30.1.104","TCP","54","47440 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50328","24.395776","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50329","24.396160","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50330","24.396166","172.30.1.205","172.30.1.104","TCP","54","47440 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50331","24.397986","172.30.1.205","172.30.1.104","TCP","54","47440 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50332","24.398098","172.30.1.205","172.30.1.104","TCP","74","40078 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927624 TSecr=0 WS=128" "50333","24.398261","172.30.1.104","172.30.1.205","TCP","54","135 > 47440 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50334","24.398298","172.30.1.104","172.30.1.205","TCP","54","135 > 47440 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50335","24.398303","172.30.1.205","172.30.1.104","TCP","54","47440 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50336","24.398385","172.30.1.104","172.30.1.205","TCP","66","49671 > 40078 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50337","24.398393","172.30.1.205","172.30.1.104","TCP","54","40078 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50338","24.398733","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50339","24.400351","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50340","24.400358","172.30.1.205","172.30.1.104","TCP","54","40078 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50341","24.402268","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50342","24.402681","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50343","24.402687","172.30.1.205","172.30.1.104","TCP","54","40078 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50344","24.404035","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50345","24.407828","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50346","24.407837","172.30.1.205","172.30.1.104","TCP","54","40078 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50347","24.408791","172.30.1.205","172.30.1.104","TCP","74","47444 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927635 TSecr=0 WS=128" "50348","24.409149","172.30.1.104","172.30.1.205","TCP","66","135 > 47444 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50349","24.409159","172.30.1.205","172.30.1.104","TCP","54","47444 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50350","24.409511","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50351","24.409814","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50352","24.409822","172.30.1.205","172.30.1.104","TCP","54","47444 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50353","24.411997","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50354","24.412395","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50355","24.412401","172.30.1.205","172.30.1.104","TCP","54","47444 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50356","24.414209","172.30.1.205","172.30.1.104","TCP","54","47444 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50357","24.414316","172.30.1.205","172.30.1.104","TCP","74","40082 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927640 TSecr=0 WS=128" "50358","24.414463","172.30.1.104","172.30.1.205","TCP","54","135 > 47444 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50359","24.414498","172.30.1.104","172.30.1.205","TCP","54","135 > 47444 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50360","24.414504","172.30.1.205","172.30.1.104","TCP","54","47444 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50361","24.414604","172.30.1.104","172.30.1.205","TCP","66","49671 > 40082 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50362","24.414613","172.30.1.205","172.30.1.104","TCP","54","40082 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50363","24.414952","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50364","24.415239","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50365","24.415247","172.30.1.205","172.30.1.104","TCP","54","40082 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50366","24.417149","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50367","24.417539","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50368","24.417545","172.30.1.205","172.30.1.104","TCP","54","40082 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50369","24.418890","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50370","24.422553","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50371","24.422562","172.30.1.205","172.30.1.104","TCP","54","40082 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50372","24.423497","172.30.1.205","172.30.1.104","TCP","74","47448 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927649 TSecr=0 WS=128" "50373","24.423805","172.30.1.104","172.30.1.205","TCP","66","135 > 47448 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50374","24.423815","172.30.1.205","172.30.1.104","TCP","54","47448 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50375","24.424157","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50376","24.424485","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50377","24.424493","172.30.1.205","172.30.1.104","TCP","54","47448 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50378","24.426680","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50379","24.427103","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50380","24.427109","172.30.1.205","172.30.1.104","TCP","54","47448 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50381","24.428926","172.30.1.205","172.30.1.104","TCP","54","47448 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50382","24.429036","172.30.1.205","172.30.1.104","TCP","74","40086 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927655 TSecr=0 WS=128" "50383","24.429216","172.30.1.104","172.30.1.205","TCP","54","135 > 47448 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50384","24.429262","172.30.1.104","172.30.1.205","TCP","54","135 > 47448 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50385","24.429267","172.30.1.205","172.30.1.104","TCP","54","47448 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50386","24.429337","172.30.1.104","172.30.1.205","TCP","66","49671 > 40086 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50387","24.429345","172.30.1.205","172.30.1.104","TCP","54","40086 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50388","24.429687","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50389","24.429961","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50390","24.429970","172.30.1.205","172.30.1.104","TCP","54","40086 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50391","24.431832","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50392","24.432229","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50393","24.432235","172.30.1.205","172.30.1.104","TCP","54","40086 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50394","24.433598","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50395","24.437430","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50396","24.437440","172.30.1.205","172.30.1.104","TCP","54","40086 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50397","24.438381","172.30.1.205","172.30.1.104","TCP","74","47452 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927664 TSecr=0 WS=128" "50398","24.438734","172.30.1.104","172.30.1.205","TCP","66","135 > 47452 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50399","24.438744","172.30.1.205","172.30.1.104","TCP","54","47452 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50400","24.439089","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50401","24.440150","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50402","24.440159","172.30.1.205","172.30.1.104","TCP","54","47452 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50403","24.442359","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50404","24.442726","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50405","24.442732","172.30.1.205","172.30.1.104","TCP","54","47452 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50406","24.444530","172.30.1.205","172.30.1.104","TCP","54","47452 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50407","24.444643","172.30.1.205","172.30.1.104","TCP","74","40090 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927671 TSecr=0 WS=128" "50408","24.444959","172.30.1.104","172.30.1.205","TCP","54","135 > 47452 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50409","24.444967","172.30.1.104","172.30.1.205","TCP","54","135 > 47452 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50410","24.444973","172.30.1.205","172.30.1.104","TCP","54","47452 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50411","24.445046","172.30.1.104","172.30.1.205","TCP","66","49671 > 40090 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50412","24.445055","172.30.1.205","172.30.1.104","TCP","54","40090 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50413","24.445404","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50414","24.445730","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50415","24.445739","172.30.1.205","172.30.1.104","TCP","54","40090 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50416","24.447585","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50417","24.447966","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50418","24.447978","172.30.1.205","172.30.1.104","TCP","54","40090 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50419","24.449571","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50420","24.453368","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50421","24.453378","172.30.1.205","172.30.1.104","TCP","54","40090 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50422","24.454322","172.30.1.205","172.30.1.104","TCP","74","47456 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927680 TSecr=0 WS=128" "50423","24.454707","172.30.1.104","172.30.1.205","TCP","66","135 > 47456 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50424","24.454717","172.30.1.205","172.30.1.104","TCP","54","47456 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50425","24.455070","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50426","24.455424","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50427","24.455433","172.30.1.205","172.30.1.104","TCP","54","47456 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50428","24.457638","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50429","24.458057","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50430","24.458069","172.30.1.205","172.30.1.104","TCP","54","47456 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50431","24.460004","172.30.1.205","172.30.1.104","TCP","54","47456 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50432","24.460112","172.30.1.205","172.30.1.104","TCP","74","40094 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927686 TSecr=0 WS=128" "50433","24.460278","172.30.1.104","172.30.1.205","TCP","54","135 > 47456 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50434","24.460306","172.30.1.104","172.30.1.205","TCP","54","135 > 47456 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50435","24.460312","172.30.1.205","172.30.1.104","TCP","54","47456 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50436","24.460401","172.30.1.104","172.30.1.205","TCP","66","49671 > 40094 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50437","24.460408","172.30.1.205","172.30.1.104","TCP","54","40094 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50438","24.460757","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50439","24.461072","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50440","24.461080","172.30.1.205","172.30.1.104","TCP","54","40094 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50441","24.462938","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50442","24.463333","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50443","24.463340","172.30.1.205","172.30.1.104","TCP","54","40094 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50444","24.464676","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50445","24.468414","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50446","24.468423","172.30.1.205","172.30.1.104","TCP","54","40094 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50447","24.469379","172.30.1.205","172.30.1.104","TCP","74","47460 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927695 TSecr=0 WS=128" "50448","24.469718","172.30.1.104","172.30.1.205","TCP","66","135 > 47460 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50449","24.469728","172.30.1.205","172.30.1.104","TCP","54","47460 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50450","24.470082","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50451","24.470447","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50452","24.470456","172.30.1.205","172.30.1.104","TCP","54","47460 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50453","24.472684","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50454","24.473097","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50455","24.473104","172.30.1.205","172.30.1.104","TCP","54","47460 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50456","24.474908","172.30.1.205","172.30.1.104","TCP","54","47460 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50457","24.475017","172.30.1.205","172.30.1.104","TCP","74","40098 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927701 TSecr=0 WS=128" "50458","24.475244","172.30.1.104","172.30.1.205","TCP","54","135 > 47460 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50459","24.475264","172.30.1.104","172.30.1.205","TCP","54","135 > 47460 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50460","24.475270","172.30.1.205","172.30.1.104","TCP","54","47460 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50461","24.475349","172.30.1.104","172.30.1.205","TCP","66","49671 > 40098 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50462","24.475357","172.30.1.205","172.30.1.104","TCP","54","40098 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50463","24.475697","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50464","24.476008","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50465","24.476015","172.30.1.205","172.30.1.104","TCP","54","40098 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50466","24.477899","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50467","24.478405","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50468","24.478412","172.30.1.205","172.30.1.104","TCP","54","40098 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50469","24.479743","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50470","24.483570","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50471","24.483580","172.30.1.205","172.30.1.104","TCP","54","40098 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50472","24.484536","172.30.1.205","172.30.1.104","TCP","74","47464 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927710 TSecr=0 WS=128" "50473","24.484848","172.30.1.104","172.30.1.205","TCP","66","135 > 47464 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50474","24.484859","172.30.1.205","172.30.1.104","TCP","54","47464 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50475","24.485215","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50476","24.487098","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50477","24.487108","172.30.1.205","172.30.1.104","TCP","54","47464 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50478","24.489299","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50479","24.489737","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50480","24.489743","172.30.1.205","172.30.1.104","TCP","54","47464 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50481","24.490603","172.30.1.205","172.30.1.104","TCP","54","40058 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50482","24.490651","172.30.1.205","172.30.1.104","TCP","54","40062 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50483","24.490696","172.30.1.205","172.30.1.104","TCP","54","40066 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50484","24.490745","172.30.1.205","172.30.1.104","TCP","54","40070 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50485","24.490778","172.30.1.205","172.30.1.104","TCP","54","40074 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50486","24.490809","172.30.1.205","172.30.1.104","TCP","54","40078 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50487","24.490831","172.30.1.205","172.30.1.104","TCP","54","40082 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50488","24.490852","172.30.1.104","172.30.1.205","TCP","54","49671 > 40058 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50489","24.490878","172.30.1.205","172.30.1.104","TCP","54","40086 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50490","24.490907","172.30.1.205","172.30.1.104","TCP","54","40090 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50491","24.490934","172.30.1.205","172.30.1.104","TCP","54","40094 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50492","24.490959","172.30.1.205","172.30.1.104","TCP","54","40098 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50493","24.490997","172.30.1.104","172.30.1.205","TCP","54","49671 > 40058 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50494","24.491016","172.30.1.205","172.30.1.104","TCP","54","40058 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50495","24.491066","172.30.1.205","172.30.1.104","TCP","54","40054 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50496","24.492321","172.30.1.205","172.30.1.104","TCP","54","47464 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50497","24.492431","172.30.1.205","172.30.1.104","TCP","74","40102 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927718 TSecr=0 WS=128" "50498","24.497830","172.30.1.104","172.30.1.205","TCP","66","49671 > 40102 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50499","24.497842","172.30.1.205","172.30.1.104","TCP","54","40102 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50500","24.497854","172.30.1.104","172.30.1.205","TCP","54","49671 > 40062 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50501","24.497894","172.30.1.104","172.30.1.205","TCP","54","49671 > 40066 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50502","24.497926","172.30.1.104","172.30.1.205","TCP","54","49671 > 40070 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50503","24.497949","172.30.1.104","172.30.1.205","TCP","54","49671 > 40074 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50504","24.497970","172.30.1.104","172.30.1.205","TCP","54","49671 > 40078 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50505","24.497991","172.30.1.104","172.30.1.205","TCP","54","49671 > 40082 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50506","24.498022","172.30.1.104","172.30.1.205","TCP","54","49671 > 40086 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50507","24.498041","172.30.1.104","172.30.1.205","TCP","54","49671 > 40090 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50508","24.498069","172.30.1.104","172.30.1.205","TCP","54","49671 > 40094 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50509","24.498089","172.30.1.104","172.30.1.205","TCP","54","49671 > 40098 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50510","24.498120","172.30.1.104","172.30.1.205","TCP","54","49671 > 40054 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50511","24.498141","172.30.1.104","172.30.1.205","TCP","54","135 > 47464 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50512","24.498171","172.30.1.104","172.30.1.205","TCP","54","49671 > 40054 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50513","24.498177","172.30.1.205","172.30.1.104","TCP","54","40054 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50514","24.498200","172.30.1.104","172.30.1.205","TCP","54","49671 > 40098 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50515","24.498203","172.30.1.205","172.30.1.104","TCP","54","40098 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50516","24.498225","172.30.1.104","172.30.1.205","TCP","54","49671 > 40094 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50517","24.498228","172.30.1.205","172.30.1.104","TCP","54","40094 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50518","24.498254","172.30.1.104","172.30.1.205","TCP","54","49671 > 40090 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50519","24.498256","172.30.1.205","172.30.1.104","TCP","54","40090 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50520","24.498354","172.30.1.104","172.30.1.205","TCP","54","49671 > 40086 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50521","24.498366","172.30.1.205","172.30.1.104","TCP","54","40086 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50522","24.498385","172.30.1.104","172.30.1.205","TCP","54","49671 > 40082 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50523","24.498388","172.30.1.205","172.30.1.104","TCP","54","40082 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50524","24.498406","172.30.1.104","172.30.1.205","TCP","54","49671 > 40078 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50525","24.498409","172.30.1.205","172.30.1.104","TCP","54","40078 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50526","24.498427","172.30.1.104","172.30.1.205","TCP","54","49671 > 40074 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50527","24.498429","172.30.1.205","172.30.1.104","TCP","54","40074 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50528","24.498447","172.30.1.104","172.30.1.205","TCP","54","49671 > 40062 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50529","24.498449","172.30.1.205","172.30.1.104","TCP","54","40062 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50530","24.498467","172.30.1.104","172.30.1.205","TCP","54","49671 > 40066 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50531","24.498469","172.30.1.205","172.30.1.104","TCP","54","40066 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50532","24.498488","172.30.1.104","172.30.1.205","TCP","54","49671 > 40070 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50533","24.498491","172.30.1.205","172.30.1.104","TCP","54","40070 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50534","24.498498","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50535","24.498509","172.30.1.104","172.30.1.205","TCP","54","135 > 47464 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50536","24.498514","172.30.1.205","172.30.1.104","TCP","54","47464 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50537","24.498992","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50538","24.498999","172.30.1.205","172.30.1.104","TCP","54","40102 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50539","24.500901","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50540","24.501375","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50541","24.501381","172.30.1.205","172.30.1.104","TCP","54","40102 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50542","24.502733","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50543","24.506526","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50544","24.506537","172.30.1.205","172.30.1.104","TCP","54","40102 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50545","24.507492","172.30.1.205","172.30.1.104","TCP","74","47468 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927733 TSecr=0 WS=128" "50546","24.507843","172.30.1.104","172.30.1.205","TCP","66","135 > 47468 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50547","24.507853","172.30.1.205","172.30.1.104","TCP","54","47468 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50548","24.508202","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50549","24.508522","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50550","24.508533","172.30.1.205","172.30.1.104","TCP","54","47468 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50551","24.510721","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50552","24.511155","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50553","24.511162","172.30.1.205","172.30.1.104","TCP","54","47468 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50554","24.513004","172.30.1.205","172.30.1.104","TCP","54","47468 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50555","24.513114","172.30.1.205","172.30.1.104","TCP","74","40106 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927739 TSecr=0 WS=128" "50556","24.513266","172.30.1.104","172.30.1.205","TCP","54","135 > 47468 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50557","24.513300","172.30.1.104","172.30.1.205","TCP","54","135 > 47468 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50558","24.513305","172.30.1.205","172.30.1.104","TCP","54","47468 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50559","24.513398","172.30.1.104","172.30.1.205","TCP","66","49671 > 40106 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50560","24.513406","172.30.1.205","172.30.1.104","TCP","54","40106 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50561","24.513747","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50562","24.514015","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50563","24.514024","172.30.1.205","172.30.1.104","TCP","54","40106 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50564","24.515923","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50565","24.516292","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50566","24.516298","172.30.1.205","172.30.1.104","TCP","54","40106 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50567","24.517697","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50568","24.521313","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50569","24.521324","172.30.1.205","172.30.1.104","TCP","54","40106 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50570","24.522282","172.30.1.205","172.30.1.104","TCP","74","47472 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927748 TSecr=0 WS=128" "50571","24.522658","172.30.1.104","172.30.1.205","TCP","66","135 > 47472 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50572","24.522679","172.30.1.205","172.30.1.104","TCP","54","47472 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50573","24.523161","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50574","24.523461","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50575","24.523470","172.30.1.205","172.30.1.104","TCP","54","47472 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50576","24.525684","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50577","24.526153","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50578","24.526160","172.30.1.205","172.30.1.104","TCP","54","47472 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50579","24.527965","172.30.1.205","172.30.1.104","TCP","54","47472 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50580","24.528073","172.30.1.205","172.30.1.104","TCP","74","40110 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927754 TSecr=0 WS=128" "50581","24.528280","172.30.1.104","172.30.1.205","TCP","54","135 > 47472 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50582","24.528302","172.30.1.104","172.30.1.205","TCP","54","135 > 47472 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50583","24.528309","172.30.1.205","172.30.1.104","TCP","54","47472 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50584","24.528379","172.30.1.104","172.30.1.205","TCP","66","49671 > 40110 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50585","24.528388","172.30.1.205","172.30.1.104","TCP","54","40110 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50586","24.528734","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50587","24.529036","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50588","24.529045","172.30.1.205","172.30.1.104","TCP","54","40110 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50589","24.530939","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50590","24.531337","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50591","24.531343","172.30.1.205","172.30.1.104","TCP","54","40110 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50592","24.532680","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50593","24.536416","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50594","24.536427","172.30.1.205","172.30.1.104","TCP","54","40110 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50595","24.537401","172.30.1.205","172.30.1.104","TCP","74","47476 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927763 TSecr=0 WS=128" "50596","24.537792","172.30.1.104","172.30.1.205","TCP","66","135 > 47476 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50597","24.537813","172.30.1.205","172.30.1.104","TCP","54","47476 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50598","24.538306","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50599","24.538676","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50600","24.538684","172.30.1.205","172.30.1.104","TCP","54","47476 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50601","24.540893","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50602","24.543434","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50603","24.543442","172.30.1.205","172.30.1.104","TCP","54","47476 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50604","24.545302","172.30.1.205","172.30.1.104","TCP","54","47476 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50605","24.545424","172.30.1.205","172.30.1.104","TCP","74","40114 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927771 TSecr=0 WS=128" "50606","24.545552","172.30.1.104","172.30.1.205","TCP","54","135 > 47476 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50607","24.545587","172.30.1.104","172.30.1.205","TCP","54","135 > 47476 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50608","24.545593","172.30.1.205","172.30.1.104","TCP","54","47476 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50609","24.545696","172.30.1.104","172.30.1.205","TCP","66","49671 > 40114 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50610","24.545705","172.30.1.205","172.30.1.104","TCP","54","40114 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50611","24.546074","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50612","24.546363","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50613","24.546371","172.30.1.205","172.30.1.104","TCP","54","40114 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50614","24.548281","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50615","24.548660","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50616","24.548667","172.30.1.205","172.30.1.104","TCP","54","40114 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50617","24.550031","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50618","24.553768","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50619","24.553778","172.30.1.205","172.30.1.104","TCP","54","40114 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50620","24.554710","172.30.1.205","172.30.1.104","TCP","74","47480 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927781 TSecr=0 WS=128" "50621","24.555043","172.30.1.104","172.30.1.205","TCP","66","135 > 47480 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50622","24.555054","172.30.1.205","172.30.1.104","TCP","54","47480 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50623","24.555401","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50624","24.555732","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50625","24.555741","172.30.1.205","172.30.1.104","TCP","54","47480 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50626","24.557940","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50627","24.558360","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50628","24.558366","172.30.1.205","172.30.1.104","TCP","54","47480 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50629","24.560168","172.30.1.205","172.30.1.104","TCP","54","47480 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50630","24.560276","172.30.1.205","172.30.1.104","TCP","74","40118 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927786 TSecr=0 WS=128" "50631","24.560458","172.30.1.104","172.30.1.205","TCP","54","135 > 47480 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50632","24.560480","172.30.1.104","172.30.1.205","TCP","54","135 > 47480 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50633","24.560485","172.30.1.205","172.30.1.104","TCP","54","47480 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50634","24.560593","172.30.1.104","172.30.1.205","TCP","66","49671 > 40118 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50635","24.560601","172.30.1.205","172.30.1.104","TCP","54","40118 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50636","24.560991","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50637","24.561267","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50638","24.561276","172.30.1.205","172.30.1.104","TCP","54","40118 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50639","24.563125","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50640","24.563543","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50641","24.563556","172.30.1.205","172.30.1.104","TCP","54","40118 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50642","24.564942","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50643","24.568538","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50644","24.568547","172.30.1.205","172.30.1.104","TCP","54","40118 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50645","24.569490","172.30.1.205","172.30.1.104","TCP","74","47484 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927795 TSecr=0 WS=128" "50646","24.569762","172.30.1.104","172.30.1.205","TCP","66","135 > 47484 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50647","24.569773","172.30.1.205","172.30.1.104","TCP","54","47484 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50648","24.570122","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50649","24.570387","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50650","24.570396","172.30.1.205","172.30.1.104","TCP","54","47484 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50651","24.572599","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50652","24.572978","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50653","24.572984","172.30.1.205","172.30.1.104","TCP","54","47484 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50654","24.574792","172.30.1.205","172.30.1.104","TCP","54","47484 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50655","24.574902","172.30.1.205","172.30.1.104","TCP","74","40122 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927801 TSecr=0 WS=128" "50656","24.575144","172.30.1.104","172.30.1.205","TCP","54","135 > 47484 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50657","24.575158","172.30.1.104","172.30.1.205","TCP","54","135 > 47484 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50658","24.575163","172.30.1.205","172.30.1.104","TCP","54","47484 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50659","24.575238","172.30.1.104","172.30.1.205","TCP","66","49671 > 40122 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50660","24.575246","172.30.1.205","172.30.1.104","TCP","54","40122 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50661","24.575587","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50662","24.575895","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50663","24.575903","172.30.1.205","172.30.1.104","TCP","54","40122 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50664","24.577801","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50665","24.578176","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50666","24.578183","172.30.1.205","172.30.1.104","TCP","54","40122 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50667","24.579524","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50668","24.583093","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50669","24.583102","172.30.1.205","172.30.1.104","TCP","54","40122 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50670","24.584030","172.30.1.205","172.30.1.104","TCP","74","47488 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927810 TSecr=0 WS=128" "50671","24.584335","172.30.1.104","172.30.1.205","TCP","66","135 > 47488 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50672","24.584347","172.30.1.205","172.30.1.104","TCP","54","47488 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50673","24.584706","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50674","24.584989","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50675","24.584998","172.30.1.205","172.30.1.104","TCP","54","47488 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50676","24.587264","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50677","24.587638","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50678","24.587644","172.30.1.205","172.30.1.104","TCP","54","47488 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50679","24.589476","172.30.1.205","172.30.1.104","TCP","54","47488 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50680","24.589586","172.30.1.205","172.30.1.104","TCP","74","40126 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927816 TSecr=0 WS=128" "50681","24.589748","172.30.1.104","172.30.1.205","TCP","54","135 > 47488 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50682","24.589764","172.30.1.104","172.30.1.205","TCP","54","135 > 47488 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50683","24.589769","172.30.1.205","172.30.1.104","TCP","54","47488 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50684","24.589876","172.30.1.104","172.30.1.205","TCP","66","49671 > 40126 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50685","24.589885","172.30.1.205","172.30.1.104","TCP","54","40126 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50686","24.590226","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50687","24.590500","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50688","24.590508","172.30.1.205","172.30.1.104","TCP","54","40126 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50689","24.592390","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50690","24.592749","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50691","24.592755","172.30.1.205","172.30.1.104","TCP","54","40126 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50692","24.594117","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50693","24.597792","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50694","24.597802","172.30.1.205","172.30.1.104","TCP","54","40126 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50695","24.598747","172.30.1.205","172.30.1.104","TCP","74","47492 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927825 TSecr=0 WS=128" "50696","24.599025","172.30.1.104","172.30.1.205","TCP","66","135 > 47492 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50697","24.599035","172.30.1.205","172.30.1.104","TCP","54","47492 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50698","24.599387","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50699","24.599689","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50700","24.599699","172.30.1.205","172.30.1.104","TCP","54","47492 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50701","24.602083","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50702","24.602464","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50703","24.602472","172.30.1.205","172.30.1.104","TCP","54","47492 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50704","24.604295","172.30.1.205","172.30.1.104","TCP","54","47492 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50705","24.604416","172.30.1.205","172.30.1.104","TCP","74","40130 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927830 TSecr=0 WS=128" "50706","24.604530","172.30.1.104","172.30.1.205","TCP","54","135 > 47492 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50707","24.604571","172.30.1.104","172.30.1.205","TCP","54","135 > 47492 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50708","24.604577","172.30.1.205","172.30.1.104","TCP","54","47492 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50709","24.604700","172.30.1.104","172.30.1.205","TCP","66","49671 > 40130 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50710","24.604715","172.30.1.205","172.30.1.104","TCP","54","40130 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50711","24.605119","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50712","24.605400","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50713","24.605410","172.30.1.205","172.30.1.104","TCP","54","40130 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50714","24.607353","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50715","24.607716","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50716","24.607723","172.30.1.205","172.30.1.104","TCP","54","40130 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50717","24.609148","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50718","24.612805","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50719","24.612816","172.30.1.205","172.30.1.104","TCP","54","40130 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50720","24.613800","172.30.1.205","172.30.1.104","TCP","74","47496 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927840 TSecr=0 WS=128" "50721","24.614109","172.30.1.104","172.30.1.205","TCP","66","135 > 47496 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50722","24.614120","172.30.1.205","172.30.1.104","TCP","54","47496 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50723","24.614475","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50724","24.614750","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50725","24.614759","172.30.1.205","172.30.1.104","TCP","54","47496 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50726","24.616976","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50727","24.617348","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50728","24.617354","172.30.1.205","172.30.1.104","TCP","54","47496 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50729","24.619231","172.30.1.205","172.30.1.104","TCP","54","47496 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50730","24.619343","172.30.1.205","172.30.1.104","TCP","74","40134 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927845 TSecr=0 WS=128" "50731","24.619491","172.30.1.104","172.30.1.205","TCP","54","135 > 47496 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50732","24.619513","172.30.1.104","172.30.1.205","TCP","54","135 > 47496 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50733","24.619518","172.30.1.205","172.30.1.104","TCP","54","47496 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50734","24.619619","172.30.1.104","172.30.1.205","TCP","66","49671 > 40134 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50735","24.619632","172.30.1.205","172.30.1.104","TCP","54","40134 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50736","24.619977","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50737","24.620257","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50738","24.620266","172.30.1.205","172.30.1.104","TCP","54","40134 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50739","24.622191","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50740","24.622548","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50741","24.622555","172.30.1.205","172.30.1.104","TCP","54","40134 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50742","24.623906","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50743","24.627533","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50744","24.627542","172.30.1.205","172.30.1.104","TCP","54","40134 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50745","24.628497","172.30.1.205","172.30.1.104","TCP","74","47500 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927854 TSecr=0 WS=128" "50746","24.628793","172.30.1.104","172.30.1.205","TCP","66","135 > 47500 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50747","24.628805","172.30.1.205","172.30.1.104","TCP","54","47500 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50748","24.629167","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50749","24.629452","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50750","24.629462","172.30.1.205","172.30.1.104","TCP","54","47500 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50751","24.631665","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50752","24.632036","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50753","24.632043","172.30.1.205","172.30.1.104","TCP","54","47500 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50754","24.633889","172.30.1.205","172.30.1.104","TCP","54","47500 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50755","24.634002","172.30.1.205","172.30.1.104","TCP","74","40138 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927860 TSecr=0 WS=128" "50756","24.634140","172.30.1.104","172.30.1.205","TCP","54","135 > 47500 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50757","24.634153","172.30.1.104","172.30.1.205","TCP","54","135 > 47500 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50758","24.634159","172.30.1.205","172.30.1.104","TCP","54","47500 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50759","24.634276","172.30.1.104","172.30.1.205","TCP","66","49671 > 40138 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50760","24.634285","172.30.1.205","172.30.1.104","TCP","54","40138 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50761","24.634641","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50762","24.634906","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50763","24.634915","172.30.1.205","172.30.1.104","TCP","54","40138 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50764","24.636851","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50765","24.637300","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50766","24.637306","172.30.1.205","172.30.1.104","TCP","54","40138 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50767","24.638677","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50768","24.642364","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50769","24.642376","172.30.1.205","172.30.1.104","TCP","54","40138 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50770","24.643376","172.30.1.205","172.30.1.104","TCP","74","47504 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927869 TSecr=0 WS=128" "50771","24.643657","172.30.1.104","172.30.1.205","TCP","66","135 > 47504 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50772","24.643668","172.30.1.205","172.30.1.104","TCP","54","47504 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50773","24.644023","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50774","24.644329","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50775","24.644338","172.30.1.205","172.30.1.104","TCP","54","47504 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50776","24.646593","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50777","24.646994","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50778","24.647002","172.30.1.205","172.30.1.104","TCP","54","47504 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50779","24.648879","172.30.1.205","172.30.1.104","TCP","54","47504 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50780","24.649000","172.30.1.205","172.30.1.104","TCP","74","40142 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927875 TSecr=0 WS=128" "50781","24.649136","172.30.1.104","172.30.1.205","TCP","54","135 > 47504 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50782","24.649169","172.30.1.104","172.30.1.205","TCP","54","135 > 47504 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50783","24.649176","172.30.1.205","172.30.1.104","TCP","54","47504 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50784","24.649261","172.30.1.104","172.30.1.205","TCP","66","49671 > 40142 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50785","24.649270","172.30.1.205","172.30.1.104","TCP","54","40142 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50786","24.649621","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50787","24.649894","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50788","24.649903","172.30.1.205","172.30.1.104","TCP","54","40142 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50789","24.651817","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50790","24.652187","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50791","24.652205","172.30.1.205","172.30.1.104","TCP","54","40142 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50792","24.653696","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50793","24.657382","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50794","24.657393","172.30.1.205","172.30.1.104","TCP","54","40142 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50795","24.658416","172.30.1.205","172.30.1.104","TCP","74","47508 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927884 TSecr=0 WS=128" "50796","24.658744","172.30.1.104","172.30.1.205","TCP","66","135 > 47508 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50797","24.658757","172.30.1.205","172.30.1.104","TCP","54","47508 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50798","24.659123","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50799","24.659403","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50800","24.659412","172.30.1.205","172.30.1.104","TCP","54","47508 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50801","24.661693","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50802","24.662087","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50803","24.662094","172.30.1.205","172.30.1.104","TCP","54","47508 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50804","24.663940","172.30.1.205","172.30.1.104","TCP","54","47508 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50805","24.664088","172.30.1.205","172.30.1.104","TCP","74","40146 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927890 TSecr=0 WS=128" "50806","24.664196","172.30.1.104","172.30.1.205","TCP","54","135 > 47508 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50807","24.664210","172.30.1.104","172.30.1.205","TCP","54","135 > 47508 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50808","24.664218","172.30.1.205","172.30.1.104","TCP","54","47508 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50809","24.664397","172.30.1.104","172.30.1.205","TCP","66","49671 > 40146 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50810","24.664406","172.30.1.205","172.30.1.104","TCP","54","40146 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50811","24.664793","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50812","24.666149","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50813","24.666161","172.30.1.205","172.30.1.104","TCP","54","40146 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50814","24.668098","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50815","24.668533","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50816","24.668540","172.30.1.205","172.30.1.104","TCP","54","40146 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50817","24.669962","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50818","24.673760","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50819","24.673779","172.30.1.205","172.30.1.104","TCP","54","40146 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50820","24.674933","172.30.1.205","172.30.1.104","TCP","74","47512 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927901 TSecr=0 WS=128" "50821","24.675237","172.30.1.104","172.30.1.205","TCP","66","135 > 47512 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50822","24.675250","172.30.1.205","172.30.1.104","TCP","54","47512 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50823","24.675631","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50824","24.675903","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50825","24.675912","172.30.1.205","172.30.1.104","TCP","54","47512 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50826","24.678190","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50827","24.678581","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50828","24.678588","172.30.1.205","172.30.1.104","TCP","54","47512 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50829","24.679477","172.30.1.205","172.30.1.104","TCP","54","40106 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50830","24.679528","172.30.1.205","172.30.1.104","TCP","54","40110 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50831","24.679566","172.30.1.205","172.30.1.104","TCP","54","40114 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50832","24.679601","172.30.1.205","172.30.1.104","TCP","54","40118 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50833","24.679635","172.30.1.205","172.30.1.104","TCP","54","40122 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50834","24.679664","172.30.1.205","172.30.1.104","TCP","54","40126 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50835","24.679696","172.30.1.205","172.30.1.104","TCP","54","40130 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50836","24.679729","172.30.1.205","172.30.1.104","TCP","54","40134 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50837","24.679757","172.30.1.205","172.30.1.104","TCP","54","40138 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50838","24.679768","172.30.1.104","172.30.1.205","TCP","54","49671 > 40106 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50839","24.679785","172.30.1.104","172.30.1.205","TCP","54","49671 > 40106 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50840","24.679793","172.30.1.205","172.30.1.104","TCP","54","40106 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50841","24.679824","172.30.1.205","172.30.1.104","TCP","54","40142 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50842","24.679857","172.30.1.205","172.30.1.104","TCP","54","40146 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50843","24.679928","172.30.1.205","172.30.1.104","TCP","54","40102 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "50844","24.680042","172.30.1.104","172.30.1.205","TCP","54","49671 > 40110 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50845","24.680061","172.30.1.104","172.30.1.205","TCP","54","49671 > 40114 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50846","24.680080","172.30.1.104","172.30.1.205","TCP","54","49671 > 40118 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50847","24.680099","172.30.1.104","172.30.1.205","TCP","54","49671 > 40122 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50848","24.680119","172.30.1.104","172.30.1.205","TCP","54","49671 > 40126 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50849","24.680139","172.30.1.104","172.30.1.205","TCP","54","49671 > 40130 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50850","24.680169","172.30.1.104","172.30.1.205","TCP","54","49671 > 40130 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50851","24.680175","172.30.1.205","172.30.1.104","TCP","54","40130 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50852","24.680189","172.30.1.104","172.30.1.205","TCP","54","49671 > 40126 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50853","24.680191","172.30.1.205","172.30.1.104","TCP","54","40126 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50854","24.680222","172.30.1.104","172.30.1.205","TCP","54","49671 > 40122 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50855","24.680225","172.30.1.205","172.30.1.104","TCP","54","40122 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50856","24.680262","172.30.1.104","172.30.1.205","TCP","54","49671 > 40110 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50857","24.680266","172.30.1.205","172.30.1.104","TCP","54","40110 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50858","24.680281","172.30.1.104","172.30.1.205","TCP","54","49671 > 40114 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50859","24.680284","172.30.1.205","172.30.1.104","TCP","54","40114 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50860","24.680300","172.30.1.104","172.30.1.205","TCP","54","49671 > 40118 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50861","24.680307","172.30.1.205","172.30.1.104","TCP","54","40118 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50862","24.680429","172.30.1.104","172.30.1.205","TCP","54","49671 > 40134 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50863","24.680450","172.30.1.104","172.30.1.205","TCP","54","49671 > 40138 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50864","24.680470","172.30.1.104","172.30.1.205","TCP","54","49671 > 40142 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50865","24.680490","172.30.1.104","172.30.1.205","TCP","54","49671 > 40146 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50866","24.680509","172.30.1.104","172.30.1.205","TCP","54","49671 > 40102 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50867","24.680708","172.30.1.104","172.30.1.205","TCP","54","49671 > 40102 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50868","24.680714","172.30.1.205","172.30.1.104","TCP","54","40102 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50869","24.680726","172.30.1.104","172.30.1.205","TCP","54","49671 > 40146 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50870","24.680728","172.30.1.205","172.30.1.104","TCP","54","40146 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50871","24.680747","172.30.1.104","172.30.1.205","TCP","54","49671 > 40134 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50872","24.680749","172.30.1.205","172.30.1.104","TCP","54","40134 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50873","24.680787","172.30.1.104","172.30.1.205","TCP","54","49671 > 40138 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50874","24.680791","172.30.1.205","172.30.1.104","TCP","54","40138 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50875","24.680807","172.30.1.104","172.30.1.205","TCP","54","49671 > 40142 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "50876","24.680810","172.30.1.205","172.30.1.104","TCP","54","40142 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "50877","24.681536","172.30.1.205","172.30.1.104","TCP","54","47512 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50878","24.681670","172.30.1.205","172.30.1.104","TCP","74","40150 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927908 TSecr=0 WS=128" "50879","24.681792","172.30.1.104","172.30.1.205","TCP","54","135 > 47512 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50880","24.681802","172.30.1.104","172.30.1.205","TCP","54","135 > 47512 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50881","24.681807","172.30.1.205","172.30.1.104","TCP","54","47512 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50882","24.681934","172.30.1.104","172.30.1.205","TCP","66","49671 > 40150 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50883","24.681943","172.30.1.205","172.30.1.104","TCP","54","40150 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50884","24.682296","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50885","24.682588","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50886","24.682596","172.30.1.205","172.30.1.104","TCP","54","40150 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50887","24.684480","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50888","24.684833","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50889","24.684840","172.30.1.205","172.30.1.104","TCP","54","40150 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50890","24.686225","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50891","24.689924","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50892","24.689934","172.30.1.205","172.30.1.104","TCP","54","40150 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50893","24.690925","172.30.1.205","172.30.1.104","TCP","74","47516 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927917 TSecr=0 WS=128" "50894","24.691233","172.30.1.104","172.30.1.205","TCP","66","135 > 47516 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50895","24.691245","172.30.1.205","172.30.1.104","TCP","54","47516 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50896","24.691603","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50897","24.691902","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50898","24.691912","172.30.1.205","172.30.1.104","TCP","54","47516 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50899","24.694132","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50900","24.694509","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50901","24.694515","172.30.1.205","172.30.1.104","TCP","54","47516 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50902","24.696373","172.30.1.205","172.30.1.104","TCP","54","47516 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50903","24.696495","172.30.1.205","172.30.1.104","TCP","74","40154 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927922 TSecr=0 WS=128" "50904","24.696646","172.30.1.104","172.30.1.205","TCP","54","135 > 47516 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50905","24.696676","172.30.1.104","172.30.1.205","TCP","54","135 > 47516 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50906","24.696683","172.30.1.205","172.30.1.104","TCP","54","47516 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50907","24.696791","172.30.1.104","172.30.1.205","TCP","66","49671 > 40154 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50908","24.696801","172.30.1.205","172.30.1.104","TCP","54","40154 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50909","24.697182","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50910","24.697440","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50911","24.697448","172.30.1.205","172.30.1.104","TCP","54","40154 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50912","24.699324","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50913","24.699798","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50914","24.699804","172.30.1.205","172.30.1.104","TCP","54","40154 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50915","24.701195","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50916","24.704867","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50917","24.704877","172.30.1.205","172.30.1.104","TCP","54","40154 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50918","24.705856","172.30.1.205","172.30.1.104","TCP","74","47520 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927932 TSecr=0 WS=128" "50919","24.706165","172.30.1.104","172.30.1.205","TCP","66","135 > 47520 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50920","24.706176","172.30.1.205","172.30.1.104","TCP","54","47520 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50921","24.706532","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50922","24.706824","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50923","24.706837","172.30.1.205","172.30.1.104","TCP","54","47520 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50924","24.709068","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50925","24.709434","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50926","24.709440","172.30.1.205","172.30.1.104","TCP","54","47520 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50927","24.711260","172.30.1.205","172.30.1.104","TCP","54","47520 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50928","24.711372","172.30.1.205","172.30.1.104","TCP","74","40158 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927937 TSecr=0 WS=128" "50929","24.711514","172.30.1.104","172.30.1.205","TCP","54","135 > 47520 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50930","24.711543","172.30.1.104","172.30.1.205","TCP","54","135 > 47520 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50931","24.711548","172.30.1.205","172.30.1.104","TCP","54","47520 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50932","24.711646","172.30.1.104","172.30.1.205","TCP","66","49671 > 40158 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50933","24.711655","172.30.1.205","172.30.1.104","TCP","54","40158 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50934","24.712001","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50935","24.712295","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50936","24.712305","172.30.1.205","172.30.1.104","TCP","54","40158 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50937","24.714217","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50938","24.714630","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50939","24.714634","172.30.1.205","172.30.1.104","TCP","54","40158 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50940","24.715996","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50941","24.719644","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50942","24.719662","172.30.1.205","172.30.1.104","TCP","54","40158 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50943","24.720881","172.30.1.205","172.30.1.104","TCP","74","47524 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927947 TSecr=0 WS=128" "50944","24.721198","172.30.1.104","172.30.1.205","TCP","66","135 > 47524 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50945","24.721210","172.30.1.205","172.30.1.104","TCP","54","47524 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50946","24.721572","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50947","24.721848","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50948","24.721857","172.30.1.205","172.30.1.104","TCP","54","47524 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50949","24.724095","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50950","24.724469","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50951","24.724476","172.30.1.205","172.30.1.104","TCP","54","47524 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50952","24.726345","172.30.1.205","172.30.1.104","TCP","54","47524 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50953","24.726458","172.30.1.205","172.30.1.104","TCP","74","40162 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927952 TSecr=0 WS=128" "50954","24.726615","172.30.1.104","172.30.1.205","TCP","54","135 > 47524 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50955","24.726649","172.30.1.104","172.30.1.205","TCP","54","135 > 47524 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50956","24.726654","172.30.1.205","172.30.1.104","TCP","54","47524 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50957","24.726787","172.30.1.104","172.30.1.205","TCP","66","49671 > 40162 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50958","24.726795","172.30.1.205","172.30.1.104","TCP","54","40162 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50959","24.727149","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50960","24.727473","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50961","24.727481","172.30.1.205","172.30.1.104","TCP","54","40162 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50962","24.729403","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50963","24.729776","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50964","24.729782","172.30.1.205","172.30.1.104","TCP","54","40162 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50965","24.731139","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50966","24.734823","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50967","24.734832","172.30.1.205","172.30.1.104","TCP","54","40162 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50968","24.735788","172.30.1.205","172.30.1.104","TCP","74","47528 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927962 TSecr=0 WS=128" "50969","24.736106","172.30.1.104","172.30.1.205","TCP","66","135 > 47528 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50970","24.736118","172.30.1.205","172.30.1.104","TCP","54","47528 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50971","24.736481","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50972","24.736784","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50973","24.736793","172.30.1.205","172.30.1.104","TCP","54","47528 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50974","24.738993","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "50975","24.739375","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "50976","24.739381","172.30.1.205","172.30.1.104","TCP","54","47528 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "50977","24.741224","172.30.1.205","172.30.1.104","TCP","54","47528 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "50978","24.741336","172.30.1.205","172.30.1.104","TCP","74","40166 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927967 TSecr=0 WS=128" "50979","24.741492","172.30.1.104","172.30.1.205","TCP","54","135 > 47528 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50980","24.741504","172.30.1.104","172.30.1.205","TCP","54","135 > 47528 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "50981","24.741509","172.30.1.205","172.30.1.104","TCP","54","47528 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "50982","24.741628","172.30.1.104","172.30.1.205","TCP","66","49671 > 40166 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50983","24.741636","172.30.1.205","172.30.1.104","TCP","54","40166 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50984","24.741986","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "50985","24.742390","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50986","24.742399","172.30.1.205","172.30.1.104","TCP","54","40166 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50987","24.744285","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "50988","24.744648","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "50989","24.744654","172.30.1.205","172.30.1.104","TCP","54","40166 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "50990","24.746032","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "50991","24.749872","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "50992","24.749897","172.30.1.205","172.30.1.104","TCP","54","40166 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "50993","24.750869","172.30.1.205","172.30.1.104","TCP","74","47532 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927977 TSecr=0 WS=128" "50994","24.751149","172.30.1.104","172.30.1.205","TCP","66","135 > 47532 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "50995","24.751160","172.30.1.205","172.30.1.104","TCP","54","47532 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "50996","24.751508","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "50997","24.751798","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "50998","24.751807","172.30.1.205","172.30.1.104","TCP","54","47532 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "50999","24.754026","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51000","24.754399","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51001","24.754406","172.30.1.205","172.30.1.104","TCP","54","47532 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51002","24.756219","172.30.1.205","172.30.1.104","TCP","54","47532 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51003","24.756331","172.30.1.205","172.30.1.104","TCP","74","40170 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927982 TSecr=0 WS=128" "51004","24.756496","172.30.1.104","172.30.1.205","TCP","54","135 > 47532 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51005","24.756527","172.30.1.104","172.30.1.205","TCP","54","135 > 47532 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51006","24.756533","172.30.1.205","172.30.1.104","TCP","54","47532 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51007","24.756603","172.30.1.104","172.30.1.205","TCP","66","49671 > 40170 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51008","24.756612","172.30.1.205","172.30.1.104","TCP","54","40170 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51009","24.756996","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51010","24.757273","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51011","24.757282","172.30.1.205","172.30.1.104","TCP","54","40170 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51012","24.759186","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51013","24.759554","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51014","24.759561","172.30.1.205","172.30.1.104","TCP","54","40170 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51015","24.761006","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51016","24.764838","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51017","24.764848","172.30.1.205","172.30.1.104","TCP","54","40170 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51018","24.765804","172.30.1.205","172.30.1.104","TCP","74","47536 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927992 TSecr=0 WS=128" "51019","24.766119","172.30.1.104","172.30.1.205","TCP","66","135 > 47536 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51020","24.766130","172.30.1.205","172.30.1.104","TCP","54","47536 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51021","24.766478","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51022","24.766792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51023","24.766801","172.30.1.205","172.30.1.104","TCP","54","47536 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51024","24.769008","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51025","24.769404","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51026","24.769411","172.30.1.205","172.30.1.104","TCP","54","47536 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51027","24.771248","172.30.1.205","172.30.1.104","TCP","54","47536 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51028","24.771359","172.30.1.205","172.30.1.104","TCP","74","40174 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499927997 TSecr=0 WS=128" "51029","24.771527","172.30.1.104","172.30.1.205","TCP","54","135 > 47536 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51030","24.771557","172.30.1.104","172.30.1.205","TCP","54","135 > 47536 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51031","24.771562","172.30.1.205","172.30.1.104","TCP","54","47536 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51032","24.771643","172.30.1.104","172.30.1.205","TCP","66","49671 > 40174 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51033","24.771651","172.30.1.205","172.30.1.104","TCP","54","40174 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51034","24.771998","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51035","24.772294","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51036","24.772303","172.30.1.205","172.30.1.104","TCP","54","40174 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51037","24.774217","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51038","24.774592","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51039","24.774598","172.30.1.205","172.30.1.104","TCP","54","40174 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51040","24.775950","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51041","24.780676","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51042","24.780705","172.30.1.205","172.30.1.104","TCP","54","40174 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51043","24.781908","172.30.1.205","172.30.1.104","TCP","74","47540 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928008 TSecr=0 WS=128" "51044","24.782294","172.30.1.104","172.30.1.205","TCP","66","135 > 47540 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51045","24.782307","172.30.1.205","172.30.1.104","TCP","54","47540 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51046","24.782669","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51047","24.783000","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51048","24.783018","172.30.1.205","172.30.1.104","TCP","54","47540 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51049","24.785437","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51050","24.785868","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51051","24.785881","172.30.1.205","172.30.1.104","TCP","54","47540 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51052","24.787923","172.30.1.205","172.30.1.104","TCP","54","47540 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51053","24.788047","172.30.1.205","172.30.1.104","TCP","74","40178 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928014 TSecr=0 WS=128" "51054","24.788194","172.30.1.104","172.30.1.205","TCP","54","135 > 47540 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51055","24.788224","172.30.1.104","172.30.1.205","TCP","54","135 > 47540 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51056","24.788230","172.30.1.205","172.30.1.104","TCP","54","47540 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51057","24.788337","172.30.1.104","172.30.1.205","TCP","66","49671 > 40178 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51058","24.788345","172.30.1.205","172.30.1.104","TCP","54","40178 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51059","24.788690","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51060","24.788999","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51061","24.789008","172.30.1.205","172.30.1.104","TCP","54","40178 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51062","24.790877","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51063","24.791498","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51064","24.791504","172.30.1.205","172.30.1.104","TCP","54","40178 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51065","24.792880","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51066","24.796841","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51067","24.796855","172.30.1.205","172.30.1.104","TCP","54","40178 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51068","24.797899","172.30.1.205","172.30.1.104","TCP","74","47544 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928024 TSecr=0 WS=128" "51069","24.798250","172.30.1.104","172.30.1.205","TCP","66","135 > 47544 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51070","24.798262","172.30.1.205","172.30.1.104","TCP","54","47544 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51071","24.798622","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51072","24.798923","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51073","24.798933","172.30.1.205","172.30.1.104","TCP","54","47544 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51074","24.801153","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51075","24.801594","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51076","24.801601","172.30.1.205","172.30.1.104","TCP","54","47544 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51077","24.803422","172.30.1.205","172.30.1.104","TCP","54","47544 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51078","24.803532","172.30.1.205","172.30.1.104","TCP","74","40182 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928029 TSecr=0 WS=128" "51079","24.803690","172.30.1.104","172.30.1.205","TCP","54","135 > 47544 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51080","24.803701","172.30.1.104","172.30.1.205","TCP","54","135 > 47544 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51081","24.803707","172.30.1.205","172.30.1.104","TCP","54","47544 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51082","24.803815","172.30.1.104","172.30.1.205","TCP","66","49671 > 40182 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51083","24.803828","172.30.1.205","172.30.1.104","TCP","54","40182 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51084","24.804185","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51085","24.804465","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51086","24.804475","172.30.1.205","172.30.1.104","TCP","54","40182 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51087","24.806371","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51088","24.806772","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51089","24.806778","172.30.1.205","172.30.1.104","TCP","54","40182 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51090","24.808161","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51091","24.811960","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51092","24.811969","172.30.1.205","172.30.1.104","TCP","54","40182 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51093","24.812923","172.30.1.205","172.30.1.104","TCP","74","47548 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928039 TSecr=0 WS=128" "51094","24.813317","172.30.1.104","172.30.1.205","TCP","66","135 > 47548 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51095","24.813328","172.30.1.205","172.30.1.104","TCP","54","47548 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51096","24.813696","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51097","24.813988","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51098","24.813998","172.30.1.205","172.30.1.104","TCP","54","47548 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51099","24.816177","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51100","24.816639","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51101","24.816646","172.30.1.205","172.30.1.104","TCP","54","47548 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51102","24.818476","172.30.1.205","172.30.1.104","TCP","54","47548 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51103","24.818588","172.30.1.205","172.30.1.104","TCP","74","40186 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928045 TSecr=0 WS=128" "51104","24.818760","172.30.1.104","172.30.1.205","TCP","54","135 > 47548 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51105","24.818771","172.30.1.104","172.30.1.205","TCP","54","135 > 47548 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51106","24.818785","172.30.1.205","172.30.1.104","TCP","54","47548 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51107","24.818931","172.30.1.104","172.30.1.205","TCP","66","49671 > 40186 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51108","24.818939","172.30.1.205","172.30.1.104","TCP","54","40186 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51109","24.819298","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51110","24.820748","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51111","24.820755","172.30.1.205","172.30.1.104","TCP","54","40186 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51112","24.822633","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51113","24.823006","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51114","24.823013","172.30.1.205","172.30.1.104","TCP","54","40186 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51115","24.824370","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51116","24.828178","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51117","24.828189","172.30.1.205","172.30.1.104","TCP","54","40186 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51118","24.829174","172.30.1.205","172.30.1.104","TCP","74","47552 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928055 TSecr=0 WS=128" "51119","24.829469","172.30.1.104","172.30.1.205","TCP","66","135 > 47552 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51120","24.829480","172.30.1.205","172.30.1.104","TCP","54","47552 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51121","24.829840","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51122","24.830148","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51123","24.830157","172.30.1.205","172.30.1.104","TCP","54","47552 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51124","24.832347","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51125","24.832788","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51126","24.832795","172.30.1.205","172.30.1.104","TCP","54","47552 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51127","24.834603","172.30.1.205","172.30.1.104","TCP","54","47552 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51128","24.834714","172.30.1.205","172.30.1.104","TCP","74","40190 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928061 TSecr=0 WS=128" "51129","24.834859","172.30.1.104","172.30.1.205","TCP","54","135 > 47552 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51130","24.834914","172.30.1.104","172.30.1.205","TCP","54","135 > 47552 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51131","24.834919","172.30.1.205","172.30.1.104","TCP","54","47552 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51132","24.835005","172.30.1.104","172.30.1.205","TCP","66","49671 > 40190 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51133","24.835014","172.30.1.205","172.30.1.104","TCP","54","40190 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51134","24.835363","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51135","24.835665","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51136","24.835674","172.30.1.205","172.30.1.104","TCP","54","40190 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51137","24.837596","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51138","24.837981","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51139","24.837987","172.30.1.205","172.30.1.104","TCP","54","40190 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51140","24.839336","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51141","24.843106","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51142","24.843115","172.30.1.205","172.30.1.104","TCP","54","40190 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51143","24.844056","172.30.1.205","172.30.1.104","TCP","74","47556 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928070 TSecr=0 WS=128" "51144","24.844421","172.30.1.104","172.30.1.205","TCP","66","135 > 47556 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51145","24.844433","172.30.1.205","172.30.1.104","TCP","54","47556 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51146","24.844809","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51147","24.845111","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51148","24.845120","172.30.1.205","172.30.1.104","TCP","54","47556 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51149","24.847313","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51150","24.847726","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51151","24.847732","172.30.1.205","172.30.1.104","TCP","54","47556 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51152","24.849563","172.30.1.205","172.30.1.104","TCP","54","47556 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51153","24.849675","172.30.1.205","172.30.1.104","TCP","74","40194 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928076 TSecr=0 WS=128" "51154","24.850047","172.30.1.104","172.30.1.205","TCP","54","135 > 47556 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51155","24.850056","172.30.1.104","172.30.1.205","TCP","54","135 > 47556 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51156","24.850061","172.30.1.205","172.30.1.104","TCP","54","47556 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51157","24.850067","172.30.1.104","172.30.1.205","TCP","66","49671 > 40194 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51158","24.850078","172.30.1.205","172.30.1.104","TCP","54","40194 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51159","24.850425","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51160","24.850738","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51161","24.850747","172.30.1.205","172.30.1.104","TCP","54","40194 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51162","24.852620","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51163","24.852987","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51164","24.852993","172.30.1.205","172.30.1.104","TCP","54","40194 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51165","24.854350","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51166","24.858279","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51167","24.858289","172.30.1.205","172.30.1.104","TCP","54","40194 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51168","24.859236","172.30.1.205","172.30.1.104","TCP","74","47560 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928085 TSecr=0 WS=128" "51169","24.859629","172.30.1.104","172.30.1.205","TCP","66","135 > 47560 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51170","24.859640","172.30.1.205","172.30.1.104","TCP","54","47560 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51171","24.860000","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51172","24.860314","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51173","24.860326","172.30.1.205","172.30.1.104","TCP","54","47560 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51174","24.862558","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51175","24.863010","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51176","24.863017","172.30.1.205","172.30.1.104","TCP","54","47560 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51177","24.863861","172.30.1.205","172.30.1.104","TCP","54","40154 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51178","24.863911","172.30.1.205","172.30.1.104","TCP","54","40158 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51179","24.863948","172.30.1.205","172.30.1.104","TCP","54","40162 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51180","24.863982","172.30.1.205","172.30.1.104","TCP","54","40166 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51181","24.864016","172.30.1.205","172.30.1.104","TCP","54","40170 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51182","24.864048","172.30.1.205","172.30.1.104","TCP","54","40174 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51183","24.864080","172.30.1.205","172.30.1.104","TCP","54","40178 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51184","24.864106","172.30.1.205","172.30.1.104","TCP","54","40182 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51185","24.864133","172.30.1.205","172.30.1.104","TCP","54","40186 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51186","24.864155","172.30.1.205","172.30.1.104","TCP","54","40190 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51187","24.864182","172.30.1.205","172.30.1.104","TCP","54","40194 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51188","24.864252","172.30.1.205","172.30.1.104","TCP","54","40150 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51189","24.864344","172.30.1.104","172.30.1.205","TCP","54","49671 > 40154 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51190","24.864353","172.30.1.104","172.30.1.205","TCP","54","49671 > 40158 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51191","24.864356","172.30.1.104","172.30.1.205","TCP","54","49671 > 40154 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51192","24.864362","172.30.1.205","172.30.1.104","TCP","54","40154 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51193","24.864369","172.30.1.104","172.30.1.205","TCP","54","49671 > 40162 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51194","24.864379","172.30.1.104","172.30.1.205","TCP","54","49671 > 40166 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51195","24.865033","172.30.1.104","172.30.1.205","TCP","54","49671 > 40166 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51196","24.865040","172.30.1.205","172.30.1.104","TCP","54","40166 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51197","24.865047","172.30.1.104","172.30.1.205","TCP","54","49671 > 40170 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51198","24.865054","172.30.1.104","172.30.1.205","TCP","54","49671 > 40170 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51199","24.865061","172.30.1.205","172.30.1.104","TCP","54","40170 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51200","24.865062","172.30.1.104","172.30.1.205","TCP","54","49671 > 40158 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51201","24.865064","172.30.1.205","172.30.1.104","TCP","54","40158 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51202","24.865066","172.30.1.104","172.30.1.205","TCP","54","49671 > 40162 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51203","24.865067","172.30.1.205","172.30.1.104","TCP","54","40162 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51204","24.865069","172.30.1.104","172.30.1.205","TCP","54","49671 > 40174 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51205","24.865072","172.30.1.104","172.30.1.205","TCP","54","49671 > 40178 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51206","24.865075","172.30.1.104","172.30.1.205","TCP","54","49671 > 40174 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51207","24.865077","172.30.1.205","172.30.1.104","TCP","54","40174 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51208","24.865079","172.30.1.104","172.30.1.205","TCP","54","49671 > 40182 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51209","24.865082","172.30.1.104","172.30.1.205","TCP","54","49671 > 40190 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51210","24.865084","172.30.1.104","172.30.1.205","TCP","54","49671 > 40178 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51211","24.865086","172.30.1.205","172.30.1.104","TCP","54","40178 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51212","24.865088","172.30.1.104","172.30.1.205","TCP","54","49671 > 40186 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51213","24.865091","172.30.1.104","172.30.1.205","TCP","54","49671 > 40186 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51214","24.865092","172.30.1.205","172.30.1.104","TCP","54","40186 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51215","24.865094","172.30.1.104","172.30.1.205","TCP","54","49671 > 40194 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51216","24.865096","172.30.1.104","172.30.1.205","TCP","54","49671 > 40194 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51217","24.865098","172.30.1.205","172.30.1.104","TCP","54","40194 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51218","24.865099","172.30.1.104","172.30.1.205","TCP","54","49671 > 40150 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51219","24.865102","172.30.1.104","172.30.1.205","TCP","54","49671 > 40150 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51220","24.865104","172.30.1.205","172.30.1.104","TCP","54","40150 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51221","24.865105","172.30.1.104","172.30.1.205","TCP","54","49671 > 40182 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51222","24.865107","172.30.1.205","172.30.1.104","TCP","54","40182 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51223","24.865108","172.30.1.104","172.30.1.205","TCP","54","49671 > 40190 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51224","24.865109","172.30.1.205","172.30.1.104","TCP","54","40190 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51225","24.865740","172.30.1.205","172.30.1.104","TCP","54","47560 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51226","24.865856","172.30.1.205","172.30.1.104","TCP","74","40198 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928092 TSecr=0 WS=128" "51227","24.865988","172.30.1.104","172.30.1.205","TCP","54","135 > 47560 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51228","24.866022","172.30.1.104","172.30.1.205","TCP","54","135 > 47560 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51229","24.866027","172.30.1.205","172.30.1.104","TCP","54","47560 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51230","24.866129","172.30.1.104","172.30.1.205","TCP","66","49671 > 40198 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51231","24.866137","172.30.1.205","172.30.1.104","TCP","54","40198 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51232","24.866492","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51233","24.866782","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51234","24.866791","172.30.1.205","172.30.1.104","TCP","54","40198 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51235","24.868690","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51236","24.869448","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51237","24.869455","172.30.1.205","172.30.1.104","TCP","54","40198 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51238","24.870837","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51239","24.874646","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51240","24.874656","172.30.1.205","172.30.1.104","TCP","54","40198 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51241","24.875627","172.30.1.205","172.30.1.104","TCP","74","47564 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928102 TSecr=0 WS=128" "51242","24.875957","172.30.1.104","172.30.1.205","TCP","66","135 > 47564 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51243","24.875970","172.30.1.205","172.30.1.104","TCP","54","47564 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51244","24.876339","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51245","24.876635","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51246","24.876644","172.30.1.205","172.30.1.104","TCP","54","47564 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51247","24.878836","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51248","24.879253","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51249","24.879260","172.30.1.205","172.30.1.104","TCP","54","47564 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51250","24.881104","172.30.1.205","172.30.1.104","TCP","54","47564 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51251","24.881219","172.30.1.205","172.30.1.104","TCP","74","40202 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928107 TSecr=0 WS=128" "51252","24.881379","172.30.1.104","172.30.1.205","TCP","54","135 > 47564 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51253","24.881391","172.30.1.104","172.30.1.205","TCP","54","135 > 47564 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51254","24.881397","172.30.1.205","172.30.1.104","TCP","54","47564 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51255","24.881522","172.30.1.104","172.30.1.205","TCP","66","49671 > 40202 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51256","24.881530","172.30.1.205","172.30.1.104","TCP","54","40202 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51257","24.881880","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51258","24.882198","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51259","24.882207","172.30.1.205","172.30.1.104","TCP","54","40202 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51260","24.884107","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51261","24.884470","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51262","24.884476","172.30.1.205","172.30.1.104","TCP","54","40202 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51263","24.885888","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51264","24.889751","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51265","24.889762","172.30.1.205","172.30.1.104","TCP","54","40202 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51266","24.890749","172.30.1.205","172.30.1.104","TCP","74","47568 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928117 TSecr=0 WS=128" "51267","24.891073","172.30.1.104","172.30.1.205","TCP","66","135 > 47568 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51268","24.891085","172.30.1.205","172.30.1.104","TCP","54","47568 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51269","24.891441","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51270","24.891795","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51271","24.891805","172.30.1.205","172.30.1.104","TCP","54","47568 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51272","24.894047","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51273","24.894454","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51274","24.894461","172.30.1.205","172.30.1.104","TCP","54","47568 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51275","24.896279","172.30.1.205","172.30.1.104","TCP","54","47568 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51276","24.896397","172.30.1.205","172.30.1.104","TCP","74","40206 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928122 TSecr=0 WS=128" "51277","24.896547","172.30.1.104","172.30.1.205","TCP","54","135 > 47568 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51278","24.896558","172.30.1.104","172.30.1.205","TCP","54","135 > 47568 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51279","24.896565","172.30.1.205","172.30.1.104","TCP","54","47568 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51280","24.896670","172.30.1.104","172.30.1.205","TCP","66","49671 > 40206 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51281","24.896678","172.30.1.205","172.30.1.104","TCP","54","40206 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51282","24.897053","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51283","24.897347","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51284","24.897355","172.30.1.205","172.30.1.104","TCP","54","40206 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51285","24.899253","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51286","24.900435","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51287","24.900442","172.30.1.205","172.30.1.104","TCP","54","40206 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51288","24.901821","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51289","24.905704","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51290","24.905714","172.30.1.205","172.30.1.104","TCP","54","40206 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51291","24.906678","172.30.1.205","172.30.1.104","TCP","74","47572 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928133 TSecr=0 WS=128" "51292","24.906994","172.30.1.104","172.30.1.205","TCP","66","135 > 47572 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51293","24.907004","172.30.1.205","172.30.1.104","TCP","54","47572 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51294","24.907359","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51295","24.907699","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51296","24.907708","172.30.1.205","172.30.1.104","TCP","54","47572 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51297","24.909937","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51298","24.910341","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51299","24.910347","172.30.1.205","172.30.1.104","TCP","54","47572 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51300","24.912181","172.30.1.205","172.30.1.104","TCP","54","47572 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51301","24.912304","172.30.1.205","172.30.1.104","TCP","74","40210 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928138 TSecr=0 WS=128" "51302","24.912439","172.30.1.104","172.30.1.205","TCP","54","135 > 47572 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51303","24.912461","172.30.1.104","172.30.1.205","TCP","54","135 > 47572 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51304","24.912467","172.30.1.205","172.30.1.104","TCP","54","47572 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51305","24.912650","172.30.1.104","172.30.1.205","TCP","66","49671 > 40210 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51306","24.912658","172.30.1.205","172.30.1.104","TCP","54","40210 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51307","24.913038","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51308","24.913332","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51309","24.913341","172.30.1.205","172.30.1.104","TCP","54","40210 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51310","24.915224","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51311","24.915606","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51312","24.915612","172.30.1.205","172.30.1.104","TCP","54","40210 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51313","24.917000","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51314","24.920942","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51315","24.920951","172.30.1.205","172.30.1.104","TCP","54","40210 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51316","24.921900","172.30.1.205","172.30.1.104","TCP","74","47576 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928148 TSecr=0 WS=128" "51317","24.922212","172.30.1.104","172.30.1.205","TCP","66","135 > 47576 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51318","24.922222","172.30.1.205","172.30.1.104","TCP","54","47576 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51319","24.922573","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51320","24.922876","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51321","24.922885","172.30.1.205","172.30.1.104","TCP","54","47576 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51322","24.925085","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51323","24.925531","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51324","24.925537","172.30.1.205","172.30.1.104","TCP","54","47576 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51325","24.927358","172.30.1.205","172.30.1.104","TCP","54","47576 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51326","24.927470","172.30.1.205","172.30.1.104","TCP","74","40214 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928153 TSecr=0 WS=128" "51327","24.927665","172.30.1.104","172.30.1.205","TCP","54","135 > 47576 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51328","24.927784","172.30.1.104","172.30.1.205","TCP","66","49671 > 40214 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51329","24.927793","172.30.1.205","172.30.1.104","TCP","54","40214 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51330","24.927922","172.30.1.104","172.30.1.205","TCP","54","135 > 47576 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51331","24.927929","172.30.1.205","172.30.1.104","TCP","54","47576 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51332","24.928186","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51333","24.928472","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51334","24.928480","172.30.1.205","172.30.1.104","TCP","54","40214 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51335","24.930439","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51336","24.930835","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51337","24.930841","172.30.1.205","172.30.1.104","TCP","54","40214 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51338","24.932237","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51339","24.936219","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51340","24.936229","172.30.1.205","172.30.1.104","TCP","54","40214 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51341","24.937203","172.30.1.205","172.30.1.104","TCP","74","47580 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928163 TSecr=0 WS=128" "51342","24.937617","172.30.1.104","172.30.1.205","TCP","66","135 > 47580 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51343","24.937629","172.30.1.205","172.30.1.104","TCP","54","47580 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51344","24.937995","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51345","24.938295","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51346","24.938304","172.30.1.205","172.30.1.104","TCP","54","47580 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51347","24.940495","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51348","24.940897","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51349","24.940904","172.30.1.205","172.30.1.104","TCP","54","47580 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51350","24.942726","172.30.1.205","172.30.1.104","TCP","54","47580 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51351","24.942838","172.30.1.205","172.30.1.104","TCP","74","40218 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928169 TSecr=0 WS=128" "51352","24.942987","172.30.1.104","172.30.1.205","TCP","54","135 > 47580 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51353","24.943028","172.30.1.104","172.30.1.205","TCP","54","135 > 47580 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51354","24.943034","172.30.1.205","172.30.1.104","TCP","54","47580 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51355","24.943128","172.30.1.104","172.30.1.205","TCP","66","49671 > 40218 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51356","24.943136","172.30.1.205","172.30.1.104","TCP","54","40218 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51357","24.943503","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51358","24.943800","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51359","24.943809","172.30.1.205","172.30.1.104","TCP","54","40218 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51360","24.945714","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51361","24.946110","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51362","24.946117","172.30.1.205","172.30.1.104","TCP","54","40218 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51363","24.947483","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51364","24.952533","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51365","24.952544","172.30.1.205","172.30.1.104","TCP","54","40218 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51366","24.953526","172.30.1.205","172.30.1.104","TCP","74","47584 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928179 TSecr=0 WS=128" "51367","24.953866","172.30.1.104","172.30.1.205","TCP","66","135 > 47584 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51368","24.953878","172.30.1.205","172.30.1.104","TCP","54","47584 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51369","24.954249","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51370","24.954598","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51371","24.954608","172.30.1.205","172.30.1.104","TCP","54","47584 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51372","24.956836","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51373","24.957237","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51374","24.957243","172.30.1.205","172.30.1.104","TCP","54","47584 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51375","24.959060","172.30.1.205","172.30.1.104","TCP","54","47584 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51376","24.959175","172.30.1.205","172.30.1.104","TCP","74","40222 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928185 TSecr=0 WS=128" "51377","24.959324","172.30.1.104","172.30.1.205","TCP","54","135 > 47584 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51378","24.959334","172.30.1.104","172.30.1.205","TCP","54","135 > 47584 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51379","24.959339","172.30.1.205","172.30.1.104","TCP","54","47584 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51380","24.959467","172.30.1.104","172.30.1.205","TCP","66","49671 > 40222 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51381","24.959475","172.30.1.205","172.30.1.104","TCP","54","40222 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51382","24.959822","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51383","24.960114","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51384","24.960123","172.30.1.205","172.30.1.104","TCP","54","40222 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51385","24.962059","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51386","24.963392","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51387","24.963399","172.30.1.205","172.30.1.104","TCP","54","40222 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51388","24.964818","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51389","24.968696","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51390","24.968705","172.30.1.205","172.30.1.104","TCP","54","40222 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51391","24.969696","172.30.1.205","172.30.1.104","TCP","74","47588 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928196 TSecr=0 WS=128" "51392","24.970037","172.30.1.104","172.30.1.205","TCP","66","135 > 47588 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51393","24.970049","172.30.1.205","172.30.1.104","TCP","54","47588 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51394","24.970411","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51395","24.970694","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51396","24.970703","172.30.1.205","172.30.1.104","TCP","54","47588 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51397","24.972957","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51398","24.973347","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51399","24.973353","172.30.1.205","172.30.1.104","TCP","54","47588 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51400","24.975169","172.30.1.205","172.30.1.104","TCP","54","47588 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51401","24.975282","172.30.1.205","172.30.1.104","TCP","74","40226 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928201 TSecr=0 WS=128" "51402","24.975442","172.30.1.104","172.30.1.205","TCP","54","135 > 47588 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51403","24.975452","172.30.1.104","172.30.1.205","TCP","54","135 > 47588 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51404","24.975458","172.30.1.205","172.30.1.104","TCP","54","47588 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51405","24.975555","172.30.1.104","172.30.1.205","TCP","66","49671 > 40226 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51406","24.975564","172.30.1.205","172.30.1.104","TCP","54","40226 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51407","24.975929","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51408","24.976213","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51409","24.976225","172.30.1.205","172.30.1.104","TCP","54","40226 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51410","24.978180","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51411","24.978606","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51412","24.978613","172.30.1.205","172.30.1.104","TCP","54","40226 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51413","24.979976","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51414","24.983885","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51415","24.983894","172.30.1.205","172.30.1.104","TCP","54","40226 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51416","24.984871","172.30.1.205","172.30.1.104","TCP","74","47592 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928211 TSecr=0 WS=128" "51417","24.985258","172.30.1.104","172.30.1.205","TCP","66","135 > 47592 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51418","24.985270","172.30.1.205","172.30.1.104","TCP","54","47592 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51419","24.985629","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51420","24.985944","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51421","24.985954","172.30.1.205","172.30.1.104","TCP","54","47592 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51422","24.988170","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51423","24.988625","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51424","24.988632","172.30.1.205","172.30.1.104","TCP","54","47592 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51425","24.990487","172.30.1.205","172.30.1.104","TCP","54","47592 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51426","24.990599","172.30.1.205","172.30.1.104","TCP","74","40230 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928217 TSecr=0 WS=128" "51427","24.990770","172.30.1.104","172.30.1.205","TCP","54","135 > 47592 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51428","24.990829","172.30.1.104","172.30.1.205","TCP","54","135 > 47592 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51429","24.990834","172.30.1.205","172.30.1.104","TCP","54","47592 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51430","24.990925","172.30.1.104","172.30.1.205","TCP","66","49671 > 40230 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51431","24.990933","172.30.1.205","172.30.1.104","TCP","54","40230 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51432","24.991283","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51433","24.992510","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51434","24.992517","172.30.1.205","172.30.1.104","TCP","54","40230 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51435","24.994408","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51436","24.994798","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51437","24.994804","172.30.1.205","172.30.1.104","TCP","54","40230 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51438","24.996150","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51439","25.000120","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51440","25.000142","172.30.1.205","172.30.1.104","TCP","54","40230 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51441","25.001268","172.30.1.205","172.30.1.104","TCP","74","47596 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928227 TSecr=0 WS=128" "51442","25.001670","172.30.1.104","172.30.1.205","TCP","66","135 > 47596 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51443","25.001681","172.30.1.205","172.30.1.104","TCP","54","47596 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51444","25.002035","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51445","25.002378","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51446","25.002396","172.30.1.205","172.30.1.104","TCP","54","47596 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51447","25.004587","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51448","25.007790","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51449","25.007796","172.30.1.205","172.30.1.104","TCP","54","47596 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51450","25.009658","172.30.1.205","172.30.1.104","TCP","54","47596 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51451","25.009773","172.30.1.205","172.30.1.104","TCP","74","40234 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928236 TSecr=0 WS=128" "51452","25.009954","172.30.1.104","172.30.1.205","TCP","54","135 > 47596 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51453","25.010023","172.30.1.104","172.30.1.205","TCP","54","135 > 47596 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51454","25.010034","172.30.1.205","172.30.1.104","TCP","54","47596 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51455","25.010052","172.30.1.104","172.30.1.205","TCP","66","49671 > 40234 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51456","25.010064","172.30.1.205","172.30.1.104","TCP","54","40234 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51457","25.010469","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51458","25.010850","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51459","25.010864","172.30.1.205","172.30.1.104","TCP","54","40234 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51460","25.012878","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51461","25.013272","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51462","25.013279","172.30.1.205","172.30.1.104","TCP","54","40234 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51463","25.014656","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51464","25.018563","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51465","25.018576","172.30.1.205","172.30.1.104","TCP","54","40234 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51466","25.019644","172.30.1.205","172.30.1.104","TCP","74","47600 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928246 TSecr=0 WS=128" "51467","25.020030","172.30.1.104","172.30.1.205","TCP","66","135 > 47600 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51468","25.020044","172.30.1.205","172.30.1.104","TCP","54","47600 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51469","25.020426","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51470","25.020736","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51471","25.020747","172.30.1.205","172.30.1.104","TCP","54","47600 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51472","25.023036","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51473","25.023515","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51474","25.023523","172.30.1.205","172.30.1.104","TCP","54","47600 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51475","25.025389","172.30.1.205","172.30.1.104","TCP","54","47600 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51476","25.025530","172.30.1.205","172.30.1.104","TCP","74","40238 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928251 TSecr=0 WS=128" "51477","25.025722","172.30.1.104","172.30.1.205","TCP","54","135 > 47600 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51478","25.025733","172.30.1.104","172.30.1.205","TCP","54","135 > 47600 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51479","25.025741","172.30.1.205","172.30.1.104","TCP","54","47600 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51480","25.025818","172.30.1.104","172.30.1.205","TCP","66","49671 > 40238 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51481","25.025827","172.30.1.205","172.30.1.104","TCP","54","40238 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51482","25.026180","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51483","25.026493","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51484","25.026502","172.30.1.205","172.30.1.104","TCP","54","40238 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51485","25.028401","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51486","25.028840","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51487","25.028847","172.30.1.205","172.30.1.104","TCP","54","40238 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51488","25.030218","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51489","25.034184","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51490","25.034195","172.30.1.205","172.30.1.104","TCP","54","40238 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51491","25.035221","172.30.1.205","172.30.1.104","TCP","74","47604 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928261 TSecr=0 WS=128" "51492","25.035567","172.30.1.104","172.30.1.205","TCP","66","135 > 47604 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51493","25.035580","172.30.1.205","172.30.1.104","TCP","54","47604 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51494","25.035940","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51495","25.036266","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51496","25.036277","172.30.1.205","172.30.1.104","TCP","54","47604 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51497","25.038554","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51498","25.039015","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51499","25.039022","172.30.1.205","172.30.1.104","TCP","54","47604 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51500","25.040866","172.30.1.205","172.30.1.104","TCP","54","47604 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51501","25.040991","172.30.1.205","172.30.1.104","TCP","74","40242 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928267 TSecr=0 WS=128" "51502","25.041174","172.30.1.104","172.30.1.205","TCP","54","135 > 47604 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51503","25.041205","172.30.1.104","172.30.1.205","TCP","54","135 > 47604 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51504","25.041213","172.30.1.205","172.30.1.104","TCP","54","47604 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51505","25.041378","172.30.1.104","172.30.1.205","TCP","66","49671 > 40242 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51506","25.041387","172.30.1.205","172.30.1.104","TCP","54","40242 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51507","25.041738","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51508","25.042069","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51509","25.042080","172.30.1.205","172.30.1.104","TCP","54","40242 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51510","25.043999","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51511","25.044792","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51512","25.044799","172.30.1.205","172.30.1.104","TCP","54","40242 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51513","25.046174","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51514","25.050089","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51515","25.050101","172.30.1.205","172.30.1.104","TCP","54","40242 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51516","25.051118","172.30.1.205","172.30.1.104","TCP","74","47608 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928277 TSecr=0 WS=128" "51517","25.051450","172.30.1.104","172.30.1.205","TCP","66","135 > 47608 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51518","25.051462","172.30.1.205","172.30.1.104","TCP","54","47608 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51519","25.051814","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51520","25.052126","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51521","25.052135","172.30.1.205","172.30.1.104","TCP","54","47608 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51522","25.054371","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51523","25.054794","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51524","25.054801","172.30.1.205","172.30.1.104","TCP","54","47608 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51525","25.055660","172.30.1.205","172.30.1.104","TCP","54","40202 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51526","25.055712","172.30.1.205","172.30.1.104","TCP","54","40206 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51527","25.055749","172.30.1.205","172.30.1.104","TCP","54","40210 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51528","25.055782","172.30.1.205","172.30.1.104","TCP","54","40214 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51529","25.055815","172.30.1.205","172.30.1.104","TCP","54","40218 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51530","25.055843","172.30.1.205","172.30.1.104","TCP","54","40222 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51531","25.055875","172.30.1.205","172.30.1.104","TCP","54","40226 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51532","25.055901","172.30.1.205","172.30.1.104","TCP","54","40230 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51533","25.055923","172.30.1.205","172.30.1.104","TCP","54","40234 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51534","25.055949","172.30.1.104","172.30.1.205","TCP","54","49671 > 40202 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51535","25.055965","172.30.1.104","172.30.1.205","TCP","54","49671 > 40206 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51536","25.055970","172.30.1.205","172.30.1.104","TCP","54","40238 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51537","25.056002","172.30.1.205","172.30.1.104","TCP","54","40242 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51538","25.056076","172.30.1.205","172.30.1.104","TCP","54","40198 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51539","25.056086","172.30.1.104","172.30.1.205","TCP","54","49671 > 40210 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51540","25.056109","172.30.1.104","172.30.1.205","TCP","54","49671 > 40210 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51541","25.056117","172.30.1.205","172.30.1.104","TCP","54","40210 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51542","25.056130","172.30.1.104","172.30.1.205","TCP","54","49671 > 40202 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51543","25.056133","172.30.1.205","172.30.1.104","TCP","54","40202 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51544","25.056151","172.30.1.104","172.30.1.205","TCP","54","49671 > 40214 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51545","25.056171","172.30.1.104","172.30.1.205","TCP","54","49671 > 40218 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51546","25.056192","172.30.1.104","172.30.1.205","TCP","54","49671 > 40218 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51547","25.056196","172.30.1.205","172.30.1.104","TCP","54","40218 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51548","25.056214","172.30.1.104","172.30.1.205","TCP","54","49671 > 40222 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51549","25.056338","172.30.1.104","172.30.1.205","TCP","54","49671 > 40222 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51550","25.056344","172.30.1.205","172.30.1.104","TCP","54","40222 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51551","25.056359","172.30.1.104","172.30.1.205","TCP","54","49671 > 40226 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51552","25.056383","172.30.1.104","172.30.1.205","TCP","54","49671 > 40226 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51553","25.056387","172.30.1.205","172.30.1.104","TCP","54","40226 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51554","25.056449","172.30.1.104","172.30.1.205","TCP","54","49671 > 40206 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51555","25.056453","172.30.1.205","172.30.1.104","TCP","54","40206 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51556","25.056459","172.30.1.104","172.30.1.205","TCP","54","49671 > 40214 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51557","25.056460","172.30.1.205","172.30.1.104","TCP","54","40214 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51558","25.056491","172.30.1.104","172.30.1.205","TCP","54","49671 > 40230 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51559","25.056510","172.30.1.104","172.30.1.205","TCP","54","49671 > 40234 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51560","25.056531","172.30.1.104","172.30.1.205","TCP","54","49671 > 40238 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51561","25.056732","172.30.1.104","172.30.1.205","TCP","54","49671 > 40230 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51562","25.056738","172.30.1.205","172.30.1.104","TCP","54","40230 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51563","25.056788","172.30.1.104","172.30.1.205","TCP","54","49671 > 40242 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51564","25.056802","172.30.1.104","172.30.1.205","TCP","54","49671 > 40242 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51565","25.056806","172.30.1.205","172.30.1.104","TCP","54","40242 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51566","25.056822","172.30.1.104","172.30.1.205","TCP","54","49671 > 40234 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51567","25.056825","172.30.1.205","172.30.1.104","TCP","54","40234 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51568","25.056849","172.30.1.104","172.30.1.205","TCP","54","49671 > 40238 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51569","25.056852","172.30.1.205","172.30.1.104","TCP","54","40238 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51570","25.056870","172.30.1.104","172.30.1.205","TCP","54","49671 > 40198 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51571","25.056891","172.30.1.104","172.30.1.205","TCP","54","49671 > 40198 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51572","25.056895","172.30.1.205","172.30.1.104","TCP","54","40198 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51573","25.057668","172.30.1.205","172.30.1.104","TCP","54","47608 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51574","25.057791","172.30.1.205","172.30.1.104","TCP","74","40246 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928284 TSecr=0 WS=128" "51575","25.057914","172.30.1.104","172.30.1.205","TCP","54","135 > 47608 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51576","25.057934","172.30.1.104","172.30.1.205","TCP","54","135 > 47608 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51577","25.057938","172.30.1.205","172.30.1.104","TCP","54","47608 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51578","25.058070","172.30.1.104","172.30.1.205","TCP","66","49671 > 40246 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51579","25.058078","172.30.1.205","172.30.1.104","TCP","54","40246 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51580","25.058428","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51581","25.058735","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51582","25.058744","172.30.1.205","172.30.1.104","TCP","54","40246 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51583","25.060619","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51584","25.060979","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51585","25.060986","172.30.1.205","172.30.1.104","TCP","54","40246 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51586","25.062356","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51587","25.066192","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51588","25.066201","172.30.1.205","172.30.1.104","TCP","54","40246 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51589","25.067178","172.30.1.205","172.30.1.104","TCP","74","47612 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928293 TSecr=0 WS=128" "51590","25.067472","172.30.1.104","172.30.1.205","TCP","66","135 > 47612 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51591","25.067482","172.30.1.205","172.30.1.104","TCP","54","47612 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51592","25.067836","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51593","25.068135","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51594","25.068143","172.30.1.205","172.30.1.104","TCP","54","47612 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51595","25.070359","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51596","25.070714","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51597","25.070721","172.30.1.205","172.30.1.104","TCP","54","47612 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51598","25.072532","172.30.1.205","172.30.1.104","TCP","54","47612 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51599","25.072647","172.30.1.205","172.30.1.104","TCP","74","40250 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928299 TSecr=0 WS=128" "51600","25.072802","172.30.1.104","172.30.1.205","TCP","54","135 > 47612 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51601","25.072812","172.30.1.104","172.30.1.205","TCP","54","135 > 47612 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51602","25.072818","172.30.1.205","172.30.1.104","TCP","54","47612 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51603","25.072937","172.30.1.104","172.30.1.205","TCP","66","49671 > 40250 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51604","25.072946","172.30.1.205","172.30.1.104","TCP","54","40250 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51605","25.073296","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51606","25.073599","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51607","25.073608","172.30.1.205","172.30.1.104","TCP","54","40250 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51608","25.075489","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51609","25.075848","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51610","25.075854","172.30.1.205","172.30.1.104","TCP","54","40250 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51611","25.077236","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51612","25.080945","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51613","25.080954","172.30.1.205","172.30.1.104","TCP","54","40250 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51614","25.081924","172.30.1.205","172.30.1.104","TCP","74","47616 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928308 TSecr=0 WS=128" "51615","25.082251","172.30.1.104","172.30.1.205","TCP","66","135 > 47616 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51616","25.082262","172.30.1.205","172.30.1.104","TCP","54","47616 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51617","25.082617","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51618","25.082925","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51619","25.082934","172.30.1.205","172.30.1.104","TCP","54","47616 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51620","25.085160","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51621","25.085585","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51622","25.085591","172.30.1.205","172.30.1.104","TCP","54","47616 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51623","25.087411","172.30.1.205","172.30.1.104","TCP","54","47616 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51624","25.087532","172.30.1.205","172.30.1.104","TCP","74","40254 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928313 TSecr=0 WS=128" "51625","25.087705","172.30.1.104","172.30.1.205","TCP","54","135 > 47616 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51626","25.087751","172.30.1.104","172.30.1.205","TCP","54","135 > 47616 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51627","25.087758","172.30.1.205","172.30.1.104","TCP","54","47616 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51628","25.087832","172.30.1.104","172.30.1.205","TCP","66","49671 > 40254 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51629","25.087841","172.30.1.205","172.30.1.104","TCP","54","40254 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51630","25.088185","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51631","25.088464","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51632","25.088473","172.30.1.205","172.30.1.104","TCP","54","40254 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51633","25.090388","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51634","25.090761","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51635","25.090767","172.30.1.205","172.30.1.104","TCP","54","40254 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51636","25.092119","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51637","25.095965","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51638","25.095976","172.30.1.205","172.30.1.104","TCP","54","40254 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51639","25.096989","172.30.1.205","172.30.1.104","TCP","74","47620 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928323 TSecr=0 WS=128" "51640","25.097324","172.30.1.104","172.30.1.205","TCP","66","135 > 47620 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51641","25.097336","172.30.1.205","172.30.1.104","TCP","54","47620 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51642","25.097703","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51643","25.097993","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51644","25.098002","172.30.1.205","172.30.1.104","TCP","54","47620 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51645","25.100214","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51646","25.100665","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51647","25.100672","172.30.1.205","172.30.1.104","TCP","54","47620 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51648","25.102528","172.30.1.205","172.30.1.104","TCP","54","47620 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51649","25.102647","172.30.1.205","172.30.1.104","TCP","74","40258 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928329 TSecr=0 WS=128" "51650","25.102811","172.30.1.104","172.30.1.205","TCP","54","135 > 47620 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51651","25.102837","172.30.1.104","172.30.1.205","TCP","54","135 > 47620 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51652","25.102844","172.30.1.205","172.30.1.104","TCP","54","47620 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51653","25.102949","172.30.1.104","172.30.1.205","TCP","66","49671 > 40258 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51654","25.102957","172.30.1.205","172.30.1.104","TCP","54","40258 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51655","25.103305","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51656","25.103577","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51657","25.103584","172.30.1.205","172.30.1.104","TCP","54","40258 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51658","25.105490","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51659","25.105857","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51660","25.105864","172.30.1.205","172.30.1.104","TCP","54","40258 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51661","25.107216","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51662","25.111070","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51663","25.111081","172.30.1.205","172.30.1.104","TCP","54","40258 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51664","25.112078","172.30.1.205","172.30.1.104","TCP","74","47624 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928338 TSecr=0 WS=128" "51665","25.112374","172.30.1.104","172.30.1.205","TCP","66","135 > 47624 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51666","25.112385","172.30.1.205","172.30.1.104","TCP","54","47624 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51667","25.112734","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51668","25.113005","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51669","25.113014","172.30.1.205","172.30.1.104","TCP","54","47624 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51670","25.115227","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51671","25.115625","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51672","25.115632","172.30.1.205","172.30.1.104","TCP","54","47624 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51673","25.117472","172.30.1.205","172.30.1.104","TCP","54","47624 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51674","25.117584","172.30.1.205","172.30.1.104","TCP","74","40262 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928344 TSecr=0 WS=128" "51675","25.117741","172.30.1.104","172.30.1.205","TCP","54","135 > 47624 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51676","25.117827","172.30.1.104","172.30.1.205","TCP","54","135 > 47624 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51677","25.117834","172.30.1.205","172.30.1.104","TCP","54","47624 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51678","25.117916","172.30.1.104","172.30.1.205","TCP","66","49671 > 40262 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51679","25.117924","172.30.1.205","172.30.1.104","TCP","54","40262 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51680","25.118265","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51681","25.118551","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51682","25.118560","172.30.1.205","172.30.1.104","TCP","54","40262 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51683","25.120445","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51684","25.120835","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51685","25.120842","172.30.1.205","172.30.1.104","TCP","54","40262 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51686","25.122207","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51687","25.126200","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51688","25.126209","172.30.1.205","172.30.1.104","TCP","54","40262 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51689","25.127172","172.30.1.205","172.30.1.104","TCP","74","47628 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928353 TSecr=0 WS=128" "51690","25.127547","172.30.1.104","172.30.1.205","TCP","66","135 > 47628 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51691","25.127559","172.30.1.205","172.30.1.104","TCP","54","47628 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51692","25.127911","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51693","25.128225","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51694","25.128234","172.30.1.205","172.30.1.104","TCP","54","47628 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51695","25.130494","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51696","25.130943","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51697","25.130950","172.30.1.205","172.30.1.104","TCP","54","47628 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51698","25.132791","172.30.1.205","172.30.1.104","TCP","54","47628 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51699","25.132915","172.30.1.205","172.30.1.104","TCP","74","40266 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928359 TSecr=0 WS=128" "51700","25.133146","172.30.1.104","172.30.1.205","TCP","54","135 > 47628 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51701","25.133157","172.30.1.104","172.30.1.205","TCP","54","135 > 47628 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51702","25.133163","172.30.1.205","172.30.1.104","TCP","54","47628 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51703","25.133287","172.30.1.104","172.30.1.205","TCP","66","49671 > 40266 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51704","25.133295","172.30.1.205","172.30.1.104","TCP","54","40266 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51705","25.133648","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51706","25.133973","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51707","25.133983","172.30.1.205","172.30.1.104","TCP","54","40266 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51708","25.135877","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51709","25.136265","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51710","25.136271","172.30.1.205","172.30.1.104","TCP","54","40266 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51711","25.137664","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51712","25.141549","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51713","25.141558","172.30.1.205","172.30.1.104","TCP","54","40266 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51714","25.142532","172.30.1.205","172.30.1.104","TCP","74","47632 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928368 TSecr=0 WS=128" "51715","25.142838","172.30.1.104","172.30.1.205","TCP","66","135 > 47632 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51716","25.142849","172.30.1.205","172.30.1.104","TCP","54","47632 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51717","25.143200","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51718","25.143494","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51719","25.143503","172.30.1.205","172.30.1.104","TCP","54","47632 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51720","25.145722","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51721","25.146177","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51722","25.146184","172.30.1.205","172.30.1.104","TCP","54","47632 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51723","25.147993","172.30.1.205","172.30.1.104","TCP","54","47632 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51724","25.148106","172.30.1.205","172.30.1.104","TCP","74","40270 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928374 TSecr=0 WS=128" "51725","25.148259","172.30.1.104","172.30.1.205","TCP","54","135 > 47632 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51726","25.148283","172.30.1.104","172.30.1.205","TCP","54","135 > 47632 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51727","25.148289","172.30.1.205","172.30.1.104","TCP","54","47632 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51728","25.148392","172.30.1.104","172.30.1.205","TCP","66","49671 > 40270 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51729","25.148401","172.30.1.205","172.30.1.104","TCP","54","40270 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51730","25.148765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51731","25.149058","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51732","25.149066","172.30.1.205","172.30.1.104","TCP","54","40270 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51733","25.150926","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51734","25.151308","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51735","25.151315","172.30.1.205","172.30.1.104","TCP","54","40270 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51736","25.152662","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51737","25.156553","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51738","25.156562","172.30.1.205","172.30.1.104","TCP","54","40270 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51739","25.157529","172.30.1.205","172.30.1.104","TCP","74","47636 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928383 TSecr=0 WS=128" "51740","25.157862","172.30.1.104","172.30.1.205","TCP","66","135 > 47636 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51741","25.157874","172.30.1.205","172.30.1.104","TCP","54","47636 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51742","25.158230","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51743","25.158523","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51744","25.158532","172.30.1.205","172.30.1.104","TCP","54","47636 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51745","25.160712","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51746","25.161177","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51747","25.161184","172.30.1.205","172.30.1.104","TCP","54","47636 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51748","25.162982","172.30.1.205","172.30.1.104","TCP","54","47636 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51749","25.163095","172.30.1.205","172.30.1.104","TCP","74","40274 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928389 TSecr=0 WS=128" "51750","25.163284","172.30.1.104","172.30.1.205","TCP","54","135 > 47636 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51751","25.163300","172.30.1.104","172.30.1.205","TCP","54","135 > 47636 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51752","25.163305","172.30.1.205","172.30.1.104","TCP","54","47636 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51753","25.163379","172.30.1.104","172.30.1.205","TCP","66","49671 > 40274 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51754","25.163388","172.30.1.205","172.30.1.104","TCP","54","40274 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51755","25.163731","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51756","25.165247","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51757","25.165265","172.30.1.205","172.30.1.104","TCP","54","40274 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51758","25.167317","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51759","25.167708","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51760","25.167717","172.30.1.205","172.30.1.104","TCP","54","40274 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51761","25.169379","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51762","25.173267","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51763","25.173277","172.30.1.205","172.30.1.104","TCP","54","40274 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51764","25.174240","172.30.1.205","172.30.1.104","TCP","74","47640 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928400 TSecr=0 WS=128" "51765","25.174577","172.30.1.104","172.30.1.205","TCP","66","135 > 47640 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51766","25.174588","172.30.1.205","172.30.1.104","TCP","54","47640 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51767","25.174937","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51768","25.175239","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51769","25.175248","172.30.1.205","172.30.1.104","TCP","54","47640 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51770","25.177441","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51771","25.177847","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51772","25.177854","172.30.1.205","172.30.1.104","TCP","54","47640 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51773","25.179656","172.30.1.205","172.30.1.104","TCP","54","47640 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51774","25.179767","172.30.1.205","172.30.1.104","TCP","74","40278 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928406 TSecr=0 WS=128" "51775","25.179946","172.30.1.104","172.30.1.205","TCP","54","135 > 47640 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51776","25.179992","172.30.1.104","172.30.1.205","TCP","54","135 > 47640 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51777","25.179999","172.30.1.205","172.30.1.104","TCP","54","47640 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51778","25.180105","172.30.1.104","172.30.1.205","TCP","66","49671 > 40278 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51779","25.180114","172.30.1.205","172.30.1.104","TCP","54","40278 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51780","25.180462","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51781","25.181212","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51782","25.181222","172.30.1.205","172.30.1.104","TCP","54","40278 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51783","25.183107","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51784","25.183509","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51785","25.183516","172.30.1.205","172.30.1.104","TCP","54","40278 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51786","25.184881","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51787","25.188787","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51788","25.188798","172.30.1.205","172.30.1.104","TCP","54","40278 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51789","25.189794","172.30.1.205","172.30.1.104","TCP","74","47644 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928416 TSecr=0 WS=128" "51790","25.190228","172.30.1.104","172.30.1.205","TCP","66","135 > 47644 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51791","25.190240","172.30.1.205","172.30.1.104","TCP","54","47644 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51792","25.190599","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51793","25.190896","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51794","25.190905","172.30.1.205","172.30.1.104","TCP","54","47644 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51795","25.193124","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51796","25.193560","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51797","25.193566","172.30.1.205","172.30.1.104","TCP","54","47644 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51798","25.195385","172.30.1.205","172.30.1.104","TCP","54","47644 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51799","25.195509","172.30.1.205","172.30.1.104","TCP","74","40282 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928421 TSecr=0 WS=128" "51800","25.195706","172.30.1.104","172.30.1.205","TCP","54","135 > 47644 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51801","25.195719","172.30.1.104","172.30.1.205","TCP","54","135 > 47644 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51802","25.195726","172.30.1.205","172.30.1.104","TCP","54","47644 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51803","25.195827","172.30.1.104","172.30.1.205","TCP","66","49671 > 40282 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51804","25.195836","172.30.1.205","172.30.1.104","TCP","54","40282 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51805","25.196186","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51806","25.196554","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51807","25.196562","172.30.1.205","172.30.1.104","TCP","54","40282 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51808","25.198479","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51809","25.198870","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51810","25.198879","172.30.1.205","172.30.1.104","TCP","54","40282 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51811","25.200302","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51812","25.203976","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51813","25.203988","172.30.1.205","172.30.1.104","TCP","54","40282 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51814","25.204993","172.30.1.205","172.30.1.104","TCP","74","47648 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928431 TSecr=0 WS=128" "51815","25.205317","172.30.1.104","172.30.1.205","TCP","66","135 > 47648 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51816","25.205329","172.30.1.205","172.30.1.104","TCP","54","47648 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51817","25.205699","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51818","25.205961","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51819","25.205971","172.30.1.205","172.30.1.104","TCP","54","47648 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51820","25.208171","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51821","25.208545","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51822","25.208552","172.30.1.205","172.30.1.104","TCP","54","47648 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51823","25.210399","172.30.1.205","172.30.1.104","TCP","54","47648 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51824","25.210514","172.30.1.205","172.30.1.104","TCP","74","40286 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928436 TSecr=0 WS=128" "51825","25.210647","172.30.1.104","172.30.1.205","TCP","54","135 > 47648 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51826","25.210659","172.30.1.104","172.30.1.205","TCP","54","135 > 47648 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51827","25.210666","172.30.1.205","172.30.1.104","TCP","54","47648 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51828","25.210785","172.30.1.104","172.30.1.205","TCP","66","49671 > 40286 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51829","25.210794","172.30.1.205","172.30.1.104","TCP","54","40286 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51830","25.211172","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51831","25.211482","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51832","25.211491","172.30.1.205","172.30.1.104","TCP","54","40286 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51833","25.213411","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51834","25.213750","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51835","25.213757","172.30.1.205","172.30.1.104","TCP","54","40286 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51836","25.215107","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51837","25.218904","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51838","25.218913","172.30.1.205","172.30.1.104","TCP","54","40286 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51839","25.219885","172.30.1.205","172.30.1.104","TCP","74","47652 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928446 TSecr=0 WS=128" "51840","25.220211","172.30.1.104","172.30.1.205","TCP","66","135 > 47652 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51841","25.220227","172.30.1.205","172.30.1.104","TCP","54","47652 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51842","25.220628","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51843","25.220926","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51844","25.220935","172.30.1.205","172.30.1.104","TCP","54","47652 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51845","25.223188","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51846","25.223609","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51847","25.223616","172.30.1.205","172.30.1.104","TCP","54","47652 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51848","25.225474","172.30.1.205","172.30.1.104","TCP","54","47652 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51849","25.225594","172.30.1.205","172.30.1.104","TCP","74","40290 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928452 TSecr=0 WS=128" "51850","25.225759","172.30.1.104","172.30.1.205","TCP","54","135 > 47652 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51851","25.225804","172.30.1.104","172.30.1.205","TCP","54","135 > 47652 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51852","25.225811","172.30.1.205","172.30.1.104","TCP","54","47652 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51853","25.225911","172.30.1.104","172.30.1.205","TCP","66","49671 > 40290 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51854","25.225919","172.30.1.205","172.30.1.104","TCP","54","40290 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51855","25.226266","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51856","25.227472","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51857","25.227481","172.30.1.205","172.30.1.104","TCP","54","40290 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51858","25.229408","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51859","25.229859","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51860","25.229866","172.30.1.205","172.30.1.104","TCP","54","40290 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51861","25.231234","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51862","25.235198","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51863","25.235208","172.30.1.205","172.30.1.104","TCP","54","40290 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51864","25.236210","172.30.1.205","172.30.1.104","TCP","74","47656 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928462 TSecr=0 WS=128" "51865","25.236576","172.30.1.104","172.30.1.205","TCP","66","135 > 47656 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51866","25.236587","172.30.1.205","172.30.1.104","TCP","54","47656 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51867","25.236997","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51868","25.237298","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51869","25.237307","172.30.1.205","172.30.1.104","TCP","54","47656 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51870","25.239515","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51871","25.239953","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51872","25.239960","172.30.1.205","172.30.1.104","TCP","54","47656 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51873","25.240831","172.30.1.205","172.30.1.104","TCP","54","40250 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51874","25.240879","172.30.1.205","172.30.1.104","TCP","54","40254 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51875","25.240922","172.30.1.205","172.30.1.104","TCP","54","40258 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51876","25.240957","172.30.1.205","172.30.1.104","TCP","54","40262 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51877","25.240990","172.30.1.205","172.30.1.104","TCP","54","40266 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51878","25.241022","172.30.1.205","172.30.1.104","TCP","54","40270 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51879","25.241051","172.30.1.205","172.30.1.104","TCP","54","40274 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51880","25.241079","172.30.1.205","172.30.1.104","TCP","54","40278 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51881","25.241106","172.30.1.205","172.30.1.104","TCP","54","40282 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51882","25.241132","172.30.1.205","172.30.1.104","TCP","54","40286 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51883","25.241158","172.30.1.205","172.30.1.104","TCP","54","40290 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51884","25.241189","172.30.1.104","172.30.1.205","TCP","54","49671 > 40250 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51885","25.241209","172.30.1.104","172.30.1.205","TCP","54","49671 > 40254 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51886","25.241232","172.30.1.104","172.30.1.205","TCP","54","49671 > 40258 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51887","25.241253","172.30.1.104","172.30.1.205","TCP","54","49671 > 40250 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51888","25.241260","172.30.1.205","172.30.1.104","TCP","54","40250 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51889","25.241271","172.30.1.104","172.30.1.205","TCP","54","49671 > 40262 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51890","25.241301","172.30.1.205","172.30.1.104","TCP","54","40246 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "51891","25.241507","172.30.1.104","172.30.1.205","TCP","54","49671 > 40266 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51892","25.241532","172.30.1.104","172.30.1.205","TCP","54","49671 > 40266 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51893","25.241538","172.30.1.205","172.30.1.104","TCP","54","40266 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51894","25.241555","172.30.1.104","172.30.1.205","TCP","54","49671 > 40262 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51895","25.241557","172.30.1.205","172.30.1.104","TCP","54","40262 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51896","25.241577","172.30.1.104","172.30.1.205","TCP","54","49671 > 40254 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51897","25.241580","172.30.1.205","172.30.1.104","TCP","54","40254 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51898","25.241598","172.30.1.104","172.30.1.205","TCP","54","49671 > 40258 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51899","25.241601","172.30.1.205","172.30.1.104","TCP","54","40258 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51900","25.241618","172.30.1.104","172.30.1.205","TCP","54","49671 > 40270 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51901","25.241640","172.30.1.104","172.30.1.205","TCP","54","49671 > 40274 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51902","25.241660","172.30.1.104","172.30.1.205","TCP","54","49671 > 40270 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51903","25.241664","172.30.1.205","172.30.1.104","TCP","54","40270 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51904","25.241681","172.30.1.104","172.30.1.205","TCP","54","49671 > 40278 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51905","25.241700","172.30.1.104","172.30.1.205","TCP","54","49671 > 40282 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51906","25.241721","172.30.1.104","172.30.1.205","TCP","54","49671 > 40274 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51907","25.241725","172.30.1.205","172.30.1.104","TCP","54","40274 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51908","25.241741","172.30.1.104","172.30.1.205","TCP","54","49671 > 40286 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51909","25.241763","172.30.1.104","172.30.1.205","TCP","54","49671 > 40286 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51910","25.241767","172.30.1.205","172.30.1.104","TCP","54","40286 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51911","25.241917","172.30.1.104","172.30.1.205","TCP","54","49671 > 40290 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51912","25.241940","172.30.1.104","172.30.1.205","TCP","54","49671 > 40290 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51913","25.241944","172.30.1.205","172.30.1.104","TCP","54","40290 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51914","25.241959","172.30.1.104","172.30.1.205","TCP","54","49671 > 40278 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51915","25.241962","172.30.1.205","172.30.1.104","TCP","54","40278 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51916","25.241979","172.30.1.104","172.30.1.205","TCP","54","49671 > 40282 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51917","25.241981","172.30.1.205","172.30.1.104","TCP","54","40282 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51918","25.242099","172.30.1.104","172.30.1.205","TCP","54","49671 > 40246 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51919","25.242128","172.30.1.104","172.30.1.205","TCP","54","49671 > 40246 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "51920","25.242132","172.30.1.205","172.30.1.104","TCP","54","40246 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "51921","25.242832","172.30.1.205","172.30.1.104","TCP","54","47656 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51922","25.242956","172.30.1.205","172.30.1.104","TCP","74","40294 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928469 TSecr=0 WS=128" "51923","25.243129","172.30.1.104","172.30.1.205","TCP","54","135 > 47656 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51924","25.243183","172.30.1.104","172.30.1.205","TCP","54","135 > 47656 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51925","25.243188","172.30.1.205","172.30.1.104","TCP","54","47656 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51926","25.243262","172.30.1.104","172.30.1.205","TCP","66","49671 > 40294 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51927","25.243269","172.30.1.205","172.30.1.104","TCP","54","40294 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51928","25.243625","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51929","25.243909","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51930","25.243916","172.30.1.205","172.30.1.104","TCP","54","40294 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51931","25.245833","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51932","25.246258","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51933","25.246265","172.30.1.205","172.30.1.104","TCP","54","40294 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51934","25.247632","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51935","25.253563","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51936","25.253574","172.30.1.205","172.30.1.104","TCP","54","40294 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51937","25.254537","172.30.1.205","172.30.1.104","TCP","74","47660 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928480 TSecr=0 WS=128" "51938","25.254905","172.30.1.104","172.30.1.205","TCP","66","135 > 47660 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51939","25.254915","172.30.1.205","172.30.1.104","TCP","54","47660 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51940","25.255269","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51941","25.255650","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51942","25.255660","172.30.1.205","172.30.1.104","TCP","54","47660 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51943","25.257857","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51944","25.258454","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51945","25.258466","172.30.1.205","172.30.1.104","TCP","54","47660 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51946","25.260563","172.30.1.205","172.30.1.104","TCP","54","47660 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51947","25.260683","172.30.1.205","172.30.1.104","TCP","74","40298 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928487 TSecr=0 WS=128" "51948","25.260877","172.30.1.104","172.30.1.205","TCP","54","135 > 47660 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51949","25.260914","172.30.1.104","172.30.1.205","TCP","54","135 > 47660 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51950","25.260920","172.30.1.205","172.30.1.104","TCP","54","47660 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51951","25.261075","172.30.1.104","172.30.1.205","TCP","66","49671 > 40298 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51952","25.261083","172.30.1.205","172.30.1.104","TCP","54","40298 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51953","25.261448","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51954","25.261757","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51955","25.261768","172.30.1.205","172.30.1.104","TCP","54","40298 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51956","25.263698","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51957","25.264074","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51958","25.264080","172.30.1.205","172.30.1.104","TCP","54","40298 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51959","25.265458","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51960","25.269306","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51961","25.269317","172.30.1.205","172.30.1.104","TCP","54","40298 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51962","25.270277","172.30.1.205","172.30.1.104","TCP","74","47664 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928496 TSecr=0 WS=128" "51963","25.270623","172.30.1.104","172.30.1.205","TCP","66","135 > 47664 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51964","25.270634","172.30.1.205","172.30.1.104","TCP","54","47664 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51965","25.271022","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51966","25.271312","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51967","25.271321","172.30.1.205","172.30.1.104","TCP","54","47664 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51968","25.273535","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51969","25.273927","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51970","25.273933","172.30.1.205","172.30.1.104","TCP","54","47664 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51971","25.275761","172.30.1.205","172.30.1.104","TCP","54","47664 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51972","25.275872","172.30.1.205","172.30.1.104","TCP","74","40302 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928502 TSecr=0 WS=128" "51973","25.276086","172.30.1.104","172.30.1.205","TCP","54","135 > 47664 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51974","25.276097","172.30.1.104","172.30.1.205","TCP","54","135 > 47664 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51975","25.276102","172.30.1.205","172.30.1.104","TCP","54","47664 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "51976","25.276146","172.30.1.104","172.30.1.205","TCP","66","49671 > 40302 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51977","25.276154","172.30.1.205","172.30.1.104","TCP","54","40302 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51978","25.276506","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "51979","25.276771","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51980","25.276788","172.30.1.205","172.30.1.104","TCP","54","40302 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51981","25.278659","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "51982","25.279022","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "51983","25.279029","172.30.1.205","172.30.1.104","TCP","54","40302 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "51984","25.280403","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "51985","25.284235","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "51986","25.284245","172.30.1.205","172.30.1.104","TCP","54","40302 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "51987","25.285224","172.30.1.205","172.30.1.104","TCP","74","47668 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928511 TSecr=0 WS=128" "51988","25.285544","172.30.1.104","172.30.1.205","TCP","66","135 > 47668 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "51989","25.285554","172.30.1.205","172.30.1.104","TCP","54","47668 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "51990","25.285909","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "51991","25.286197","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "51992","25.286207","172.30.1.205","172.30.1.104","TCP","54","47668 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "51993","25.288397","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "51994","25.288824","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "51995","25.288831","172.30.1.205","172.30.1.104","TCP","54","47668 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "51996","25.290669","172.30.1.205","172.30.1.104","TCP","54","47668 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "51997","25.290781","172.30.1.205","172.30.1.104","TCP","74","40306 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928517 TSecr=0 WS=128" "51998","25.290909","172.30.1.104","172.30.1.205","TCP","54","135 > 47668 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "51999","25.290937","172.30.1.104","172.30.1.205","TCP","54","135 > 47668 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52000","25.290942","172.30.1.205","172.30.1.104","TCP","54","47668 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52001","25.291048","172.30.1.104","172.30.1.205","TCP","66","49671 > 40306 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52002","25.291057","172.30.1.205","172.30.1.104","TCP","54","40306 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52003","25.291405","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52004","25.291701","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52005","25.291708","172.30.1.205","172.30.1.104","TCP","54","40306 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52006","25.293626","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52007","25.293986","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52008","25.293992","172.30.1.205","172.30.1.104","TCP","54","40306 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52009","25.295349","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52010","25.299181","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52011","25.299191","172.30.1.205","172.30.1.104","TCP","54","40306 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52012","25.300132","172.30.1.205","172.30.1.104","TCP","74","47672 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928526 TSecr=0 WS=128" "52013","25.300459","172.30.1.104","172.30.1.205","TCP","66","135 > 47672 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52014","25.300480","172.30.1.205","172.30.1.104","TCP","54","47672 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52015","25.301099","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52016","25.301382","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52017","25.301391","172.30.1.205","172.30.1.104","TCP","54","47672 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52018","25.303570","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52019","25.304062","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52020","25.304069","172.30.1.205","172.30.1.104","TCP","54","47672 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52021","25.305909","172.30.1.205","172.30.1.104","TCP","54","47672 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52022","25.306020","172.30.1.205","172.30.1.104","TCP","74","40310 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928532 TSecr=0 WS=128" "52023","25.306268","172.30.1.104","172.30.1.205","TCP","54","135 > 47672 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52024","25.306276","172.30.1.104","172.30.1.205","TCP","54","135 > 47672 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52025","25.306290","172.30.1.205","172.30.1.104","TCP","54","47672 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52026","25.306380","172.30.1.104","172.30.1.205","TCP","66","49671 > 40310 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52027","25.306388","172.30.1.205","172.30.1.104","TCP","54","40310 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52028","25.306735","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52029","25.306999","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52030","25.307008","172.30.1.205","172.30.1.104","TCP","54","40310 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52031","25.308923","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52032","25.309375","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52033","25.309384","172.30.1.205","172.30.1.104","TCP","54","40310 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52034","25.310731","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52035","25.314658","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52036","25.314668","172.30.1.205","172.30.1.104","TCP","54","40310 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52037","25.315655","172.30.1.205","172.30.1.104","TCP","74","47676 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928542 TSecr=0 WS=128" "52038","25.316001","172.30.1.104","172.30.1.205","TCP","66","135 > 47676 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52039","25.316014","172.30.1.205","172.30.1.104","TCP","54","47676 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52040","25.316375","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52041","25.316697","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52042","25.316706","172.30.1.205","172.30.1.104","TCP","54","47676 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52043","25.318912","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52044","25.319382","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52045","25.319389","172.30.1.205","172.30.1.104","TCP","54","47676 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52046","25.321242","172.30.1.205","172.30.1.104","TCP","54","47676 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52047","25.321354","172.30.1.205","172.30.1.104","TCP","74","40314 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928547 TSecr=0 WS=128" "52048","25.321585","172.30.1.104","172.30.1.205","TCP","54","135 > 47676 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52049","25.321596","172.30.1.104","172.30.1.205","TCP","54","135 > 47676 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52050","25.321610","172.30.1.205","172.30.1.104","TCP","54","47676 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52051","25.321701","172.30.1.104","172.30.1.205","TCP","66","49671 > 40314 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52052","25.321713","172.30.1.205","172.30.1.104","TCP","54","40314 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52053","25.322071","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52054","25.322364","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52055","25.322373","172.30.1.205","172.30.1.104","TCP","54","40314 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52056","25.324276","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52057","25.324791","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52058","25.324798","172.30.1.205","172.30.1.104","TCP","54","40314 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52059","25.326174","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52060","25.329996","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52061","25.330006","172.30.1.205","172.30.1.104","TCP","54","40314 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52062","25.330962","172.30.1.205","172.30.1.104","TCP","74","47680 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928557 TSecr=0 WS=128" "52063","25.331266","172.30.1.104","172.30.1.205","TCP","66","135 > 47680 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52064","25.331277","172.30.1.205","172.30.1.104","TCP","54","47680 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52065","25.331642","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52066","25.331934","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52067","25.331943","172.30.1.205","172.30.1.104","TCP","54","47680 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52068","25.334175","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52069","25.334602","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52070","25.334609","172.30.1.205","172.30.1.104","TCP","54","47680 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52071","25.336431","172.30.1.205","172.30.1.104","TCP","54","47680 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52072","25.336542","172.30.1.205","172.30.1.104","TCP","74","40318 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928562 TSecr=0 WS=128" "52073","25.336709","172.30.1.104","172.30.1.205","TCP","54","135 > 47680 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52074","25.336737","172.30.1.104","172.30.1.205","TCP","54","135 > 47680 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52075","25.336743","172.30.1.205","172.30.1.104","TCP","54","47680 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52076","25.336827","172.30.1.104","172.30.1.205","TCP","66","49671 > 40318 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52077","25.336836","172.30.1.205","172.30.1.104","TCP","54","40318 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52078","25.337191","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52079","25.337463","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52080","25.337472","172.30.1.205","172.30.1.104","TCP","54","40318 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52081","25.339366","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52082","25.339717","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52083","25.339723","172.30.1.205","172.30.1.104","TCP","54","40318 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52084","25.341119","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52085","25.344955","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52086","25.344966","172.30.1.205","172.30.1.104","TCP","54","40318 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52087","25.346008","172.30.1.205","172.30.1.104","TCP","74","47684 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928572 TSecr=0 WS=128" "52088","25.346317","172.30.1.104","172.30.1.205","TCP","66","135 > 47684 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52089","25.346329","172.30.1.205","172.30.1.104","TCP","54","47684 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52090","25.346690","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52091","25.346967","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52092","25.346976","172.30.1.205","172.30.1.104","TCP","54","47684 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52093","25.349223","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52094","25.349606","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52095","25.349612","172.30.1.205","172.30.1.104","TCP","54","47684 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52096","25.351437","172.30.1.205","172.30.1.104","TCP","54","47684 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52097","25.351555","172.30.1.205","172.30.1.104","TCP","74","40322 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928577 TSecr=0 WS=128" "52098","25.351710","172.30.1.104","172.30.1.205","TCP","54","135 > 47684 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52099","25.351723","172.30.1.104","172.30.1.205","TCP","54","135 > 47684 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52100","25.351730","172.30.1.205","172.30.1.104","TCP","54","47684 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52101","25.351816","172.30.1.104","172.30.1.205","TCP","66","49671 > 40322 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52102","25.351825","172.30.1.205","172.30.1.104","TCP","54","40322 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52103","25.352172","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52104","25.352466","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52105","25.352475","172.30.1.205","172.30.1.104","TCP","54","40322 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52106","25.354422","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52107","25.354816","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52108","25.354825","172.30.1.205","172.30.1.104","TCP","54","40322 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52109","25.356191","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52110","25.360057","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52111","25.360068","172.30.1.205","172.30.1.104","TCP","54","40322 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52112","25.361064","172.30.1.205","172.30.1.104","TCP","74","47688 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928587 TSecr=0 WS=128" "52113","25.361369","172.30.1.104","172.30.1.205","TCP","66","135 > 47688 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52114","25.361380","172.30.1.205","172.30.1.104","TCP","54","47688 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52115","25.361740","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52116","25.362003","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52117","25.362012","172.30.1.205","172.30.1.104","TCP","54","47688 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52118","25.364193","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52119","25.364570","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52120","25.364578","172.30.1.205","172.30.1.104","TCP","54","47688 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52121","25.366405","172.30.1.205","172.30.1.104","TCP","54","47688 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52122","25.366517","172.30.1.205","172.30.1.104","TCP","74","40326 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928592 TSecr=0 WS=128" "52123","25.366714","172.30.1.104","172.30.1.205","TCP","54","135 > 47688 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52124","25.366728","172.30.1.104","172.30.1.205","TCP","54","135 > 47688 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52125","25.366734","172.30.1.205","172.30.1.104","TCP","54","47688 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52126","25.366815","172.30.1.104","172.30.1.205","TCP","66","49671 > 40326 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52127","25.366823","172.30.1.205","172.30.1.104","TCP","54","40326 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52128","25.367175","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52129","25.367463","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52130","25.367474","172.30.1.205","172.30.1.104","TCP","54","40326 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52131","25.369400","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52132","25.369750","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52133","25.369756","172.30.1.205","172.30.1.104","TCP","54","40326 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52134","25.371105","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52135","25.375160","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52136","25.375176","172.30.1.205","172.30.1.104","TCP","54","40326 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52137","25.376187","172.30.1.205","172.30.1.104","TCP","74","47692 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928602 TSecr=0 WS=128" "52138","25.376508","172.30.1.104","172.30.1.205","TCP","66","135 > 47692 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52139","25.376519","172.30.1.205","172.30.1.104","TCP","54","47692 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52140","25.376902","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52141","25.377194","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52142","25.377204","172.30.1.205","172.30.1.104","TCP","54","47692 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52143","25.379402","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52144","25.379802","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52145","25.379809","172.30.1.205","172.30.1.104","TCP","54","47692 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52146","25.381648","172.30.1.205","172.30.1.104","TCP","54","47692 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52147","25.381760","172.30.1.205","172.30.1.104","TCP","74","40330 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928608 TSecr=0 WS=128" "52148","25.381940","172.30.1.104","172.30.1.205","TCP","54","135 > 47692 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52149","25.382020","172.30.1.104","172.30.1.205","TCP","54","135 > 47692 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52150","25.382031","172.30.1.205","172.30.1.104","TCP","54","47692 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52151","25.382100","172.30.1.104","172.30.1.205","TCP","66","49671 > 40330 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52152","25.382112","172.30.1.205","172.30.1.104","TCP","54","40330 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52153","25.382526","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52154","25.382818","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52155","25.382827","172.30.1.205","172.30.1.104","TCP","54","40330 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52156","25.384772","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52157","25.385215","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52158","25.385222","172.30.1.205","172.30.1.104","TCP","54","40330 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52159","25.386588","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52160","25.390431","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52161","25.390447","172.30.1.205","172.30.1.104","TCP","54","40330 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52162","25.391471","172.30.1.205","172.30.1.104","TCP","74","47696 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928617 TSecr=0 WS=128" "52163","25.391799","172.30.1.104","172.30.1.205","TCP","66","135 > 47696 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52164","25.391810","172.30.1.205","172.30.1.104","TCP","54","47696 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52165","25.392168","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52166","25.392470","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52167","25.392479","172.30.1.205","172.30.1.104","TCP","54","47696 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52168","25.394742","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52169","25.395138","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52170","25.395146","172.30.1.205","172.30.1.104","TCP","54","47696 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52171","25.397021","172.30.1.205","172.30.1.104","TCP","54","47696 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52172","25.397138","172.30.1.205","172.30.1.104","TCP","74","40334 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928623 TSecr=0 WS=128" "52173","25.397311","172.30.1.104","172.30.1.205","TCP","54","135 > 47696 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52174","25.397337","172.30.1.104","172.30.1.205","TCP","54","135 > 47696 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52175","25.397343","172.30.1.205","172.30.1.104","TCP","54","47696 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52176","25.397488","172.30.1.104","172.30.1.205","TCP","66","49671 > 40334 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52177","25.397497","172.30.1.205","172.30.1.104","TCP","54","40334 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52178","25.397854","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52179","25.398156","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52180","25.398165","172.30.1.205","172.30.1.104","TCP","54","40334 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52181","25.400044","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52182","25.400419","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52183","25.400425","172.30.1.205","172.30.1.104","TCP","54","40334 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52184","25.401835","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52185","25.405753","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52186","25.405763","172.30.1.205","172.30.1.104","TCP","54","40334 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52187","25.406717","172.30.1.205","172.30.1.104","TCP","74","47700 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928633 TSecr=0 WS=128" "52188","25.407013","172.30.1.104","172.30.1.205","TCP","66","135 > 47700 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52189","25.407023","172.30.1.205","172.30.1.104","TCP","54","47700 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52190","25.407375","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52191","25.407694","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52192","25.407702","172.30.1.205","172.30.1.104","TCP","54","47700 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52193","25.409944","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52194","25.410455","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52195","25.410461","172.30.1.205","172.30.1.104","TCP","54","47700 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52196","25.412274","172.30.1.205","172.30.1.104","TCP","54","47700 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52197","25.412387","172.30.1.205","172.30.1.104","TCP","74","40338 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928638 TSecr=0 WS=128" "52198","25.412559","172.30.1.104","172.30.1.205","TCP","54","135 > 47700 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52199","25.412608","172.30.1.104","172.30.1.205","TCP","54","135 > 47700 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52200","25.412613","172.30.1.205","172.30.1.104","TCP","54","47700 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52201","25.412683","172.30.1.104","172.30.1.205","TCP","66","49671 > 40338 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52202","25.412691","172.30.1.205","172.30.1.104","TCP","54","40338 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52203","25.413068","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52204","25.413370","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52205","25.413377","172.30.1.205","172.30.1.104","TCP","54","40338 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52206","25.415258","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52207","25.417072","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52208","25.417086","172.30.1.205","172.30.1.104","TCP","54","40338 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52209","25.418634","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52210","25.422605","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52211","25.422615","172.30.1.205","172.30.1.104","TCP","54","40338 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52212","25.423567","172.30.1.205","172.30.1.104","TCP","74","47704 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928649 TSecr=0 WS=128" "52213","25.423888","172.30.1.104","172.30.1.205","TCP","66","135 > 47704 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52214","25.423900","172.30.1.205","172.30.1.104","TCP","54","47704 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52215","25.424271","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52216","25.424551","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52217","25.424560","172.30.1.205","172.30.1.104","TCP","54","47704 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52218","25.426752","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52219","25.427170","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52220","25.427176","172.30.1.205","172.30.1.104","TCP","54","47704 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52221","25.428034","172.30.1.205","172.30.1.104","TCP","54","40298 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52222","25.428081","172.30.1.205","172.30.1.104","TCP","54","40302 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52223","25.428134","172.30.1.205","172.30.1.104","TCP","54","40306 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52224","25.428169","172.30.1.205","172.30.1.104","TCP","54","40310 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52225","25.428193","172.30.1.205","172.30.1.104","TCP","54","40314 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52226","25.428216","172.30.1.205","172.30.1.104","TCP","54","40318 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52227","25.428252","172.30.1.205","172.30.1.104","TCP","54","40322 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52228","25.428276","172.30.1.205","172.30.1.104","TCP","54","40326 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52229","25.428303","172.30.1.104","172.30.1.205","TCP","54","49671 > 40298 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52230","25.428315","172.30.1.205","172.30.1.104","TCP","54","40330 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52231","25.428351","172.30.1.205","172.30.1.104","TCP","54","40334 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52232","25.428374","172.30.1.205","172.30.1.104","TCP","54","40338 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52233","25.428398","172.30.1.104","172.30.1.205","TCP","54","49671 > 40302 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52234","25.428422","172.30.1.104","172.30.1.205","TCP","54","49671 > 40298 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52235","25.428428","172.30.1.205","172.30.1.104","TCP","54","40298 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52236","25.428452","172.30.1.104","172.30.1.205","TCP","54","49671 > 40302 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52237","25.428455","172.30.1.205","172.30.1.104","TCP","54","40302 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52238","25.428488","172.30.1.205","172.30.1.104","TCP","54","40294 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52239","25.428566","172.30.1.104","172.30.1.205","TCP","54","49671 > 40306 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52240","25.428590","172.30.1.104","172.30.1.205","TCP","54","49671 > 40306 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52241","25.428595","172.30.1.205","172.30.1.104","TCP","54","40306 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52242","25.428616","172.30.1.104","172.30.1.205","TCP","54","49671 > 40310 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52243","25.428642","172.30.1.104","172.30.1.205","TCP","54","49671 > 40314 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52244","25.428668","172.30.1.104","172.30.1.205","TCP","54","49671 > 40318 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52245","25.428695","172.30.1.104","172.30.1.205","TCP","54","49671 > 40310 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52246","25.428700","172.30.1.205","172.30.1.104","TCP","54","40310 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52247","25.428805","172.30.1.104","172.30.1.205","TCP","54","49671 > 40322 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52248","25.428830","172.30.1.104","172.30.1.205","TCP","54","49671 > 40326 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52249","25.428872","172.30.1.104","172.30.1.205","TCP","54","49671 > 40326 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52250","25.428878","172.30.1.205","172.30.1.104","TCP","54","40326 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52251","25.428909","172.30.1.104","172.30.1.205","TCP","54","49671 > 40322 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52252","25.428912","172.30.1.205","172.30.1.104","TCP","54","40322 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52253","25.428935","172.30.1.104","172.30.1.205","TCP","54","49671 > 40314 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52254","25.428938","172.30.1.205","172.30.1.104","TCP","54","40314 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52255","25.428962","172.30.1.104","172.30.1.205","TCP","54","49671 > 40318 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52256","25.428967","172.30.1.205","172.30.1.104","TCP","54","40318 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52257","25.428990","172.30.1.104","172.30.1.205","TCP","54","49671 > 40330 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52258","25.429019","172.30.1.104","172.30.1.205","TCP","54","49671 > 40334 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52259","25.429045","172.30.1.104","172.30.1.205","TCP","54","49671 > 40330 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52260","25.429049","172.30.1.205","172.30.1.104","TCP","54","40330 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52261","25.429096","172.30.1.104","172.30.1.205","TCP","54","49671 > 40334 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52262","25.429101","172.30.1.205","172.30.1.104","TCP","54","40334 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52263","25.429121","172.30.1.104","172.30.1.205","TCP","54","49671 > 40338 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52264","25.429148","172.30.1.104","172.30.1.205","TCP","54","49671 > 40338 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52265","25.429152","172.30.1.205","172.30.1.104","TCP","54","40338 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52266","25.429174","172.30.1.104","172.30.1.205","TCP","54","49671 > 40294 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52267","25.429201","172.30.1.104","172.30.1.205","TCP","54","49671 > 40294 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52268","25.429204","172.30.1.205","172.30.1.104","TCP","54","40294 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52269","25.430075","172.30.1.205","172.30.1.104","TCP","54","47704 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52270","25.430187","172.30.1.205","172.30.1.104","TCP","74","40342 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928656 TSecr=0 WS=128" "52271","25.430339","172.30.1.104","172.30.1.205","TCP","54","135 > 47704 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52272","25.430366","172.30.1.104","172.30.1.205","TCP","54","135 > 47704 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52273","25.430370","172.30.1.205","172.30.1.104","TCP","54","47704 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52274","25.430458","172.30.1.104","172.30.1.205","TCP","66","49671 > 40342 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52275","25.430466","172.30.1.205","172.30.1.104","TCP","54","40342 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52276","25.430822","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52277","25.431112","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52278","25.431120","172.30.1.205","172.30.1.104","TCP","54","40342 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52279","25.433026","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52280","25.433412","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52281","25.433418","172.30.1.205","172.30.1.104","TCP","54","40342 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52282","25.434781","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52283","25.438627","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52284","25.438636","172.30.1.205","172.30.1.104","TCP","54","40342 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52285","25.439589","172.30.1.205","172.30.1.104","TCP","74","47708 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928666 TSecr=0 WS=128" "52286","25.439894","172.30.1.104","172.30.1.205","TCP","66","135 > 47708 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52287","25.439905","172.30.1.205","172.30.1.104","TCP","54","47708 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52288","25.440262","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52289","25.440603","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52290","25.440612","172.30.1.205","172.30.1.104","TCP","54","47708 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52291","25.442807","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52292","25.443211","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52293","25.443218","172.30.1.205","172.30.1.104","TCP","54","47708 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52294","25.445065","172.30.1.205","172.30.1.104","TCP","54","47708 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52295","25.445177","172.30.1.205","172.30.1.104","TCP","74","40346 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928671 TSecr=0 WS=128" "52296","25.445359","172.30.1.104","172.30.1.205","TCP","54","135 > 47708 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52297","25.445392","172.30.1.104","172.30.1.205","TCP","54","135 > 47708 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52298","25.445398","172.30.1.205","172.30.1.104","TCP","54","47708 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52299","25.445464","172.30.1.104","172.30.1.205","TCP","66","49671 > 40346 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52300","25.445480","172.30.1.205","172.30.1.104","TCP","54","40346 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52301","25.445889","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52302","25.446224","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52303","25.446237","172.30.1.205","172.30.1.104","TCP","54","40346 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52304","25.448128","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52305","25.448494","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52306","25.448501","172.30.1.205","172.30.1.104","TCP","54","40346 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52307","25.449898","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52308","25.453747","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52309","25.453758","172.30.1.205","172.30.1.104","TCP","54","40346 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52310","25.454716","172.30.1.205","172.30.1.104","TCP","74","47712 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928681 TSecr=0 WS=128" "52311","25.455021","172.30.1.104","172.30.1.205","TCP","66","135 > 47712 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52312","25.455032","172.30.1.205","172.30.1.104","TCP","54","47712 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52313","25.455390","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52314","25.455677","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52315","25.455687","172.30.1.205","172.30.1.104","TCP","54","47712 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52316","25.457924","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52317","25.458357","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52318","25.458364","172.30.1.205","172.30.1.104","TCP","54","47712 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52319","25.460181","172.30.1.205","172.30.1.104","TCP","54","47712 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52320","25.460298","172.30.1.205","172.30.1.104","TCP","74","40350 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928686 TSecr=0 WS=128" "52321","25.460534","172.30.1.104","172.30.1.205","TCP","54","135 > 47712 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52322","25.460568","172.30.1.104","172.30.1.205","TCP","54","135 > 47712 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52323","25.460574","172.30.1.205","172.30.1.104","TCP","54","47712 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52324","25.460613","172.30.1.104","172.30.1.205","TCP","66","49671 > 40350 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52325","25.460621","172.30.1.205","172.30.1.104","TCP","54","40350 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52326","25.460996","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52327","25.461358","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52328","25.461366","172.30.1.205","172.30.1.104","TCP","54","40350 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52329","25.463264","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52330","25.463702","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52331","25.463709","172.30.1.205","172.30.1.104","TCP","54","40350 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52332","25.465105","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52333","25.468970","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52334","25.468979","172.30.1.205","172.30.1.104","TCP","54","40350 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52335","25.469939","172.30.1.205","172.30.1.104","TCP","74","47716 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928696 TSecr=0 WS=128" "52336","25.470255","172.30.1.104","172.30.1.205","TCP","66","135 > 47716 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52337","25.470265","172.30.1.205","172.30.1.104","TCP","54","47716 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52338","25.470619","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52339","25.470909","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52340","25.470918","172.30.1.205","172.30.1.104","TCP","54","47716 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52341","25.473150","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52342","25.473839","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52343","25.473846","172.30.1.205","172.30.1.104","TCP","54","47716 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52344","25.475666","172.30.1.205","172.30.1.104","TCP","54","47716 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52345","25.475777","172.30.1.205","172.30.1.104","TCP","74","40354 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928702 TSecr=0 WS=128" "52346","25.477237","172.30.1.104","172.30.1.205","TCP","66","49671 > 40354 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52347","25.477252","172.30.1.205","172.30.1.104","TCP","54","40354 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52348","25.477257","172.30.1.104","172.30.1.205","TCP","54","135 > 47716 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52349","25.477304","172.30.1.104","172.30.1.205","TCP","54","135 > 47716 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52350","25.477310","172.30.1.205","172.30.1.104","TCP","54","47716 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52351","25.477645","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52352","25.478359","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52353","25.478367","172.30.1.205","172.30.1.104","TCP","54","40354 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52354","25.480243","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52355","25.480648","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52356","25.480654","172.30.1.205","172.30.1.104","TCP","54","40354 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52357","25.482058","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52358","25.485934","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52359","25.485954","172.30.1.205","172.30.1.104","TCP","54","40354 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52360","25.487027","172.30.1.205","172.30.1.104","TCP","74","47720 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928713 TSecr=0 WS=128" "52361","25.487322","172.30.1.104","172.30.1.205","TCP","66","135 > 47720 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52362","25.487333","172.30.1.205","172.30.1.104","TCP","54","47720 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52363","25.487685","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52364","25.487970","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52365","25.487979","172.30.1.205","172.30.1.104","TCP","54","47720 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52366","25.490189","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52367","25.490593","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52368","25.490600","172.30.1.205","172.30.1.104","TCP","54","47720 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52369","25.492429","172.30.1.205","172.30.1.104","TCP","54","47720 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52370","25.492539","172.30.1.205","172.30.1.104","TCP","74","40358 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928718 TSecr=0 WS=128" "52371","25.492700","172.30.1.104","172.30.1.205","TCP","54","135 > 47720 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52372","25.492772","172.30.1.104","172.30.1.205","TCP","54","135 > 47720 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52373","25.492787","172.30.1.205","172.30.1.104","TCP","54","47720 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52374","25.492908","172.30.1.104","172.30.1.205","TCP","66","49671 > 40358 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52375","25.492917","172.30.1.205","172.30.1.104","TCP","54","40358 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52376","25.493263","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52377","25.493579","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52378","25.493588","172.30.1.205","172.30.1.104","TCP","54","40358 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52379","25.495496","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52380","25.495924","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52381","25.495931","172.30.1.205","172.30.1.104","TCP","54","40358 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52382","25.497318","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52383","25.501736","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52384","25.501746","172.30.1.205","172.30.1.104","TCP","54","40358 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52385","25.502690","172.30.1.205","172.30.1.104","TCP","74","47724 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928729 TSecr=0 WS=128" "52386","25.503011","172.30.1.104","172.30.1.205","TCP","66","135 > 47724 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52387","25.503022","172.30.1.205","172.30.1.104","TCP","54","47724 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52388","25.503375","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52389","25.503724","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52390","25.503734","172.30.1.205","172.30.1.104","TCP","54","47724 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52391","25.505949","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52392","25.506334","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52393","25.506341","172.30.1.205","172.30.1.104","TCP","54","47724 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52394","25.508172","172.30.1.205","172.30.1.104","TCP","54","47724 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52395","25.508294","172.30.1.205","172.30.1.104","TCP","74","40362 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928734 TSecr=0 WS=128" "52396","25.508447","172.30.1.104","172.30.1.205","TCP","54","135 > 47724 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52397","25.508523","172.30.1.104","172.30.1.205","TCP","54","135 > 47724 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52398","25.508529","172.30.1.205","172.30.1.104","TCP","54","47724 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52399","25.508639","172.30.1.104","172.30.1.205","TCP","66","49671 > 40362 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52400","25.508647","172.30.1.205","172.30.1.104","TCP","54","40362 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52401","25.509024","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52402","25.509283","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52403","25.509291","172.30.1.205","172.30.1.104","TCP","54","40362 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52404","25.511175","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52405","25.511544","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52406","25.511551","172.30.1.205","172.30.1.104","TCP","54","40362 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52407","25.512940","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52408","25.516665","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52409","25.516683","172.30.1.205","172.30.1.104","TCP","54","40362 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52410","25.517758","172.30.1.205","172.30.1.104","TCP","74","47728 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928744 TSecr=0 WS=128" "52411","25.518097","172.30.1.104","172.30.1.205","TCP","66","135 > 47728 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52412","25.518108","172.30.1.205","172.30.1.104","TCP","54","47728 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52413","25.518454","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52414","25.518755","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52415","25.518765","172.30.1.205","172.30.1.104","TCP","54","47728 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52416","25.520974","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52417","25.521370","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52418","25.521376","172.30.1.205","172.30.1.104","TCP","54","47728 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52419","25.523192","172.30.1.205","172.30.1.104","TCP","54","47728 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52420","25.523307","172.30.1.205","172.30.1.104","TCP","74","40366 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928749 TSecr=0 WS=128" "52421","25.523501","172.30.1.104","172.30.1.205","TCP","54","135 > 47728 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52422","25.523512","172.30.1.104","172.30.1.205","TCP","54","135 > 47728 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52423","25.523518","172.30.1.205","172.30.1.104","TCP","54","47728 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52424","25.523589","172.30.1.104","172.30.1.205","TCP","66","49671 > 40366 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52425","25.523598","172.30.1.205","172.30.1.104","TCP","54","40366 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52426","25.523943","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52427","25.524226","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52428","25.524234","172.30.1.205","172.30.1.104","TCP","54","40366 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52429","25.526152","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52430","25.526547","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52431","25.526555","172.30.1.205","172.30.1.104","TCP","54","40366 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52432","25.527930","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52433","25.531956","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52434","25.531967","172.30.1.205","172.30.1.104","TCP","54","40366 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52435","25.532952","172.30.1.205","172.30.1.104","TCP","74","47732 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928759 TSecr=0 WS=128" "52436","25.533257","172.30.1.104","172.30.1.205","TCP","66","135 > 47732 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52437","25.533268","172.30.1.205","172.30.1.104","TCP","54","47732 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52438","25.533634","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52439","25.533961","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52440","25.533970","172.30.1.205","172.30.1.104","TCP","54","47732 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52441","25.536166","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52442","25.536564","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52443","25.536570","172.30.1.205","172.30.1.104","TCP","54","47732 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52444","25.538392","172.30.1.205","172.30.1.104","TCP","54","47732 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52445","25.538502","172.30.1.205","172.30.1.104","TCP","74","40370 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928764 TSecr=0 WS=128" "52446","25.538710","172.30.1.104","172.30.1.205","TCP","54","135 > 47732 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52447","25.538750","172.30.1.104","172.30.1.205","TCP","54","135 > 47732 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52448","25.538756","172.30.1.205","172.30.1.104","TCP","54","47732 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52449","25.538791","172.30.1.104","172.30.1.205","TCP","66","49671 > 40370 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52450","25.538800","172.30.1.205","172.30.1.104","TCP","54","40370 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52451","25.539146","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52452","25.541503","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52453","25.541511","172.30.1.205","172.30.1.104","TCP","54","40370 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52454","25.543407","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52455","25.543811","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52456","25.543818","172.30.1.205","172.30.1.104","TCP","54","40370 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52457","25.545226","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52458","25.549169","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52459","25.549179","172.30.1.205","172.30.1.104","TCP","54","40370 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52460","25.550158","172.30.1.205","172.30.1.104","TCP","74","47736 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928776 TSecr=0 WS=128" "52461","25.550464","172.30.1.104","172.30.1.205","TCP","66","135 > 47736 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52462","25.550475","172.30.1.205","172.30.1.104","TCP","54","47736 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52463","25.550830","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52464","25.551122","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52465","25.551131","172.30.1.205","172.30.1.104","TCP","54","47736 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52466","25.553344","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52467","25.553741","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52468","25.553748","172.30.1.205","172.30.1.104","TCP","54","47736 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52469","25.555582","172.30.1.205","172.30.1.104","TCP","54","47736 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52470","25.555704","172.30.1.205","172.30.1.104","TCP","74","40374 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928782 TSecr=0 WS=128" "52471","25.555877","172.30.1.104","172.30.1.205","TCP","54","135 > 47736 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52472","25.555926","172.30.1.104","172.30.1.205","TCP","54","135 > 47736 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52473","25.555933","172.30.1.205","172.30.1.104","TCP","54","47736 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52474","25.556043","172.30.1.104","172.30.1.205","TCP","66","49671 > 40374 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52475","25.556051","172.30.1.205","172.30.1.104","TCP","54","40374 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52476","25.556400","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52477","25.556721","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52478","25.556730","172.30.1.205","172.30.1.104","TCP","54","40374 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52479","25.558647","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52480","25.559137","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52481","25.559147","172.30.1.205","172.30.1.104","TCP","54","40374 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52482","25.560587","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52483","25.564428","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52484","25.564440","172.30.1.205","172.30.1.104","TCP","54","40374 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52485","25.565462","172.30.1.205","172.30.1.104","TCP","74","47740 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928791 TSecr=0 WS=128" "52486","25.565804","172.30.1.104","172.30.1.205","TCP","66","135 > 47740 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52487","25.565818","172.30.1.205","172.30.1.104","TCP","54","47740 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52488","25.566180","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52489","25.566562","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52490","25.566571","172.30.1.205","172.30.1.104","TCP","54","47740 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52491","25.568771","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52492","25.569162","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52493","25.569171","172.30.1.205","172.30.1.104","TCP","54","47740 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52494","25.571097","172.30.1.205","172.30.1.104","TCP","54","47740 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52495","25.571224","172.30.1.205","172.30.1.104","TCP","74","40378 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928797 TSecr=0 WS=128" "52496","25.571524","172.30.1.104","172.30.1.205","TCP","54","135 > 47740 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52497","25.571547","172.30.1.104","172.30.1.205","TCP","54","135 > 47740 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52498","25.571558","172.30.1.205","172.30.1.104","TCP","54","47740 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52499","25.571606","172.30.1.104","172.30.1.205","TCP","66","49671 > 40378 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52500","25.571623","172.30.1.205","172.30.1.104","TCP","54","40378 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52501","25.572177","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52502","25.572493","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52503","25.572502","172.30.1.205","172.30.1.104","TCP","54","40378 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52504","25.574425","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52505","25.574887","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52506","25.574894","172.30.1.205","172.30.1.104","TCP","54","40378 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52507","25.576245","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52508","25.580015","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52509","25.580028","172.30.1.205","172.30.1.104","TCP","54","40378 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52510","25.581104","172.30.1.205","172.30.1.104","TCP","74","47744 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928807 TSecr=0 WS=128" "52511","25.581431","172.30.1.104","172.30.1.205","TCP","66","135 > 47744 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52512","25.581442","172.30.1.205","172.30.1.104","TCP","54","47744 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52513","25.581804","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52514","25.582080","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52515","25.582089","172.30.1.205","172.30.1.104","TCP","54","47744 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52516","25.584294","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52517","25.584681","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52518","25.584688","172.30.1.205","172.30.1.104","TCP","54","47744 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52519","25.586518","172.30.1.205","172.30.1.104","TCP","54","47744 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52520","25.586633","172.30.1.205","172.30.1.104","TCP","74","40382 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928813 TSecr=0 WS=128" "52521","25.586776","172.30.1.104","172.30.1.205","TCP","54","135 > 47744 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52522","25.586788","172.30.1.104","172.30.1.205","TCP","54","135 > 47744 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52523","25.586794","172.30.1.205","172.30.1.104","TCP","54","47744 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52524","25.586881","172.30.1.104","172.30.1.205","TCP","66","49671 > 40382 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52525","25.586890","172.30.1.205","172.30.1.104","TCP","54","40382 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52526","25.587246","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52527","25.587531","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52528","25.587540","172.30.1.205","172.30.1.104","TCP","54","40382 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52529","25.589464","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52530","25.589831","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52531","25.589837","172.30.1.205","172.30.1.104","TCP","54","40382 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52532","25.591192","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52533","25.595149","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52534","25.595160","172.30.1.205","172.30.1.104","TCP","54","40382 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52535","25.596209","172.30.1.205","172.30.1.104","TCP","74","47748 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928822 TSecr=0 WS=128" "52536","25.596584","172.30.1.104","172.30.1.205","TCP","66","135 > 47748 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52537","25.596595","172.30.1.205","172.30.1.104","TCP","54","47748 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52538","25.596976","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52539","25.597281","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52540","25.597291","172.30.1.205","172.30.1.104","TCP","54","47748 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52541","25.599505","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52542","25.599971","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52543","25.599977","172.30.1.205","172.30.1.104","TCP","54","47748 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52544","25.601829","172.30.1.205","172.30.1.104","TCP","54","47748 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52545","25.601942","172.30.1.205","172.30.1.104","TCP","74","40386 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928828 TSecr=0 WS=128" "52546","25.602111","172.30.1.104","172.30.1.205","TCP","54","135 > 47748 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52547","25.602145","172.30.1.104","172.30.1.205","TCP","54","135 > 47748 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52548","25.602151","172.30.1.205","172.30.1.104","TCP","54","47748 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52549","25.602221","172.30.1.104","172.30.1.205","TCP","66","49671 > 40386 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52550","25.602229","172.30.1.205","172.30.1.104","TCP","54","40386 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52551","25.602574","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52552","25.602876","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52553","25.602885","172.30.1.205","172.30.1.104","TCP","54","40386 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52554","25.604749","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52555","25.605137","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52556","25.605143","172.30.1.205","172.30.1.104","TCP","54","40386 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52557","25.606519","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52558","25.610378","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52559","25.610390","172.30.1.205","172.30.1.104","TCP","54","40386 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52560","25.611405","172.30.1.205","172.30.1.104","TCP","74","47752 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928837 TSecr=0 WS=128" "52561","25.611747","172.30.1.104","172.30.1.205","TCP","66","135 > 47752 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52562","25.611757","172.30.1.205","172.30.1.104","TCP","54","47752 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52563","25.612130","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52564","25.612404","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52565","25.612413","172.30.1.205","172.30.1.104","TCP","54","47752 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52566","25.614623","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52567","25.615044","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52568","25.615051","172.30.1.205","172.30.1.104","TCP","54","47752 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52569","25.615903","172.30.1.205","172.30.1.104","TCP","54","40346 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52570","25.615953","172.30.1.205","172.30.1.104","TCP","54","40350 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52571","25.615981","172.30.1.205","172.30.1.104","TCP","54","40354 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52572","25.616009","172.30.1.205","172.30.1.104","TCP","54","40358 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52573","25.616037","172.30.1.205","172.30.1.104","TCP","54","40362 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52574","25.616060","172.30.1.205","172.30.1.104","TCP","54","40366 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52575","25.616083","172.30.1.205","172.30.1.104","TCP","54","40370 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52576","25.616110","172.30.1.205","172.30.1.104","TCP","54","40374 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52577","25.616138","172.30.1.205","172.30.1.104","TCP","54","40378 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52578","25.616173","172.30.1.205","172.30.1.104","TCP","54","40382 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52579","25.616199","172.30.1.205","172.30.1.104","TCP","54","40386 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52580","25.616216","172.30.1.104","172.30.1.205","TCP","54","49671 > 40346 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52581","25.616301","172.30.1.205","172.30.1.104","TCP","54","40342 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52582","25.616371","172.30.1.104","172.30.1.205","TCP","54","49671 > 40350 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52583","25.616389","172.30.1.104","172.30.1.205","TCP","54","49671 > 40350 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52584","25.616396","172.30.1.205","172.30.1.104","TCP","54","40350 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52585","25.616409","172.30.1.104","172.30.1.205","TCP","54","49671 > 40346 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52586","25.616411","172.30.1.205","172.30.1.104","TCP","54","40346 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52587","25.616431","172.30.1.104","172.30.1.205","TCP","54","49671 > 40354 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52588","25.616450","172.30.1.104","172.30.1.205","TCP","54","49671 > 40358 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52589","25.616469","172.30.1.104","172.30.1.205","TCP","54","49671 > 40358 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52590","25.616473","172.30.1.205","172.30.1.104","TCP","54","40358 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52591","25.616496","172.30.1.104","172.30.1.205","TCP","54","49671 > 40362 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52592","25.616801","172.30.1.104","172.30.1.205","TCP","54","49671 > 40362 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52593","25.616808","172.30.1.205","172.30.1.104","TCP","54","40362 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52594","25.616814","172.30.1.104","172.30.1.205","TCP","54","49671 > 40366 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52595","25.616823","172.30.1.104","172.30.1.205","TCP","54","49671 > 40366 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52596","25.616825","172.30.1.205","172.30.1.104","TCP","54","40366 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52597","25.616845","172.30.1.104","172.30.1.205","TCP","54","49671 > 40354 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52598","25.616848","172.30.1.205","172.30.1.104","TCP","54","40354 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52599","25.616863","172.30.1.104","172.30.1.205","TCP","54","49671 > 40370 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52600","25.616892","172.30.1.104","172.30.1.205","TCP","54","49671 > 40374 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52601","25.616916","172.30.1.104","172.30.1.205","TCP","54","49671 > 40370 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52602","25.616919","172.30.1.205","172.30.1.104","TCP","54","40370 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52603","25.616946","172.30.1.104","172.30.1.205","TCP","54","49671 > 40378 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52604","25.616966","172.30.1.104","172.30.1.205","TCP","54","49671 > 40382 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52605","25.616986","172.30.1.104","172.30.1.205","TCP","54","49671 > 40382 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52606","25.616990","172.30.1.205","172.30.1.104","TCP","54","40382 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52607","25.617006","172.30.1.104","172.30.1.205","TCP","54","49671 > 40386 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52608","25.617025","172.30.1.104","172.30.1.205","TCP","54","49671 > 40386 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52609","25.617029","172.30.1.205","172.30.1.104","TCP","54","40386 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52610","25.617044","172.30.1.104","172.30.1.205","TCP","54","49671 > 40342 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52611","25.617074","172.30.1.104","172.30.1.205","TCP","54","49671 > 40342 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52612","25.617078","172.30.1.205","172.30.1.104","TCP","54","40342 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52613","25.617092","172.30.1.104","172.30.1.205","TCP","54","49671 > 40374 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52614","25.617096","172.30.1.205","172.30.1.104","TCP","54","40374 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52615","25.617114","172.30.1.104","172.30.1.205","TCP","54","49671 > 40378 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52616","25.617121","172.30.1.205","172.30.1.104","TCP","54","40378 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52617","25.617886","172.30.1.205","172.30.1.104","TCP","54","47752 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52618","25.618001","172.30.1.205","172.30.1.104","TCP","74","40390 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928844 TSecr=0 WS=128" "52619","25.618145","172.30.1.104","172.30.1.205","TCP","54","135 > 47752 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52620","25.618174","172.30.1.104","172.30.1.205","TCP","54","135 > 47752 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52621","25.618179","172.30.1.205","172.30.1.104","TCP","54","47752 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52622","25.618277","172.30.1.104","172.30.1.205","TCP","66","49671 > 40390 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52623","25.618285","172.30.1.205","172.30.1.104","TCP","54","40390 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52624","25.618637","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52625","25.619074","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52626","25.619083","172.30.1.205","172.30.1.104","TCP","54","40390 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52627","25.621012","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52628","25.621444","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52629","25.621456","172.30.1.205","172.30.1.104","TCP","54","40390 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52630","25.623045","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52631","25.626832","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52632","25.626843","172.30.1.205","172.30.1.104","TCP","54","40390 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52633","25.627787","172.30.1.205","172.30.1.104","TCP","74","47756 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928854 TSecr=0 WS=128" "52634","25.628119","172.30.1.104","172.30.1.205","TCP","66","135 > 47756 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52635","25.628131","172.30.1.205","172.30.1.104","TCP","54","47756 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52636","25.628494","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52637","25.628774","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52638","25.628786","172.30.1.205","172.30.1.104","TCP","54","47756 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52639","25.630980","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52640","25.631377","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52641","25.631384","172.30.1.205","172.30.1.104","TCP","54","47756 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52642","25.633209","172.30.1.205","172.30.1.104","TCP","54","47756 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52643","25.633320","172.30.1.205","172.30.1.104","TCP","74","40394 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928859 TSecr=0 WS=128" "52644","25.633553","172.30.1.104","172.30.1.205","TCP","54","135 > 47756 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52645","25.633630","172.30.1.104","172.30.1.205","TCP","54","135 > 47756 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52646","25.633637","172.30.1.205","172.30.1.104","TCP","54","47756 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52647","25.633713","172.30.1.104","172.30.1.205","TCP","66","49671 > 40394 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52648","25.633722","172.30.1.205","172.30.1.104","TCP","54","40394 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52649","25.634065","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52650","25.634373","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52651","25.634382","172.30.1.205","172.30.1.104","TCP","54","40394 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52652","25.636261","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52653","25.636618","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52654","25.636625","172.30.1.205","172.30.1.104","TCP","54","40394 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52655","25.638010","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52656","25.641900","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52657","25.641912","172.30.1.205","172.30.1.104","TCP","54","40394 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52658","25.642906","172.30.1.205","172.30.1.104","TCP","74","47760 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928869 TSecr=0 WS=128" "52659","25.643261","172.30.1.104","172.30.1.205","TCP","66","135 > 47760 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52660","25.643273","172.30.1.205","172.30.1.104","TCP","54","47760 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52661","25.643627","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52662","25.643906","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52663","25.643916","172.30.1.205","172.30.1.104","TCP","54","47760 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52664","25.646160","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52665","25.646529","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52666","25.646536","172.30.1.205","172.30.1.104","TCP","54","47760 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52667","25.648362","172.30.1.205","172.30.1.104","TCP","54","47760 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52668","25.648477","172.30.1.205","172.30.1.104","TCP","74","40398 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928874 TSecr=0 WS=128" "52669","25.648615","172.30.1.104","172.30.1.205","TCP","54","135 > 47760 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52670","25.648651","172.30.1.104","172.30.1.205","TCP","54","135 > 47760 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52671","25.648656","172.30.1.205","172.30.1.104","TCP","54","47760 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52672","25.648752","172.30.1.104","172.30.1.205","TCP","66","49671 > 40398 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52673","25.648760","172.30.1.205","172.30.1.104","TCP","54","40398 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52674","25.649125","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52675","25.649397","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52676","25.649406","172.30.1.205","172.30.1.104","TCP","54","40398 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52677","25.651309","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52678","25.651653","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52679","25.651659","172.30.1.205","172.30.1.104","TCP","54","40398 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52680","25.653042","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52681","25.656870","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52682","25.656880","172.30.1.205","172.30.1.104","TCP","54","40398 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52683","25.657835","172.30.1.205","172.30.1.104","TCP","74","47764 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928884 TSecr=0 WS=128" "52684","25.658147","172.30.1.104","172.30.1.205","TCP","66","135 > 47764 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52685","25.658158","172.30.1.205","172.30.1.104","TCP","54","47764 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52686","25.658513","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52687","25.658991","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52688","25.659000","172.30.1.205","172.30.1.104","TCP","54","47764 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52689","25.661216","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52690","25.661593","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52691","25.661600","172.30.1.205","172.30.1.104","TCP","54","47764 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52692","25.663431","172.30.1.205","172.30.1.104","TCP","54","47764 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52693","25.663540","172.30.1.205","172.30.1.104","TCP","74","40402 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928889 TSecr=0 WS=128" "52694","25.663707","172.30.1.104","172.30.1.205","TCP","54","135 > 47764 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52695","25.663729","172.30.1.104","172.30.1.205","TCP","54","135 > 47764 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52696","25.663735","172.30.1.205","172.30.1.104","TCP","54","47764 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52697","25.663840","172.30.1.104","172.30.1.205","TCP","66","49671 > 40402 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52698","25.663851","172.30.1.205","172.30.1.104","TCP","54","40402 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52699","25.664205","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52700","25.664715","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52701","25.664724","172.30.1.205","172.30.1.104","TCP","54","40402 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52702","25.666654","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52703","25.667012","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52704","25.667019","172.30.1.205","172.30.1.104","TCP","54","40402 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52705","25.668383","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52706","25.672295","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52707","25.672306","172.30.1.205","172.30.1.104","TCP","54","40402 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52708","25.673293","172.30.1.205","172.30.1.104","TCP","74","47768 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928899 TSecr=0 WS=128" "52709","25.673593","172.30.1.104","172.30.1.205","TCP","66","135 > 47768 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52710","25.673606","172.30.1.205","172.30.1.104","TCP","54","47768 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52711","25.673977","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52712","25.674247","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52713","25.674256","172.30.1.205","172.30.1.104","TCP","54","47768 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52714","25.676444","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52715","25.676867","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52716","25.676877","172.30.1.205","172.30.1.104","TCP","54","47768 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52717","25.678777","172.30.1.205","172.30.1.104","TCP","54","47768 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52718","25.678906","172.30.1.205","172.30.1.104","TCP","74","40406 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928905 TSecr=0 WS=128" "52719","25.679045","172.30.1.104","172.30.1.205","TCP","54","135 > 47768 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52720","25.679057","172.30.1.104","172.30.1.205","TCP","54","135 > 47768 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52721","25.679062","172.30.1.205","172.30.1.104","TCP","54","47768 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52722","25.679203","172.30.1.104","172.30.1.205","TCP","66","49671 > 40406 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52723","25.679216","172.30.1.205","172.30.1.104","TCP","54","40406 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52724","25.679585","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52725","25.679867","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52726","25.679874","172.30.1.205","172.30.1.104","TCP","54","40406 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52727","25.681801","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52728","25.682158","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52729","25.682165","172.30.1.205","172.30.1.104","TCP","54","40406 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52730","25.683526","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52731","25.687470","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52732","25.687480","172.30.1.205","172.30.1.104","TCP","54","40406 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52733","25.688431","172.30.1.205","172.30.1.104","TCP","74","47772 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928914 TSecr=0 WS=128" "52734","25.688876","172.30.1.104","172.30.1.205","TCP","66","135 > 47772 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52735","25.688890","172.30.1.205","172.30.1.104","TCP","54","47772 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52736","25.689252","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52737","25.689517","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52738","25.689526","172.30.1.205","172.30.1.104","TCP","54","47772 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52739","25.691766","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52740","25.692219","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52741","25.692225","172.30.1.205","172.30.1.104","TCP","54","47772 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52742","25.694075","172.30.1.205","172.30.1.104","TCP","54","47772 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52743","25.694186","172.30.1.205","172.30.1.104","TCP","74","40410 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928920 TSecr=0 WS=128" "52744","25.694301","172.30.1.104","172.30.1.205","TCP","54","135 > 47772 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52745","25.694328","172.30.1.104","172.30.1.205","TCP","54","135 > 47772 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52746","25.694334","172.30.1.205","172.30.1.104","TCP","54","47772 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52747","25.694466","172.30.1.104","172.30.1.205","TCP","66","49671 > 40410 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52748","25.694474","172.30.1.205","172.30.1.104","TCP","54","40410 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52749","25.694829","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52750","25.695108","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52751","25.695117","172.30.1.205","172.30.1.104","TCP","54","40410 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52752","25.697038","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52753","25.697361","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52754","25.697367","172.30.1.205","172.30.1.104","TCP","54","40410 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52755","25.698723","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52756","25.702450","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52757","25.702465","172.30.1.205","172.30.1.104","TCP","54","40410 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52758","25.703511","172.30.1.205","172.30.1.104","TCP","74","47776 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928929 TSecr=0 WS=128" "52759","25.703823","172.30.1.104","172.30.1.205","TCP","66","135 > 47776 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52760","25.703836","172.30.1.205","172.30.1.104","TCP","54","47776 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52761","25.704203","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52762","25.704488","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52763","25.704497","172.30.1.205","172.30.1.104","TCP","54","47776 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52764","25.706769","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52765","25.707144","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52766","25.707151","172.30.1.205","172.30.1.104","TCP","54","47776 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52767","25.709012","172.30.1.205","172.30.1.104","TCP","54","47776 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52768","25.709124","172.30.1.205","172.30.1.104","TCP","74","40414 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928935 TSecr=0 WS=128" "52769","25.709309","172.30.1.104","172.30.1.205","TCP","54","135 > 47776 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52770","25.709352","172.30.1.104","172.30.1.205","TCP","54","135 > 47776 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52771","25.709357","172.30.1.205","172.30.1.104","TCP","54","47776 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52772","25.709458","172.30.1.104","172.30.1.205","TCP","66","49671 > 40414 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52773","25.709467","172.30.1.205","172.30.1.104","TCP","54","40414 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52774","25.709816","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52775","25.710100","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52776","25.710109","172.30.1.205","172.30.1.104","TCP","54","40414 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52777","25.712003","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52778","25.712379","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52779","25.712386","172.30.1.205","172.30.1.104","TCP","54","40414 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52780","25.713787","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52781","25.717652","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52782","25.717663","172.30.1.205","172.30.1.104","TCP","54","40414 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52783","25.718614","172.30.1.205","172.30.1.104","TCP","74","47780 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928945 TSecr=0 WS=128" "52784","25.718944","172.30.1.104","172.30.1.205","TCP","66","135 > 47780 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52785","25.718955","172.30.1.205","172.30.1.104","TCP","54","47780 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52786","25.719307","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52787","25.719594","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52788","25.719605","172.30.1.205","172.30.1.104","TCP","54","47780 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52789","25.721858","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52790","25.722226","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52791","25.722233","172.30.1.205","172.30.1.104","TCP","54","47780 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52792","25.724051","172.30.1.205","172.30.1.104","TCP","54","47780 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52793","25.724162","172.30.1.205","172.30.1.104","TCP","74","40418 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928950 TSecr=0 WS=128" "52794","25.724311","172.30.1.104","172.30.1.205","TCP","54","135 > 47780 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52795","25.724322","172.30.1.104","172.30.1.205","TCP","54","135 > 47780 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52796","25.724327","172.30.1.205","172.30.1.104","TCP","54","47780 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52797","25.724421","172.30.1.104","172.30.1.205","TCP","66","49671 > 40418 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52798","25.724429","172.30.1.205","172.30.1.104","TCP","54","40418 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52799","25.724793","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52800","25.725058","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52801","25.725067","172.30.1.205","172.30.1.104","TCP","54","40418 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52802","25.726968","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52803","25.727362","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52804","25.727368","172.30.1.205","172.30.1.104","TCP","54","40418 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52805","25.728752","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52806","25.732656","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52807","25.732665","172.30.1.205","172.30.1.104","TCP","54","40418 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52808","25.733629","172.30.1.205","172.30.1.104","TCP","74","47784 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928960 TSecr=0 WS=128" "52809","25.733894","172.30.1.104","172.30.1.205","TCP","66","135 > 47784 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52810","25.733905","172.30.1.205","172.30.1.104","TCP","54","47784 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52811","25.734270","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52812","25.734529","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52813","25.734537","172.30.1.205","172.30.1.104","TCP","54","47784 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52814","25.736738","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52815","25.737140","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52816","25.737150","172.30.1.205","172.30.1.104","TCP","54","47784 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52817","25.739045","172.30.1.205","172.30.1.104","TCP","54","47784 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52818","25.739169","172.30.1.205","172.30.1.104","TCP","74","40422 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928965 TSecr=0 WS=128" "52819","25.739332","172.30.1.104","172.30.1.205","TCP","54","135 > 47784 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52820","25.739342","172.30.1.104","172.30.1.205","TCP","54","135 > 47784 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52821","25.739347","172.30.1.205","172.30.1.104","TCP","54","47784 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52822","25.739459","172.30.1.104","172.30.1.205","TCP","66","49671 > 40422 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52823","25.739467","172.30.1.205","172.30.1.104","TCP","54","40422 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52824","25.739816","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52825","25.740074","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52826","25.740081","172.30.1.205","172.30.1.104","TCP","54","40422 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52827","25.742036","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52828","25.742417","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52829","25.742423","172.30.1.205","172.30.1.104","TCP","54","40422 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52830","25.743777","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52831","25.747676","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52832","25.747687","172.30.1.205","172.30.1.104","TCP","54","40422 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52833","25.748650","172.30.1.205","172.30.1.104","TCP","74","47788 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928975 TSecr=0 WS=128" "52834","25.748968","172.30.1.104","172.30.1.205","TCP","66","135 > 47788 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52835","25.748980","172.30.1.205","172.30.1.104","TCP","54","47788 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52836","25.749341","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52837","25.749626","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52838","25.749636","172.30.1.205","172.30.1.104","TCP","54","47788 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52839","25.751844","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52840","25.752240","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52841","25.752247","172.30.1.205","172.30.1.104","TCP","54","47788 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52842","25.754106","172.30.1.205","172.30.1.104","TCP","54","47788 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52843","25.754218","172.30.1.205","172.30.1.104","TCP","74","40426 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928980 TSecr=0 WS=128" "52844","25.754361","172.30.1.104","172.30.1.205","TCP","54","135 > 47788 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52845","25.754375","172.30.1.104","172.30.1.205","TCP","54","135 > 47788 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52846","25.754380","172.30.1.205","172.30.1.104","TCP","54","47788 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52847","25.754476","172.30.1.104","172.30.1.205","TCP","66","49671 > 40426 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52848","25.754484","172.30.1.205","172.30.1.104","TCP","54","40426 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52849","25.754845","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52850","25.755174","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52851","25.755183","172.30.1.205","172.30.1.104","TCP","54","40426 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52852","25.757102","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52853","25.757456","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52854","25.757463","172.30.1.205","172.30.1.104","TCP","54","40426 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52855","25.758819","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52856","25.762637","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52857","25.762649","172.30.1.205","172.30.1.104","TCP","54","40426 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52858","25.763613","172.30.1.205","172.30.1.104","TCP","74","47792 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928990 TSecr=0 WS=128" "52859","25.763962","172.30.1.104","172.30.1.205","TCP","66","135 > 47792 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52860","25.763973","172.30.1.205","172.30.1.104","TCP","54","47792 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52861","25.764330","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52862","25.764614","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52863","25.764623","172.30.1.205","172.30.1.104","TCP","54","47792 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52864","25.766868","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52865","25.767236","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52866","25.767242","172.30.1.205","172.30.1.104","TCP","54","47792 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52867","25.769093","172.30.1.205","172.30.1.104","TCP","54","47792 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52868","25.769205","172.30.1.205","172.30.1.104","TCP","74","40430 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499928995 TSecr=0 WS=128" "52869","25.769341","172.30.1.104","172.30.1.205","TCP","54","135 > 47792 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52870","25.769355","172.30.1.104","172.30.1.205","TCP","54","135 > 47792 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52871","25.769361","172.30.1.205","172.30.1.104","TCP","54","47792 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52872","25.769482","172.30.1.104","172.30.1.205","TCP","66","49671 > 40430 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52873","25.769490","172.30.1.205","172.30.1.104","TCP","54","40430 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52874","25.769839","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52875","25.770137","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52876","25.770146","172.30.1.205","172.30.1.104","TCP","54","40430 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52877","25.772047","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52878","25.772411","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52879","25.772417","172.30.1.205","172.30.1.104","TCP","54","40430 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52880","25.773854","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52881","25.777706","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52882","25.777720","172.30.1.205","172.30.1.104","TCP","54","40430 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52883","25.778773","172.30.1.205","172.30.1.104","TCP","74","47796 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929005 TSecr=0 WS=128" "52884","25.779085","172.30.1.104","172.30.1.205","TCP","66","135 > 47796 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52885","25.779096","172.30.1.205","172.30.1.104","TCP","54","47796 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52886","25.779460","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52887","25.782893","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52888","25.782903","172.30.1.205","172.30.1.104","TCP","54","47796 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52889","25.785173","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52890","25.785603","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52891","25.785610","172.30.1.205","172.30.1.104","TCP","54","47796 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52892","25.787450","172.30.1.205","172.30.1.104","TCP","54","47796 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52893","25.787562","172.30.1.205","172.30.1.104","TCP","74","40434 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929013 TSecr=0 WS=128" "52894","25.787779","172.30.1.104","172.30.1.205","TCP","54","135 > 47796 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52895","25.787921","172.30.1.104","172.30.1.205","TCP","54","135 > 47796 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52896","25.787927","172.30.1.205","172.30.1.104","TCP","54","47796 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52897","25.787932","172.30.1.104","172.30.1.205","TCP","66","49671 > 40434 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52898","25.787941","172.30.1.205","172.30.1.104","TCP","54","40434 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52899","25.788301","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52900","25.788622","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52901","25.788631","172.30.1.205","172.30.1.104","TCP","54","40434 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52902","25.790529","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52903","25.791335","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52904","25.791342","172.30.1.205","172.30.1.104","TCP","54","40434 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52905","25.792702","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52906","25.797704","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52907","25.797718","172.30.1.205","172.30.1.104","TCP","54","40434 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52908","25.798792","172.30.1.205","172.30.1.104","TCP","74","47800 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929025 TSecr=0 WS=128" "52909","25.799273","172.30.1.104","172.30.1.205","TCP","66","135 > 47800 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52910","25.799287","172.30.1.205","172.30.1.104","TCP","54","47800 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52911","25.799650","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52912","25.799931","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52913","25.799940","172.30.1.205","172.30.1.104","TCP","54","47800 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52914","25.802204","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52915","25.803119","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52916","25.803126","172.30.1.205","172.30.1.104","TCP","54","47800 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52917","25.803996","172.30.1.205","172.30.1.104","TCP","54","40394 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52918","25.804046","172.30.1.205","172.30.1.104","TCP","54","40398 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52919","25.804073","172.30.1.205","172.30.1.104","TCP","54","40402 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52920","25.804114","172.30.1.205","172.30.1.104","TCP","54","40406 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52921","25.804147","172.30.1.205","172.30.1.104","TCP","54","40410 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52922","25.804171","172.30.1.205","172.30.1.104","TCP","54","40414 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52923","25.804199","172.30.1.205","172.30.1.104","TCP","54","40418 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52924","25.804222","172.30.1.205","172.30.1.104","TCP","54","40422 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52925","25.804244","172.30.1.205","172.30.1.104","TCP","54","40426 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52926","25.804271","172.30.1.205","172.30.1.104","TCP","54","40430 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52927","25.804293","172.30.1.205","172.30.1.104","TCP","54","40434 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52928","25.804376","172.30.1.205","172.30.1.104","TCP","54","40390 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "52929","25.804747","172.30.1.104","172.30.1.205","TCP","54","49671 > 40394 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52930","25.804789","172.30.1.104","172.30.1.205","TCP","54","49671 > 40398 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52931","25.804804","172.30.1.104","172.30.1.205","TCP","54","49671 > 40394 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52932","25.804812","172.30.1.205","172.30.1.104","TCP","54","40394 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52933","25.804822","172.30.1.104","172.30.1.205","TCP","54","49671 > 40402 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52934","25.804835","172.30.1.104","172.30.1.205","TCP","54","49671 > 40398 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52935","25.804837","172.30.1.205","172.30.1.104","TCP","54","40398 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52936","25.804907","172.30.1.104","172.30.1.205","TCP","54","49671 > 40406 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52937","25.804913","172.30.1.104","172.30.1.205","TCP","54","49671 > 40410 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52938","25.804926","172.30.1.104","172.30.1.205","TCP","54","49671 > 40414 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52939","25.804940","172.30.1.104","172.30.1.205","TCP","54","49671 > 40418 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52940","25.804990","172.30.1.104","172.30.1.205","TCP","54","49671 > 40422 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52941","25.805053","172.30.1.104","172.30.1.205","TCP","54","49671 > 40426 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52942","25.805083","172.30.1.104","172.30.1.205","TCP","54","49671 > 40430 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52943","25.805119","172.30.1.104","172.30.1.205","TCP","54","49671 > 40434 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52944","25.805148","172.30.1.104","172.30.1.205","TCP","54","49671 > 40390 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52945","25.805232","172.30.1.104","172.30.1.205","TCP","54","49671 > 40390 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52946","25.805237","172.30.1.205","172.30.1.104","TCP","54","40390 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52947","25.805246","172.30.1.104","172.30.1.205","TCP","54","49671 > 40434 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52948","25.805248","172.30.1.205","172.30.1.104","TCP","54","40434 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52949","25.805250","172.30.1.104","172.30.1.205","TCP","54","49671 > 40430 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52950","25.805251","172.30.1.205","172.30.1.104","TCP","54","40430 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52951","25.805253","172.30.1.104","172.30.1.205","TCP","54","49671 > 40426 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52952","25.805257","172.30.1.205","172.30.1.104","TCP","54","40426 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52953","25.805309","172.30.1.104","172.30.1.205","TCP","54","49671 > 40422 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52954","25.805312","172.30.1.205","172.30.1.104","TCP","54","40422 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52955","25.805417","172.30.1.104","172.30.1.205","TCP","54","49671 > 40418 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52956","25.805422","172.30.1.205","172.30.1.104","TCP","54","40418 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52957","25.805437","172.30.1.104","172.30.1.205","TCP","54","49671 > 40414 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52958","25.805439","172.30.1.205","172.30.1.104","TCP","54","40414 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52959","25.805458","172.30.1.104","172.30.1.205","TCP","54","49671 > 40410 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52960","25.805461","172.30.1.205","172.30.1.104","TCP","54","40410 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52961","25.805479","172.30.1.104","172.30.1.205","TCP","54","49671 > 40402 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52962","25.805482","172.30.1.205","172.30.1.104","TCP","54","40402 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52963","25.805499","172.30.1.104","172.30.1.205","TCP","54","49671 > 40406 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "52964","25.805502","172.30.1.205","172.30.1.104","TCP","54","40406 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "52965","25.805971","172.30.1.205","172.30.1.104","TCP","54","47800 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52966","25.806099","172.30.1.205","172.30.1.104","TCP","74","40438 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929032 TSecr=0 WS=128" "52967","25.806271","172.30.1.104","172.30.1.205","TCP","54","135 > 47800 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52968","25.806302","172.30.1.104","172.30.1.205","TCP","54","135 > 47800 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52969","25.806307","172.30.1.205","172.30.1.104","TCP","54","47800 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52970","25.806413","172.30.1.104","172.30.1.205","TCP","66","49671 > 40438 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52971","25.806422","172.30.1.205","172.30.1.104","TCP","54","40438 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52972","25.806776","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52973","25.807130","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52974","25.807139","172.30.1.205","172.30.1.104","TCP","54","40438 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52975","25.809056","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "52976","25.809423","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "52977","25.809430","172.30.1.205","172.30.1.104","TCP","54","40438 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "52978","25.810800","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "52979","25.815047","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "52980","25.815057","172.30.1.205","172.30.1.104","TCP","54","40438 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "52981","25.816015","172.30.1.205","172.30.1.104","TCP","74","47804 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929042 TSecr=0 WS=128" "52982","25.816385","172.30.1.104","172.30.1.205","TCP","66","135 > 47804 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52983","25.816398","172.30.1.205","172.30.1.104","TCP","54","47804 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52984","25.816761","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "52985","25.817102","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52986","25.817111","172.30.1.205","172.30.1.104","TCP","54","47804 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "52987","25.819295","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "52988","25.819750","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "52989","25.819756","172.30.1.205","172.30.1.104","TCP","54","47804 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "52990","25.821593","172.30.1.205","172.30.1.104","TCP","54","47804 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "52991","25.821705","172.30.1.205","172.30.1.104","TCP","74","40442 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929048 TSecr=0 WS=128" "52992","25.821896","172.30.1.104","172.30.1.205","TCP","54","135 > 47804 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52993","25.821907","172.30.1.104","172.30.1.205","TCP","54","135 > 47804 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "52994","25.821913","172.30.1.205","172.30.1.104","TCP","54","47804 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "52995","25.822032","172.30.1.104","172.30.1.205","TCP","66","49671 > 40442 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "52996","25.822041","172.30.1.205","172.30.1.104","TCP","54","40442 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "52997","25.822404","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "52998","25.822710","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "52999","25.822720","172.30.1.205","172.30.1.104","TCP","54","40442 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53000","25.824611","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53001","25.825032","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53002","25.825039","172.30.1.205","172.30.1.104","TCP","54","40442 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53003","25.826410","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53004","25.830353","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53005","25.830363","172.30.1.205","172.30.1.104","TCP","54","40442 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53006","25.831306","172.30.1.205","172.30.1.104","TCP","74","47808 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929057 TSecr=0 WS=128" "53007","25.831588","172.30.1.104","172.30.1.205","TCP","66","135 > 47808 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53008","25.831599","172.30.1.205","172.30.1.104","TCP","54","47808 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53009","25.831950","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53010","25.832240","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53011","25.832249","172.30.1.205","172.30.1.104","TCP","54","47808 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53012","25.834477","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53013","25.834898","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53014","25.834905","172.30.1.205","172.30.1.104","TCP","54","47808 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53015","25.836729","172.30.1.205","172.30.1.104","TCP","54","47808 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53016","25.836864","172.30.1.205","172.30.1.104","TCP","74","40446 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929063 TSecr=0 WS=128" "53017","25.836995","172.30.1.104","172.30.1.205","TCP","54","135 > 47808 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53018","25.837021","172.30.1.104","172.30.1.205","TCP","54","135 > 47808 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53019","25.837026","172.30.1.205","172.30.1.104","TCP","54","47808 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53020","25.837133","172.30.1.104","172.30.1.205","TCP","66","49671 > 40446 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53021","25.837142","172.30.1.205","172.30.1.104","TCP","54","40446 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53022","25.837494","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53023","25.837758","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53024","25.837767","172.30.1.205","172.30.1.104","TCP","54","40446 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53025","25.839641","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53026","25.840419","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53027","25.840425","172.30.1.205","172.30.1.104","TCP","54","40446 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53028","25.841832","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53029","25.847350","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53030","25.847365","172.30.1.205","172.30.1.104","TCP","54","40446 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53031","25.848453","172.30.1.205","172.30.1.104","TCP","74","47812 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929074 TSecr=0 WS=128" "53032","25.848812","172.30.1.104","172.30.1.205","TCP","66","135 > 47812 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53033","25.848824","172.30.1.205","172.30.1.104","TCP","54","47812 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53034","25.849191","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53035","25.849494","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53036","25.849503","172.30.1.205","172.30.1.104","TCP","54","47812 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53037","25.851742","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53038","25.852168","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53039","25.852174","172.30.1.205","172.30.1.104","TCP","54","47812 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53040","25.854039","172.30.1.205","172.30.1.104","TCP","54","47812 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53041","25.854166","172.30.1.205","172.30.1.104","TCP","74","40450 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929080 TSecr=0 WS=128" "53042","25.854326","172.30.1.104","172.30.1.205","TCP","54","135 > 47812 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53043","25.854336","172.30.1.104","172.30.1.205","TCP","54","135 > 47812 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53044","25.854344","172.30.1.205","172.30.1.104","TCP","54","47812 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53045","25.854471","172.30.1.104","172.30.1.205","TCP","66","49671 > 40450 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53046","25.854480","172.30.1.205","172.30.1.104","TCP","54","40450 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53047","25.854857","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53048","25.855859","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53049","25.855868","172.30.1.205","172.30.1.104","TCP","54","40450 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53050","25.857794","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53051","25.858179","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53052","25.858186","172.30.1.205","172.30.1.104","TCP","54","40450 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53053","25.859584","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53054","25.863578","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53055","25.863589","172.30.1.205","172.30.1.104","TCP","54","40450 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53056","25.864614","172.30.1.205","172.30.1.104","TCP","74","47816 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929091 TSecr=0 WS=128" "53057","25.864991","172.30.1.104","172.30.1.205","TCP","66","135 > 47816 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53058","25.865003","172.30.1.205","172.30.1.104","TCP","54","47816 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53059","25.865371","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53060","25.865693","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53061","25.865702","172.30.1.205","172.30.1.104","TCP","54","47816 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53062","25.867934","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53063","25.868344","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53064","25.868352","172.30.1.205","172.30.1.104","TCP","54","47816 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53065","25.870219","172.30.1.205","172.30.1.104","TCP","54","47816 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53066","25.870360","172.30.1.205","172.30.1.104","TCP","74","40454 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929096 TSecr=0 WS=128" "53067","25.870603","172.30.1.104","172.30.1.205","TCP","54","135 > 47816 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53068","25.870614","172.30.1.104","172.30.1.205","TCP","54","135 > 47816 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53069","25.870622","172.30.1.205","172.30.1.104","TCP","54","47816 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53070","25.870700","172.30.1.104","172.30.1.205","TCP","66","49671 > 40454 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53071","25.870708","172.30.1.205","172.30.1.104","TCP","54","40454 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53072","25.871062","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53073","25.871349","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53074","25.871358","172.30.1.205","172.30.1.104","TCP","54","40454 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53075","25.873295","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53076","25.873655","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53077","25.873661","172.30.1.205","172.30.1.104","TCP","54","40454 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53078","25.875061","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53079","25.879082","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53080","25.879097","172.30.1.205","172.30.1.104","TCP","54","40454 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53081","25.880215","172.30.1.205","172.30.1.104","TCP","74","47820 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929106 TSecr=0 WS=128" "53082","25.880559","172.30.1.104","172.30.1.205","TCP","66","135 > 47820 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53083","25.880572","172.30.1.205","172.30.1.104","TCP","54","47820 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53084","25.880974","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53085","25.881366","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53086","25.881376","172.30.1.205","172.30.1.104","TCP","54","47820 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53087","25.883668","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53088","25.884082","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53089","25.884089","172.30.1.205","172.30.1.104","TCP","54","47820 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53090","25.885967","172.30.1.205","172.30.1.104","TCP","54","47820 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53091","25.886109","172.30.1.205","172.30.1.104","TCP","74","40458 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929112 TSecr=0 WS=128" "53092","25.886257","172.30.1.104","172.30.1.205","TCP","54","135 > 47820 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53093","25.886268","172.30.1.104","172.30.1.205","TCP","54","135 > 47820 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53094","25.886276","172.30.1.205","172.30.1.104","TCP","54","47820 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53095","25.886394","172.30.1.104","172.30.1.205","TCP","66","49671 > 40458 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53096","25.886403","172.30.1.205","172.30.1.104","TCP","54","40458 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53097","25.886751","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53098","25.887022","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53099","25.887031","172.30.1.205","172.30.1.104","TCP","54","40458 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53100","25.888966","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53101","25.889322","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53102","25.889329","172.30.1.205","172.30.1.104","TCP","54","40458 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53103","25.890707","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53104","25.894712","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53105","25.894723","172.30.1.205","172.30.1.104","TCP","54","40458 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53106","25.895721","172.30.1.205","172.30.1.104","TCP","74","47824 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929122 TSecr=0 WS=128" "53107","25.896015","172.30.1.104","172.30.1.205","TCP","66","135 > 47824 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53108","25.896026","172.30.1.205","172.30.1.104","TCP","54","47824 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53109","25.896380","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53110","25.896663","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53111","25.896672","172.30.1.205","172.30.1.104","TCP","54","47824 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53112","25.898909","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53113","25.899356","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53114","25.899366","172.30.1.205","172.30.1.104","TCP","54","47824 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53115","25.901306","172.30.1.205","172.30.1.104","TCP","54","47824 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53116","25.901438","172.30.1.205","172.30.1.104","TCP","74","40462 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929127 TSecr=0 WS=128" "53117","25.901654","172.30.1.104","172.30.1.205","TCP","54","135 > 47824 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53118","25.901664","172.30.1.104","172.30.1.205","TCP","54","135 > 47824 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53119","25.901671","172.30.1.205","172.30.1.104","TCP","54","47824 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53120","25.901814","172.30.1.104","172.30.1.205","TCP","66","49671 > 40462 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53121","25.901831","172.30.1.205","172.30.1.104","TCP","54","40462 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53122","25.902181","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53123","25.902441","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53124","25.902451","172.30.1.205","172.30.1.104","TCP","54","40462 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53125","25.904359","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53126","25.904738","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53127","25.904745","172.30.1.205","172.30.1.104","TCP","54","40462 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53128","25.906130","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53129","25.910080","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53130","25.910091","172.30.1.205","172.30.1.104","TCP","54","40462 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53131","25.911102","172.30.1.205","172.30.1.104","TCP","74","47828 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929137 TSecr=0 WS=128" "53132","25.911453","172.30.1.104","172.30.1.205","TCP","66","135 > 47828 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53133","25.911464","172.30.1.205","172.30.1.104","TCP","54","47828 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53134","25.911828","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53135","25.912162","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53136","25.912170","172.30.1.205","172.30.1.104","TCP","54","47828 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53137","25.914422","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53138","25.914838","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53139","25.914845","172.30.1.205","172.30.1.104","TCP","54","47828 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53140","25.916649","172.30.1.205","172.30.1.104","TCP","54","47828 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53141","25.916762","172.30.1.205","172.30.1.104","TCP","74","40466 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929143 TSecr=0 WS=128" "53142","25.916947","172.30.1.104","172.30.1.205","TCP","54","135 > 47828 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53143","25.916957","172.30.1.104","172.30.1.205","TCP","54","135 > 47828 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53144","25.916963","172.30.1.205","172.30.1.104","TCP","54","47828 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53145","25.917081","172.30.1.104","172.30.1.205","TCP","66","49671 > 40466 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53146","25.917089","172.30.1.205","172.30.1.104","TCP","54","40466 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53147","25.917446","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53148","25.917763","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53149","25.917774","172.30.1.205","172.30.1.104","TCP","54","40466 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53150","25.919670","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53151","25.921251","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53152","25.921258","172.30.1.205","172.30.1.104","TCP","54","40466 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53153","25.922634","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53154","25.926494","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53155","25.926505","172.30.1.205","172.30.1.104","TCP","54","40466 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53156","25.927481","172.30.1.205","172.30.1.104","TCP","74","47832 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929153 TSecr=0 WS=128" "53157","25.927769","172.30.1.104","172.30.1.205","TCP","66","135 > 47832 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53158","25.927779","172.30.1.205","172.30.1.104","TCP","54","47832 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53159","25.928136","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53160","25.928418","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53161","25.928427","172.30.1.205","172.30.1.104","TCP","54","47832 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53162","25.930632","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53163","25.931050","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53164","25.931057","172.30.1.205","172.30.1.104","TCP","54","47832 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53165","25.932891","172.30.1.205","172.30.1.104","TCP","54","47832 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53166","25.933003","172.30.1.205","172.30.1.104","TCP","74","40470 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929159 TSecr=0 WS=128" "53167","25.933169","172.30.1.104","172.30.1.205","TCP","54","135 > 47832 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53168","25.933179","172.30.1.104","172.30.1.205","TCP","54","135 > 47832 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53169","25.933185","172.30.1.205","172.30.1.104","TCP","54","47832 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53170","25.933280","172.30.1.104","172.30.1.205","TCP","66","49671 > 40470 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53171","25.933288","172.30.1.205","172.30.1.104","TCP","54","40470 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53172","25.933637","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53173","25.933937","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53174","25.933946","172.30.1.205","172.30.1.104","TCP","54","40470 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53175","25.935804","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53176","25.936244","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53177","25.936254","172.30.1.205","172.30.1.104","TCP","54","40470 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53178","25.937737","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53179","25.942404","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53180","25.942415","172.30.1.205","172.30.1.104","TCP","54","40470 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53181","25.943403","172.30.1.205","172.30.1.104","TCP","74","47836 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929169 TSecr=0 WS=128" "53182","25.943721","172.30.1.104","172.30.1.205","TCP","66","135 > 47836 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53183","25.943732","172.30.1.205","172.30.1.104","TCP","54","47836 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53184","25.944082","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53185","25.944410","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53186","25.944420","172.30.1.205","172.30.1.104","TCP","54","47836 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53187","25.946638","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53188","25.947070","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53189","25.947077","172.30.1.205","172.30.1.104","TCP","54","47836 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53190","25.948896","172.30.1.205","172.30.1.104","TCP","54","47836 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53191","25.949005","172.30.1.205","172.30.1.104","TCP","74","40474 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929175 TSecr=0 WS=128" "53192","25.949161","172.30.1.104","172.30.1.205","TCP","54","135 > 47836 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53193","25.949214","172.30.1.104","172.30.1.205","TCP","54","135 > 47836 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53194","25.949220","172.30.1.205","172.30.1.104","TCP","54","47836 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53195","25.949296","172.30.1.104","172.30.1.205","TCP","66","49671 > 40474 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53196","25.949304","172.30.1.205","172.30.1.104","TCP","54","40474 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53197","25.949655","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53198","25.949937","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53199","25.949946","172.30.1.205","172.30.1.104","TCP","54","40474 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53200","25.951843","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53201","25.952200","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53202","25.952206","172.30.1.205","172.30.1.104","TCP","54","40474 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53203","25.953623","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53204","25.957576","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53205","25.957586","172.30.1.205","172.30.1.104","TCP","54","40474 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53206","25.958543","172.30.1.205","172.30.1.104","TCP","74","47840 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929184 TSecr=0 WS=128" "53207","25.958859","172.30.1.104","172.30.1.205","TCP","66","135 > 47840 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53208","25.958870","172.30.1.205","172.30.1.104","TCP","54","47840 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53209","25.959218","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53210","25.959536","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53211","25.959545","172.30.1.205","172.30.1.104","TCP","54","47840 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53212","25.961761","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53213","25.962158","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53214","25.962165","172.30.1.205","172.30.1.104","TCP","54","47840 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53215","25.963960","172.30.1.205","172.30.1.104","TCP","54","47840 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53216","25.964070","172.30.1.205","172.30.1.104","TCP","74","40478 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929190 TSecr=0 WS=128" "53217","25.964205","172.30.1.104","172.30.1.205","TCP","54","135 > 47840 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53218","25.964245","172.30.1.104","172.30.1.205","TCP","54","135 > 47840 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53219","25.964251","172.30.1.205","172.30.1.104","TCP","54","47840 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53220","25.964337","172.30.1.104","172.30.1.205","TCP","66","49671 > 40478 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53221","25.964345","172.30.1.205","172.30.1.104","TCP","54","40478 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53222","25.964689","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53223","25.964976","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53224","25.964983","172.30.1.205","172.30.1.104","TCP","54","40478 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53225","25.966866","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53226","25.967211","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53227","25.967217","172.30.1.205","172.30.1.104","TCP","54","40478 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53228","25.968557","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53229","25.972456","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53230","25.972469","172.30.1.205","172.30.1.104","TCP","54","40478 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53231","25.973737","172.30.1.205","172.30.1.104","TCP","74","47844 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929200 TSecr=0 WS=128" "53232","25.974008","172.30.1.104","172.30.1.205","TCP","66","135 > 47844 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53233","25.974019","172.30.1.205","172.30.1.104","TCP","54","47844 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53234","25.974368","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53235","25.974671","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53236","25.974680","172.30.1.205","172.30.1.104","TCP","54","47844 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53237","25.976879","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53238","25.977248","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53239","25.977260","172.30.1.205","172.30.1.104","TCP","54","47844 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53240","25.979066","172.30.1.205","172.30.1.104","TCP","54","47844 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53241","25.979175","172.30.1.205","172.30.1.104","TCP","74","40482 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929205 TSecr=0 WS=128" "53242","25.979321","172.30.1.104","172.30.1.205","TCP","54","135 > 47844 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53243","25.979337","172.30.1.104","172.30.1.205","TCP","54","135 > 47844 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53244","25.979342","172.30.1.205","172.30.1.104","TCP","54","47844 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53245","25.979443","172.30.1.104","172.30.1.205","TCP","66","49671 > 40482 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53246","25.979451","172.30.1.205","172.30.1.104","TCP","54","40482 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53247","25.979792","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53248","25.980055","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53249","25.980065","172.30.1.205","172.30.1.104","TCP","54","40482 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53250","25.981968","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53251","25.982357","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53252","25.982363","172.30.1.205","172.30.1.104","TCP","54","40482 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53253","25.983695","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53254","25.987711","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53255","25.987720","172.30.1.205","172.30.1.104","TCP","54","40482 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53256","25.988654","172.30.1.205","172.30.1.104","TCP","74","47848 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929215 TSecr=0 WS=128" "53257","25.988978","172.30.1.104","172.30.1.205","TCP","66","135 > 47848 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53258","25.988989","172.30.1.205","172.30.1.104","TCP","54","47848 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53259","25.989356","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53260","25.989727","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53261","25.989738","172.30.1.205","172.30.1.104","TCP","54","47848 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53262","25.991999","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53263","25.992368","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53264","25.992379","172.30.1.205","172.30.1.104","TCP","54","47848 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53265","25.993335","172.30.1.205","172.30.1.104","TCP","54","40438 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53266","25.993385","172.30.1.205","172.30.1.104","TCP","54","40442 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53267","25.993425","172.30.1.205","172.30.1.104","TCP","54","40446 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53268","25.993461","172.30.1.205","172.30.1.104","TCP","54","40450 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53269","25.993494","172.30.1.205","172.30.1.104","TCP","54","40454 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53270","25.993526","172.30.1.205","172.30.1.104","TCP","54","40458 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53271","25.993549","172.30.1.205","172.30.1.104","TCP","54","40462 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53272","25.993581","172.30.1.205","172.30.1.104","TCP","54","40466 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53273","25.993604","172.30.1.205","172.30.1.104","TCP","54","40470 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53274","25.993630","172.30.1.104","172.30.1.205","TCP","54","49671 > 40438 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53275","25.993644","172.30.1.205","172.30.1.104","TCP","54","40474 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53276","25.993661","172.30.1.104","172.30.1.205","TCP","54","49671 > 40442 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53277","25.993692","172.30.1.205","172.30.1.104","TCP","54","40478 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53278","25.993720","172.30.1.205","172.30.1.104","TCP","54","40482 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53279","25.993768","172.30.1.104","172.30.1.205","TCP","54","49671 > 40446 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53280","25.993788","172.30.1.104","172.30.1.205","TCP","54","49671 > 40438 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53281","25.993795","172.30.1.205","172.30.1.104","TCP","54","40438 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53282","25.993808","172.30.1.104","172.30.1.205","TCP","54","49671 > 40442 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53283","25.993811","172.30.1.205","172.30.1.104","TCP","54","40442 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53284","25.993829","172.30.1.104","172.30.1.205","TCP","54","49671 > 40446 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53285","25.993833","172.30.1.205","172.30.1.104","TCP","54","40446 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53286","25.993962","172.30.1.104","172.30.1.205","TCP","54","49671 > 40450 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53287","25.993982","172.30.1.104","172.30.1.205","TCP","54","49671 > 40454 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53288","25.994002","172.30.1.104","172.30.1.205","TCP","54","49671 > 40458 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53289","25.994023","172.30.1.104","172.30.1.205","TCP","54","49671 > 40462 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53290","25.994043","172.30.1.104","172.30.1.205","TCP","54","49671 > 40466 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53291","25.994175","172.30.1.104","172.30.1.205","TCP","54","49671 > 40470 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53292","25.994194","172.30.1.104","172.30.1.205","TCP","54","49671 > 40474 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53293","25.994215","172.30.1.104","172.30.1.205","TCP","54","49671 > 40474 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53294","25.994220","172.30.1.205","172.30.1.104","TCP","54","40474 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53295","25.994235","172.30.1.104","172.30.1.205","TCP","54","49671 > 40470 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53296","25.994238","172.30.1.205","172.30.1.104","TCP","54","40470 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53297","25.994259","172.30.1.104","172.30.1.205","TCP","54","49671 > 40466 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53298","25.994262","172.30.1.205","172.30.1.104","TCP","54","40466 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53299","25.994278","172.30.1.104","172.30.1.205","TCP","54","49671 > 40462 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53300","25.994281","172.30.1.205","172.30.1.104","TCP","54","40462 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53301","25.994299","172.30.1.104","172.30.1.205","TCP","54","49671 > 40450 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53302","25.994302","172.30.1.205","172.30.1.104","TCP","54","40450 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53303","25.994359","172.30.1.104","172.30.1.205","TCP","54","49671 > 40454 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53304","25.994363","172.30.1.205","172.30.1.104","TCP","54","40454 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53305","25.994368","172.30.1.104","172.30.1.205","TCP","54","49671 > 40458 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53306","25.994370","172.30.1.205","172.30.1.104","TCP","54","40458 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53307","25.994481","172.30.1.104","172.30.1.205","TCP","54","49671 > 40478 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53308","25.994499","172.30.1.104","172.30.1.205","TCP","54","49671 > 40482 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53309","25.994521","172.30.1.104","172.30.1.205","TCP","54","49671 > 40478 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53310","25.994526","172.30.1.205","172.30.1.104","TCP","54","40478 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53311","25.994541","172.30.1.104","172.30.1.205","TCP","54","49671 > 40482 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53312","25.994544","172.30.1.205","172.30.1.104","TCP","54","40482 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53313","25.995317","172.30.1.205","172.30.1.104","TCP","54","47848 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53314","25.995437","172.30.1.205","172.30.1.104","TCP","74","40486 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929221 TSecr=0 WS=128" "53315","25.995559","172.30.1.104","172.30.1.205","TCP","54","135 > 47848 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53316","25.995589","172.30.1.104","172.30.1.205","TCP","54","135 > 47848 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53317","25.995594","172.30.1.205","172.30.1.104","TCP","54","47848 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53318","25.995725","172.30.1.104","172.30.1.205","TCP","66","49671 > 40486 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53319","25.995734","172.30.1.205","172.30.1.104","TCP","54","40486 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53320","25.996097","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53321","25.996384","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53322","25.996393","172.30.1.205","172.30.1.104","TCP","54","40486 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53323","25.998308","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53324","25.998669","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53325","25.998676","172.30.1.205","172.30.1.104","TCP","54","40486 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53326","26.000033","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53327","26.003894","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53328","26.003904","172.30.1.205","172.30.1.104","TCP","54","40486 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53329","26.004878","172.30.1.205","172.30.1.104","TCP","74","47852 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929231 TSecr=0 WS=128" "53330","26.005281","172.30.1.104","172.30.1.205","TCP","66","135 > 47852 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53331","26.005293","172.30.1.205","172.30.1.104","TCP","54","47852 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53332","26.005669","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53333","26.006019","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53334","26.006028","172.30.1.205","172.30.1.104","TCP","54","47852 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53335","26.008220","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53336","26.008626","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53337","26.008632","172.30.1.205","172.30.1.104","TCP","54","47852 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53338","26.010463","172.30.1.205","172.30.1.104","TCP","54","47852 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53339","26.010576","172.30.1.205","172.30.1.104","TCP","74","40490 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929237 TSecr=0 WS=128" "53340","26.010771","172.30.1.104","172.30.1.205","TCP","54","135 > 47852 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53341","26.010782","172.30.1.104","172.30.1.205","TCP","54","135 > 47852 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53342","26.010788","172.30.1.205","172.30.1.104","TCP","54","47852 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53343","26.011587","172.30.1.104","172.30.1.205","TCP","66","49671 > 40490 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53344","26.011598","172.30.1.205","172.30.1.104","TCP","54","40490 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53345","26.011970","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53346","26.012338","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53347","26.012347","172.30.1.205","172.30.1.104","TCP","54","40490 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53348","26.014281","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53349","26.014676","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53350","26.014683","172.30.1.205","172.30.1.104","TCP","54","40490 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53351","26.016042","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53352","26.020009","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53353","26.020021","172.30.1.205","172.30.1.104","TCP","54","40490 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53354","26.021057","172.30.1.205","172.30.1.104","TCP","74","47856 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929247 TSecr=0 WS=128" "53355","26.021367","172.30.1.104","172.30.1.205","TCP","66","135 > 47856 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53356","26.021378","172.30.1.205","172.30.1.104","TCP","54","47856 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53357","26.021730","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53358","26.022015","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53359","26.022024","172.30.1.205","172.30.1.104","TCP","54","47856 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53360","26.024240","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53361","26.024684","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53362","26.024690","172.30.1.205","172.30.1.104","TCP","54","47856 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53363","26.026551","172.30.1.205","172.30.1.104","TCP","54","47856 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53364","26.026665","172.30.1.205","172.30.1.104","TCP","74","40494 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929253 TSecr=0 WS=128" "53365","26.026831","172.30.1.104","172.30.1.205","TCP","54","135 > 47856 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53366","26.026844","172.30.1.104","172.30.1.205","TCP","54","135 > 47856 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53367","26.026851","172.30.1.205","172.30.1.104","TCP","54","47856 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53368","26.027011","172.30.1.104","172.30.1.205","TCP","66","49671 > 40494 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53369","26.027020","172.30.1.205","172.30.1.104","TCP","54","40494 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53370","26.027380","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53371","26.027728","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53372","26.027737","172.30.1.205","172.30.1.104","TCP","54","40494 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53373","26.029642","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53374","26.030013","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53375","26.030019","172.30.1.205","172.30.1.104","TCP","54","40494 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53376","26.031374","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53377","26.035258","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53378","26.035267","172.30.1.205","172.30.1.104","TCP","54","40494 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53379","26.036214","172.30.1.205","172.30.1.104","TCP","74","47860 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929262 TSecr=0 WS=128" "53380","26.036542","172.30.1.104","172.30.1.205","TCP","66","135 > 47860 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53381","26.036554","172.30.1.205","172.30.1.104","TCP","54","47860 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53382","26.036936","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53383","26.037227","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53384","26.037236","172.30.1.205","172.30.1.104","TCP","54","47860 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53385","26.039439","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53386","26.039885","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53387","26.039892","172.30.1.205","172.30.1.104","TCP","54","47860 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53388","26.041753","172.30.1.205","172.30.1.104","TCP","54","47860 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53389","26.041863","172.30.1.205","172.30.1.104","TCP","74","40498 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929268 TSecr=0 WS=128" "53390","26.042059","172.30.1.104","172.30.1.205","TCP","54","135 > 47860 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53391","26.042108","172.30.1.104","172.30.1.205","TCP","54","135 > 47860 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53392","26.042114","172.30.1.205","172.30.1.104","TCP","54","47860 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53393","26.042135","172.30.1.104","172.30.1.205","TCP","66","49671 > 40498 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53394","26.042143","172.30.1.205","172.30.1.104","TCP","54","40498 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53395","26.042486","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53396","26.042798","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53397","26.042805","172.30.1.205","172.30.1.104","TCP","54","40498 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53398","26.044756","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53399","26.045176","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53400","26.045183","172.30.1.205","172.30.1.104","TCP","54","40498 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53401","26.046535","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53402","26.050443","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53403","26.050454","172.30.1.205","172.30.1.104","TCP","54","40498 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53404","26.051430","172.30.1.205","172.30.1.104","TCP","74","47864 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929277 TSecr=0 WS=128" "53405","26.051728","172.30.1.104","172.30.1.205","TCP","66","135 > 47864 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53406","26.051739","172.30.1.205","172.30.1.104","TCP","54","47864 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53407","26.052089","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53408","26.052387","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53409","26.052396","172.30.1.205","172.30.1.104","TCP","54","47864 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53410","26.054606","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53411","26.054996","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53412","26.055008","172.30.1.205","172.30.1.104","TCP","54","47864 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53413","26.057010","172.30.1.205","172.30.1.104","TCP","54","47864 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53414","26.057120","172.30.1.205","172.30.1.104","TCP","74","40502 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929283 TSecr=0 WS=128" "53415","26.057271","172.30.1.104","172.30.1.205","TCP","54","135 > 47864 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53416","26.057281","172.30.1.104","172.30.1.205","TCP","54","135 > 47864 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53417","26.057286","172.30.1.205","172.30.1.104","TCP","54","47864 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53418","26.057402","172.30.1.104","172.30.1.205","TCP","66","49671 > 40502 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53419","26.057410","172.30.1.205","172.30.1.104","TCP","54","40502 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53420","26.057767","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53421","26.059208","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53422","26.059215","172.30.1.205","172.30.1.104","TCP","54","40502 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53423","26.061120","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53424","26.061496","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53425","26.061502","172.30.1.205","172.30.1.104","TCP","54","40502 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53426","26.062874","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53427","26.066738","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53428","26.066757","172.30.1.205","172.30.1.104","TCP","54","40502 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53429","26.067720","172.30.1.205","172.30.1.104","TCP","74","47868 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929294 TSecr=0 WS=128" "53430","26.068055","172.30.1.104","172.30.1.205","TCP","66","135 > 47868 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53431","26.068067","172.30.1.205","172.30.1.104","TCP","54","47868 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53432","26.068428","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53433","26.068713","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53434","26.068722","172.30.1.205","172.30.1.104","TCP","54","47868 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53435","26.070938","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53436","26.071333","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53437","26.071340","172.30.1.205","172.30.1.104","TCP","54","47868 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53438","26.073216","172.30.1.205","172.30.1.104","TCP","54","47868 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53439","26.073331","172.30.1.205","172.30.1.104","TCP","74","40506 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929299 TSecr=0 WS=128" "53440","26.073466","172.30.1.104","172.30.1.205","TCP","54","135 > 47868 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53441","26.073478","172.30.1.104","172.30.1.205","TCP","54","135 > 47868 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53442","26.073484","172.30.1.205","172.30.1.104","TCP","54","47868 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53443","26.073596","172.30.1.104","172.30.1.205","TCP","66","49671 > 40506 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53444","26.073605","172.30.1.205","172.30.1.104","TCP","54","40506 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53445","26.073968","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53446","26.074252","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53447","26.074261","172.30.1.205","172.30.1.104","TCP","54","40506 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53448","26.076155","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53449","26.076527","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53450","26.076534","172.30.1.205","172.30.1.104","TCP","54","40506 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53451","26.077939","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53452","26.081860","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53453","26.081870","172.30.1.205","172.30.1.104","TCP","54","40506 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53454","26.082873","172.30.1.205","172.30.1.104","TCP","74","47872 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929309 TSecr=0 WS=128" "53455","26.083179","172.30.1.104","172.30.1.205","TCP","66","135 > 47872 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53456","26.083190","172.30.1.205","172.30.1.104","TCP","54","47872 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53457","26.083549","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53458","26.083871","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53459","26.083881","172.30.1.205","172.30.1.104","TCP","54","47872 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53460","26.086133","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53461","26.086543","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53462","26.086550","172.30.1.205","172.30.1.104","TCP","54","47872 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53463","26.088385","172.30.1.205","172.30.1.104","TCP","54","47872 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53464","26.088497","172.30.1.205","172.30.1.104","TCP","74","40510 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929314 TSecr=0 WS=128" "53465","26.088634","172.30.1.104","172.30.1.205","TCP","54","135 > 47872 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53466","26.088671","172.30.1.104","172.30.1.205","TCP","54","135 > 47872 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53467","26.088678","172.30.1.205","172.30.1.104","TCP","54","47872 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53468","26.088751","172.30.1.104","172.30.1.205","TCP","66","49671 > 40510 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53469","26.088759","172.30.1.205","172.30.1.104","TCP","54","40510 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53470","26.089139","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53471","26.089414","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53472","26.089422","172.30.1.205","172.30.1.104","TCP","54","40510 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53473","26.091321","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53474","26.091665","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53475","26.091672","172.30.1.205","172.30.1.104","TCP","54","40510 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53476","26.093069","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53477","26.096973","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53478","26.096982","172.30.1.205","172.30.1.104","TCP","54","40510 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53479","26.097956","172.30.1.205","172.30.1.104","TCP","74","47876 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929324 TSecr=0 WS=128" "53480","26.098261","172.30.1.104","172.30.1.205","TCP","66","135 > 47876 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53481","26.098272","172.30.1.205","172.30.1.104","TCP","54","47876 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53482","26.098627","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53483","26.098920","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53484","26.098929","172.30.1.205","172.30.1.104","TCP","54","47876 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53485","26.101154","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53486","26.101701","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53487","26.101712","172.30.1.205","172.30.1.104","TCP","54","47876 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53488","26.103643","172.30.1.205","172.30.1.104","TCP","54","47876 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53489","26.103791","172.30.1.205","172.30.1.104","TCP","74","40514 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929330 TSecr=0 WS=128" "53490","26.103900","172.30.1.104","172.30.1.205","TCP","54","135 > 47876 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53491","26.103943","172.30.1.104","172.30.1.205","TCP","54","135 > 47876 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53492","26.103956","172.30.1.205","172.30.1.104","TCP","54","47876 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53493","26.104107","172.30.1.104","172.30.1.205","TCP","66","49671 > 40514 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53494","26.104115","172.30.1.205","172.30.1.104","TCP","54","40514 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53495","26.104470","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53496","26.104978","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53497","26.104987","172.30.1.205","172.30.1.104","TCP","54","40514 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53498","26.106921","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53499","26.107317","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53500","26.107326","172.30.1.205","172.30.1.104","TCP","54","40514 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53501","26.108800","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53502","26.112686","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53503","26.112710","172.30.1.205","172.30.1.104","TCP","54","40514 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53504","26.113915","172.30.1.205","172.30.1.104","TCP","74","47880 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929340 TSecr=0 WS=128" "53505","26.114228","172.30.1.104","172.30.1.205","TCP","66","135 > 47880 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53506","26.114241","172.30.1.205","172.30.1.104","TCP","54","47880 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53507","26.114619","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53508","26.114968","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53509","26.114977","172.30.1.205","172.30.1.104","TCP","54","47880 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53510","26.117275","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53511","26.117696","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53512","26.117704","172.30.1.205","172.30.1.104","TCP","54","47880 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53513","26.119584","172.30.1.205","172.30.1.104","TCP","54","47880 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53514","26.119738","172.30.1.205","172.30.1.104","TCP","74","40518 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929346 TSecr=0 WS=128" "53515","26.119875","172.30.1.104","172.30.1.205","TCP","54","135 > 47880 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53516","26.119900","172.30.1.104","172.30.1.205","TCP","54","135 > 47880 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53517","26.119909","172.30.1.205","172.30.1.104","TCP","54","47880 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53518","26.120101","172.30.1.104","172.30.1.205","TCP","66","49671 > 40518 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53519","26.120109","172.30.1.205","172.30.1.104","TCP","54","40518 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53520","26.120461","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53521","26.120770","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53522","26.120788","172.30.1.205","172.30.1.104","TCP","54","40518 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53523","26.122693","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53524","26.123091","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53525","26.123098","172.30.1.205","172.30.1.104","TCP","54","40518 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53526","26.124461","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53527","26.128347","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53528","26.128358","172.30.1.205","172.30.1.104","TCP","54","40518 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53529","26.129385","172.30.1.205","172.30.1.104","TCP","74","47884 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929355 TSecr=0 WS=128" "53530","26.129719","172.30.1.104","172.30.1.205","TCP","66","135 > 47884 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53531","26.129740","172.30.1.205","172.30.1.104","TCP","54","47884 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53532","26.130331","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53533","26.130620","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53534","26.130628","172.30.1.205","172.30.1.104","TCP","54","47884 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53535","26.132856","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53536","26.133244","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53537","26.133256","172.30.1.205","172.30.1.104","TCP","54","47884 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53538","26.135294","172.30.1.205","172.30.1.104","TCP","54","47884 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53539","26.135408","172.30.1.205","172.30.1.104","TCP","74","40522 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929361 TSecr=0 WS=128" "53540","26.135569","172.30.1.104","172.30.1.205","TCP","54","135 > 47884 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53541","26.135622","172.30.1.104","172.30.1.205","TCP","54","135 > 47884 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53542","26.135628","172.30.1.205","172.30.1.104","TCP","54","47884 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53543","26.135697","172.30.1.104","172.30.1.205","TCP","66","49671 > 40522 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53544","26.135705","172.30.1.205","172.30.1.104","TCP","54","40522 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53545","26.136055","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53546","26.136382","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53547","26.136391","172.30.1.205","172.30.1.104","TCP","54","40522 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53548","26.138325","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53549","26.139654","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53550","26.139661","172.30.1.205","172.30.1.104","TCP","54","40522 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53551","26.141049","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53552","26.144904","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53553","26.144913","172.30.1.205","172.30.1.104","TCP","54","40522 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53554","26.145866","172.30.1.205","172.30.1.104","TCP","74","47888 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929372 TSecr=0 WS=128" "53555","26.146179","172.30.1.104","172.30.1.205","TCP","66","135 > 47888 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53556","26.146202","172.30.1.205","172.30.1.104","TCP","54","47888 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53557","26.146759","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53558","26.147055","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53559","26.147064","172.30.1.205","172.30.1.104","TCP","54","47888 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53560","26.149284","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53561","26.149703","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53562","26.149710","172.30.1.205","172.30.1.104","TCP","54","47888 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53563","26.151587","172.30.1.205","172.30.1.104","TCP","54","47888 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53564","26.151702","172.30.1.205","172.30.1.104","TCP","74","40526 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929378 TSecr=0 WS=128" "53565","26.151888","172.30.1.104","172.30.1.205","TCP","54","135 > 47888 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53566","26.151908","172.30.1.104","172.30.1.205","TCP","54","135 > 47888 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53567","26.151913","172.30.1.205","172.30.1.104","TCP","54","47888 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53568","26.151983","172.30.1.104","172.30.1.205","TCP","66","49671 > 40526 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53569","26.152003","172.30.1.205","172.30.1.104","TCP","54","40526 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53570","26.152379","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53571","26.152653","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53572","26.152661","172.30.1.205","172.30.1.104","TCP","54","40526 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53573","26.154603","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53574","26.154958","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53575","26.154970","172.30.1.205","172.30.1.104","TCP","54","40526 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53576","26.156509","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53577","26.160355","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53578","26.160364","172.30.1.205","172.30.1.104","TCP","54","40526 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53579","26.161351","172.30.1.205","172.30.1.104","TCP","74","47892 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929387 TSecr=0 WS=128" "53580","26.161678","172.30.1.104","172.30.1.205","TCP","66","135 > 47892 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53581","26.161691","172.30.1.205","172.30.1.104","TCP","54","47892 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53582","26.162053","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53583","26.162341","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53584","26.162350","172.30.1.205","172.30.1.104","TCP","54","47892 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53585","26.164577","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53586","26.164956","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53587","26.164963","172.30.1.205","172.30.1.104","TCP","54","47892 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53588","26.166801","172.30.1.205","172.30.1.104","TCP","54","47892 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53589","26.166940","172.30.1.205","172.30.1.104","TCP","74","40530 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929393 TSecr=0 WS=128" "53590","26.167057","172.30.1.104","172.30.1.205","TCP","54","135 > 47892 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53591","26.167070","172.30.1.104","172.30.1.205","TCP","54","135 > 47892 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53592","26.167077","172.30.1.205","172.30.1.104","TCP","54","47892 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53593","26.167230","172.30.1.104","172.30.1.205","TCP","66","49671 > 40530 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53594","26.167239","172.30.1.205","172.30.1.104","TCP","54","40530 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53595","26.167593","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53596","26.167881","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53597","26.167889","172.30.1.205","172.30.1.104","TCP","54","40530 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53598","26.169820","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53599","26.170203","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53600","26.170209","172.30.1.205","172.30.1.104","TCP","54","40530 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53601","26.171569","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53602","26.175512","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53603","26.175523","172.30.1.205","172.30.1.104","TCP","54","40530 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53604","26.176516","172.30.1.205","172.30.1.104","TCP","74","47896 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929402 TSecr=0 WS=128" "53605","26.176923","172.30.1.104","172.30.1.205","TCP","66","135 > 47896 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53606","26.176934","172.30.1.205","172.30.1.104","TCP","54","47896 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53607","26.177304","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53608","26.177619","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53609","26.177628","172.30.1.205","172.30.1.104","TCP","54","47896 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53610","26.179823","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53611","26.180218","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53612","26.180225","172.30.1.205","172.30.1.104","TCP","54","47896 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53613","26.181104","172.30.1.205","172.30.1.104","TCP","54","40490 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53614","26.181159","172.30.1.205","172.30.1.104","TCP","54","40494 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53615","26.181198","172.30.1.205","172.30.1.104","TCP","54","40498 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53616","26.181232","172.30.1.205","172.30.1.104","TCP","54","40502 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53617","26.181264","172.30.1.205","172.30.1.104","TCP","54","40506 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53618","26.181292","172.30.1.205","172.30.1.104","TCP","54","40510 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53619","26.181320","172.30.1.205","172.30.1.104","TCP","54","40514 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53620","26.181347","172.30.1.205","172.30.1.104","TCP","54","40518 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53621","26.181376","172.30.1.205","172.30.1.104","TCP","54","40522 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53622","26.181399","172.30.1.205","172.30.1.104","TCP","54","40526 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53623","26.181409","172.30.1.104","172.30.1.205","TCP","54","49671 > 40490 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53624","26.181440","172.30.1.104","172.30.1.205","TCP","54","49671 > 40490 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53625","26.181447","172.30.1.205","172.30.1.104","TCP","54","40490 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53626","26.181464","172.30.1.205","172.30.1.104","TCP","54","40530 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53627","26.181544","172.30.1.205","172.30.1.104","TCP","54","40486 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53628","26.181583","172.30.1.104","172.30.1.205","TCP","54","49671 > 40494 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53629","26.181601","172.30.1.104","172.30.1.205","TCP","54","49671 > 40498 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53630","26.181621","172.30.1.104","172.30.1.205","TCP","54","49671 > 40494 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53631","26.181626","172.30.1.205","172.30.1.104","TCP","54","40494 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53632","26.181641","172.30.1.104","172.30.1.205","TCP","54","49671 > 40498 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53633","26.181644","172.30.1.205","172.30.1.104","TCP","54","40498 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53634","26.181674","172.30.1.104","172.30.1.205","TCP","54","49671 > 40502 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53635","26.181693","172.30.1.104","172.30.1.205","TCP","54","49671 > 40506 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53636","26.181719","172.30.1.104","172.30.1.205","TCP","54","49671 > 40502 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53637","26.181724","172.30.1.205","172.30.1.104","TCP","54","40502 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53638","26.181740","172.30.1.104","172.30.1.205","TCP","54","49671 > 40510 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53639","26.181910","172.30.1.104","172.30.1.205","TCP","54","49671 > 40514 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53640","26.181916","172.30.1.104","172.30.1.205","TCP","54","49671 > 40506 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53641","26.181920","172.30.1.205","172.30.1.104","TCP","54","40506 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53642","26.181926","172.30.1.104","172.30.1.205","TCP","54","49671 > 40510 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53643","26.181928","172.30.1.205","172.30.1.104","TCP","54","40510 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53644","26.181933","172.30.1.104","172.30.1.205","TCP","54","49671 > 40514 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53645","26.181935","172.30.1.205","172.30.1.104","TCP","54","40514 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53646","26.181954","172.30.1.104","172.30.1.205","TCP","54","49671 > 40518 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53647","26.181972","172.30.1.104","172.30.1.205","TCP","54","49671 > 40522 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53648","26.181992","172.30.1.104","172.30.1.205","TCP","54","49671 > 40518 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53649","26.181997","172.30.1.205","172.30.1.104","TCP","54","40518 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53650","26.182011","172.30.1.104","172.30.1.205","TCP","54","49671 > 40526 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53651","26.182145","172.30.1.104","172.30.1.205","TCP","54","49671 > 40530 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53652","26.182164","172.30.1.104","172.30.1.205","TCP","54","49671 > 40530 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53653","26.182168","172.30.1.205","172.30.1.104","TCP","54","40530 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53654","26.182184","172.30.1.104","172.30.1.205","TCP","54","49671 > 40522 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53655","26.182186","172.30.1.205","172.30.1.104","TCP","54","40522 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53656","26.182220","172.30.1.104","172.30.1.205","TCP","54","49671 > 40526 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53657","26.182222","172.30.1.205","172.30.1.104","TCP","54","40526 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53658","26.182237","172.30.1.104","172.30.1.205","TCP","54","49671 > 40486 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53659","26.182364","172.30.1.104","172.30.1.205","TCP","54","49671 > 40486 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53660","26.182368","172.30.1.205","172.30.1.104","TCP","54","40486 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53661","26.183091","172.30.1.205","172.30.1.104","TCP","54","47896 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53662","26.183203","172.30.1.205","172.30.1.104","TCP","74","40534 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929409 TSecr=0 WS=128" "53663","26.183351","172.30.1.104","172.30.1.205","TCP","54","135 > 47896 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53664","26.183457","172.30.1.104","172.30.1.205","TCP","54","135 > 47896 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53665","26.183468","172.30.1.205","172.30.1.104","TCP","54","47896 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53666","26.183473","172.30.1.104","172.30.1.205","TCP","66","49671 > 40534 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53667","26.183481","172.30.1.205","172.30.1.104","TCP","54","40534 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53668","26.183835","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53669","26.184155","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53670","26.184162","172.30.1.205","172.30.1.104","TCP","54","40534 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53671","26.186087","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53672","26.186503","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53673","26.186510","172.30.1.205","172.30.1.104","TCP","54","40534 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53674","26.187875","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53675","26.191723","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53676","26.191734","172.30.1.205","172.30.1.104","TCP","54","40534 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53677","26.192705","172.30.1.205","172.30.1.104","TCP","74","47900 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929419 TSecr=0 WS=128" "53678","26.193095","172.30.1.104","172.30.1.205","TCP","66","135 > 47900 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53679","26.193107","172.30.1.205","172.30.1.104","TCP","54","47900 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53680","26.193476","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53681","26.193754","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53682","26.193763","172.30.1.205","172.30.1.104","TCP","54","47900 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53683","26.195960","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53684","26.196348","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53685","26.196355","172.30.1.205","172.30.1.104","TCP","54","47900 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53686","26.198180","172.30.1.205","172.30.1.104","TCP","54","47900 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53687","26.198292","172.30.1.205","172.30.1.104","TCP","74","40538 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929424 TSecr=0 WS=128" "53688","26.198434","172.30.1.104","172.30.1.205","TCP","54","135 > 47900 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53689","26.198444","172.30.1.104","172.30.1.205","TCP","54","135 > 47900 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53690","26.198450","172.30.1.205","172.30.1.104","TCP","54","47900 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53691","26.198553","172.30.1.104","172.30.1.205","TCP","66","49671 > 40538 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53692","26.198568","172.30.1.205","172.30.1.104","TCP","54","40538 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53693","26.198918","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53694","26.199190","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53695","26.199199","172.30.1.205","172.30.1.104","TCP","54","40538 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53696","26.201112","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53697","26.201465","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53698","26.201472","172.30.1.205","172.30.1.104","TCP","54","40538 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53699","26.202820","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53700","26.206804","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53701","26.206814","172.30.1.205","172.30.1.104","TCP","54","40538 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53702","26.207793","172.30.1.205","172.30.1.104","TCP","74","47904 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929434 TSecr=0 WS=128" "53703","26.208125","172.30.1.104","172.30.1.205","TCP","66","135 > 47904 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53704","26.208136","172.30.1.205","172.30.1.104","TCP","54","47904 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53705","26.208513","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53706","26.208848","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53707","26.208857","172.30.1.205","172.30.1.104","TCP","54","47904 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53708","26.211100","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53709","26.211479","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53710","26.211485","172.30.1.205","172.30.1.104","TCP","54","47904 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53711","26.213320","172.30.1.205","172.30.1.104","TCP","54","47904 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53712","26.213434","172.30.1.205","172.30.1.104","TCP","74","40542 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929439 TSecr=0 WS=128" "53713","26.213575","172.30.1.104","172.30.1.205","TCP","54","135 > 47904 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53714","26.213610","172.30.1.104","172.30.1.205","TCP","54","135 > 47904 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53715","26.213616","172.30.1.205","172.30.1.104","TCP","54","47904 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53716","26.213711","172.30.1.104","172.30.1.205","TCP","66","49671 > 40542 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53717","26.213719","172.30.1.205","172.30.1.104","TCP","54","40542 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53718","26.214064","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53719","26.214345","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53720","26.214353","172.30.1.205","172.30.1.104","TCP","54","40542 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53721","26.216253","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53722","26.216637","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53723","26.216643","172.30.1.205","172.30.1.104","TCP","54","40542 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53724","26.218024","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53725","26.221920","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53726","26.221929","172.30.1.205","172.30.1.104","TCP","54","40542 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53727","26.222881","172.30.1.205","172.30.1.104","TCP","74","47908 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929449 TSecr=0 WS=128" "53728","26.223169","172.30.1.104","172.30.1.205","TCP","66","135 > 47908 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53729","26.223180","172.30.1.205","172.30.1.104","TCP","54","47908 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53730","26.223525","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53731","26.223810","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53732","26.223818","172.30.1.205","172.30.1.104","TCP","54","47908 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53733","26.226047","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53734","26.226466","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53735","26.226473","172.30.1.205","172.30.1.104","TCP","54","47908 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53736","26.228304","172.30.1.205","172.30.1.104","TCP","54","47908 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53737","26.228414","172.30.1.205","172.30.1.104","TCP","74","40546 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929454 TSecr=0 WS=128" "53738","26.228604","172.30.1.104","172.30.1.205","TCP","54","135 > 47908 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53739","26.228646","172.30.1.104","172.30.1.205","TCP","54","135 > 47908 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53740","26.228651","172.30.1.205","172.30.1.104","TCP","54","47908 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53741","26.228726","172.30.1.104","172.30.1.205","TCP","66","49671 > 40546 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53742","26.228734","172.30.1.205","172.30.1.104","TCP","54","40546 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53743","26.229104","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53744","26.229396","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53745","26.229405","172.30.1.205","172.30.1.104","TCP","54","40546 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53746","26.231293","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53747","26.231690","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53748","26.231696","172.30.1.205","172.30.1.104","TCP","54","40546 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53749","26.233124","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53750","26.237915","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53751","26.237925","172.30.1.205","172.30.1.104","TCP","54","40546 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53752","26.238938","172.30.1.205","172.30.1.104","TCP","74","47912 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929465 TSecr=0 WS=128" "53753","26.239229","172.30.1.104","172.30.1.205","TCP","66","135 > 47912 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53754","26.239240","172.30.1.205","172.30.1.104","TCP","54","47912 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53755","26.239594","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53756","26.239889","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53757","26.239898","172.30.1.205","172.30.1.104","TCP","54","47912 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53758","26.242133","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53759","26.242616","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53760","26.242622","172.30.1.205","172.30.1.104","TCP","54","47912 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53761","26.244458","172.30.1.205","172.30.1.104","TCP","54","47912 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53762","26.244569","172.30.1.205","172.30.1.104","TCP","74","40550 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929470 TSecr=0 WS=128" "53763","26.244772","172.30.1.104","172.30.1.205","TCP","54","135 > 47912 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53764","26.244813","172.30.1.104","172.30.1.205","TCP","54","135 > 47912 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53765","26.244819","172.30.1.205","172.30.1.104","TCP","54","47912 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53766","26.244954","172.30.1.104","172.30.1.205","TCP","66","49671 > 40550 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53767","26.244970","172.30.1.205","172.30.1.104","TCP","54","40550 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53768","26.245569","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53769","26.245875","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53770","26.245883","172.30.1.205","172.30.1.104","TCP","54","40550 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53771","26.247749","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53772","26.248805","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53773","26.248810","172.30.1.205","172.30.1.104","TCP","54","40550 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53774","26.250172","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53775","26.254125","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53776","26.254135","172.30.1.205","172.30.1.104","TCP","54","40550 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53777","26.255094","172.30.1.205","172.30.1.104","TCP","74","47916 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929481 TSecr=0 WS=128" "53778","26.255443","172.30.1.104","172.30.1.205","TCP","66","135 > 47916 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53779","26.255455","172.30.1.205","172.30.1.104","TCP","54","47916 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53780","26.255811","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53781","26.256110","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53782","26.256119","172.30.1.205","172.30.1.104","TCP","54","47916 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53783","26.258333","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53784","26.258811","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53785","26.258817","172.30.1.205","172.30.1.104","TCP","54","47916 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53786","26.260636","172.30.1.205","172.30.1.104","TCP","54","47916 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53787","26.260749","172.30.1.205","172.30.1.104","TCP","74","40554 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929487 TSecr=0 WS=128" "53788","26.260923","172.30.1.104","172.30.1.205","TCP","54","135 > 47916 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53789","26.260950","172.30.1.104","172.30.1.205","TCP","54","135 > 47916 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53790","26.260956","172.30.1.205","172.30.1.104","TCP","54","47916 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53791","26.261024","172.30.1.104","172.30.1.205","TCP","66","49671 > 40554 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53792","26.261032","172.30.1.205","172.30.1.104","TCP","54","40554 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53793","26.261391","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53794","26.261705","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53795","26.261714","172.30.1.205","172.30.1.104","TCP","54","40554 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53796","26.263578","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53797","26.264004","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53798","26.264016","172.30.1.205","172.30.1.104","TCP","54","40554 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53799","26.265632","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53800","26.269584","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53801","26.269593","172.30.1.205","172.30.1.104","TCP","54","40554 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53802","26.270547","172.30.1.205","172.30.1.104","TCP","74","47920 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929496 TSecr=0 WS=128" "53803","26.270841","172.30.1.104","172.30.1.205","TCP","66","135 > 47920 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53804","26.270851","172.30.1.205","172.30.1.104","TCP","54","47920 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53805","26.271204","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53806","26.271542","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53807","26.271553","172.30.1.205","172.30.1.104","TCP","54","47920 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53808","26.273791","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53809","26.274182","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53810","26.274189","172.30.1.205","172.30.1.104","TCP","54","47920 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53811","26.276009","172.30.1.205","172.30.1.104","TCP","54","47920 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53812","26.276125","172.30.1.205","172.30.1.104","TCP","74","40558 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929502 TSecr=0 WS=128" "53813","26.276280","172.30.1.104","172.30.1.205","TCP","54","135 > 47920 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53814","26.276328","172.30.1.104","172.30.1.205","TCP","54","135 > 47920 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53815","26.276333","172.30.1.205","172.30.1.104","TCP","54","47920 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53816","26.276406","172.30.1.104","172.30.1.205","TCP","66","49671 > 40558 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53817","26.276414","172.30.1.205","172.30.1.104","TCP","54","40558 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53818","26.276759","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53819","26.277064","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53820","26.277073","172.30.1.205","172.30.1.104","TCP","54","40558 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53821","26.278962","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53822","26.279399","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53823","26.279405","172.30.1.205","172.30.1.104","TCP","54","40558 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53824","26.280763","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53825","26.284639","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53826","26.284648","172.30.1.205","172.30.1.104","TCP","54","40558 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53827","26.285633","172.30.1.205","172.30.1.104","TCP","74","47924 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929512 TSecr=0 WS=128" "53828","26.285970","172.30.1.104","172.30.1.205","TCP","66","135 > 47924 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53829","26.285982","172.30.1.205","172.30.1.104","TCP","54","47924 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53830","26.286344","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53831","26.286686","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53832","26.286695","172.30.1.205","172.30.1.104","TCP","54","47924 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53833","26.288914","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53834","26.289297","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53835","26.289311","172.30.1.205","172.30.1.104","TCP","54","47924 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53836","26.291145","172.30.1.205","172.30.1.104","TCP","54","47924 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53837","26.291269","172.30.1.205","172.30.1.104","TCP","74","40562 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929517 TSecr=0 WS=128" "53838","26.291423","172.30.1.104","172.30.1.205","TCP","54","135 > 47924 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53839","26.291435","172.30.1.104","172.30.1.205","TCP","54","135 > 47924 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53840","26.291440","172.30.1.205","172.30.1.104","TCP","54","47924 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53841","26.291558","172.30.1.104","172.30.1.205","TCP","66","49671 > 40562 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53842","26.291566","172.30.1.205","172.30.1.104","TCP","54","40562 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53843","26.291924","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53844","26.292235","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53845","26.292244","172.30.1.205","172.30.1.104","TCP","54","40562 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53846","26.294178","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53847","26.294621","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53848","26.294629","172.30.1.205","172.30.1.104","TCP","54","40562 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53849","26.296046","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53850","26.300060","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53851","26.300071","172.30.1.205","172.30.1.104","TCP","54","40562 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53852","26.301070","172.30.1.205","172.30.1.104","TCP","74","47928 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929527 TSecr=0 WS=128" "53853","26.301387","172.30.1.104","172.30.1.205","TCP","66","135 > 47928 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53854","26.301400","172.30.1.205","172.30.1.104","TCP","54","47928 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53855","26.301758","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53856","26.302094","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53857","26.302104","172.30.1.205","172.30.1.104","TCP","54","47928 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53858","26.304283","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53859","26.304676","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53860","26.304683","172.30.1.205","172.30.1.104","TCP","54","47928 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53861","26.306507","172.30.1.205","172.30.1.104","TCP","54","47928 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53862","26.306618","172.30.1.205","172.30.1.104","TCP","74","40566 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929533 TSecr=0 WS=128" "53863","26.306800","172.30.1.104","172.30.1.205","TCP","54","135 > 47928 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53864","26.306831","172.30.1.104","172.30.1.205","TCP","54","135 > 47928 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53865","26.306837","172.30.1.205","172.30.1.104","TCP","54","47928 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53866","26.306913","172.30.1.104","172.30.1.205","TCP","66","49671 > 40566 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53867","26.306921","172.30.1.205","172.30.1.104","TCP","54","40566 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53868","26.307267","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53869","26.307582","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53870","26.307591","172.30.1.205","172.30.1.104","TCP","54","40566 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53871","26.309503","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53872","26.309907","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53873","26.309914","172.30.1.205","172.30.1.104","TCP","54","40566 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53874","26.311258","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53875","26.316140","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53876","26.316151","172.30.1.205","172.30.1.104","TCP","54","40566 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53877","26.317170","172.30.1.205","172.30.1.104","TCP","74","47932 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929543 TSecr=0 WS=128" "53878","26.317492","172.30.1.104","172.30.1.205","TCP","66","135 > 47932 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53879","26.317503","172.30.1.205","172.30.1.104","TCP","54","47932 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53880","26.317857","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53881","26.318248","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53882","26.318257","172.30.1.205","172.30.1.104","TCP","54","47932 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53883","26.320446","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53884","26.320851","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53885","26.320858","172.30.1.205","172.30.1.104","TCP","54","47932 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53886","26.322677","172.30.1.205","172.30.1.104","TCP","54","47932 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53887","26.322792","172.30.1.205","172.30.1.104","TCP","74","40570 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929549 TSecr=0 WS=128" "53888","26.322957","172.30.1.104","172.30.1.205","TCP","54","135 > 47932 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53889","26.322979","172.30.1.104","172.30.1.205","TCP","54","135 > 47932 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53890","26.322984","172.30.1.205","172.30.1.104","TCP","54","47932 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53891","26.323072","172.30.1.104","172.30.1.205","TCP","66","49671 > 40570 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53892","26.323080","172.30.1.205","172.30.1.104","TCP","54","40570 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53893","26.323424","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53894","26.323758","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53895","26.323767","172.30.1.205","172.30.1.104","TCP","54","40570 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53896","26.325656","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53897","26.327222","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53898","26.327226","172.30.1.205","172.30.1.104","TCP","54","40570 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53899","26.328569","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53900","26.332484","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53901","26.332493","172.30.1.205","172.30.1.104","TCP","54","40570 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53902","26.333490","172.30.1.205","172.30.1.104","TCP","74","47936 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929559 TSecr=0 WS=128" "53903","26.333854","172.30.1.104","172.30.1.205","TCP","66","135 > 47936 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53904","26.333866","172.30.1.205","172.30.1.104","TCP","54","47936 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53905","26.334230","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53906","26.334538","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53907","26.334556","172.30.1.205","172.30.1.104","TCP","54","47936 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53908","26.337007","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53909","26.337394","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53910","26.337401","172.30.1.205","172.30.1.104","TCP","54","47936 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53911","26.339214","172.30.1.205","172.30.1.104","TCP","54","47936 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53912","26.339338","172.30.1.205","172.30.1.104","TCP","74","40574 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929565 TSecr=0 WS=128" "53913","26.339481","172.30.1.104","172.30.1.205","TCP","54","135 > 47936 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53914","26.339513","172.30.1.104","172.30.1.205","TCP","54","135 > 47936 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53915","26.339518","172.30.1.205","172.30.1.104","TCP","54","47936 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53916","26.339597","172.30.1.104","172.30.1.205","TCP","66","49671 > 40574 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53917","26.339606","172.30.1.205","172.30.1.104","TCP","54","40574 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53918","26.339953","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53919","26.340254","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53920","26.340263","172.30.1.205","172.30.1.104","TCP","54","40574 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53921","26.342163","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53922","26.342522","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53923","26.342529","172.30.1.205","172.30.1.104","TCP","54","40574 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53924","26.343934","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53925","26.347853","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53926","26.347863","172.30.1.205","172.30.1.104","TCP","54","40574 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53927","26.348833","172.30.1.205","172.30.1.104","TCP","74","47940 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929575 TSecr=0 WS=128" "53928","26.349170","172.30.1.104","172.30.1.205","TCP","66","135 > 47940 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53929","26.349182","172.30.1.205","172.30.1.104","TCP","54","47940 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53930","26.349558","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53931","26.349833","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53932","26.349842","172.30.1.205","172.30.1.104","TCP","54","47940 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53933","26.352026","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53934","26.352400","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53935","26.352407","172.30.1.205","172.30.1.104","TCP","54","47940 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53936","26.354301","172.30.1.205","172.30.1.104","TCP","54","47940 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "53937","26.354412","172.30.1.205","172.30.1.104","TCP","74","40578 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929580 TSecr=0 WS=128" "53938","26.354581","172.30.1.104","172.30.1.205","TCP","54","135 > 47940 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53939","26.354639","172.30.1.104","172.30.1.205","TCP","54","135 > 47940 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "53940","26.354644","172.30.1.205","172.30.1.104","TCP","54","47940 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "53941","26.354733","172.30.1.104","172.30.1.205","TCP","66","49671 > 40578 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53942","26.354741","172.30.1.205","172.30.1.104","TCP","54","40578 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53943","26.355084","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "53944","26.355409","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53945","26.355417","172.30.1.205","172.30.1.104","TCP","54","40578 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53946","26.357358","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "53947","26.357796","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "53948","26.357806","172.30.1.205","172.30.1.104","TCP","54","40578 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "53949","26.359177","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "53950","26.363403","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "53951","26.363416","172.30.1.205","172.30.1.104","TCP","54","40578 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "53952","26.364429","172.30.1.205","172.30.1.104","TCP","74","47944 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929590 TSecr=0 WS=128" "53953","26.364807","172.30.1.104","172.30.1.205","TCP","66","135 > 47944 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "53954","26.364819","172.30.1.205","172.30.1.104","TCP","54","47944 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "53955","26.365192","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "53956","26.365540","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "53957","26.365549","172.30.1.205","172.30.1.104","TCP","54","47944 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "53958","26.367740","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "53959","26.368155","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "53960","26.368162","172.30.1.205","172.30.1.104","TCP","54","47944 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "53961","26.369043","172.30.1.205","172.30.1.104","TCP","54","40538 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53962","26.369092","172.30.1.205","172.30.1.104","TCP","54","40542 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53963","26.369124","172.30.1.205","172.30.1.104","TCP","54","40546 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53964","26.369158","172.30.1.205","172.30.1.104","TCP","54","40550 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53965","26.369191","172.30.1.205","172.30.1.104","TCP","54","40554 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53966","26.369224","172.30.1.205","172.30.1.104","TCP","54","40558 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53967","26.369251","172.30.1.205","172.30.1.104","TCP","54","40562 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53968","26.369283","172.30.1.205","172.30.1.104","TCP","54","40566 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53969","26.369310","172.30.1.205","172.30.1.104","TCP","54","40570 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53970","26.369339","172.30.1.205","172.30.1.104","TCP","54","40574 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53971","26.369371","172.30.1.205","172.30.1.104","TCP","54","40578 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53972","26.369445","172.30.1.205","172.30.1.104","TCP","54","40534 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "53973","26.369588","172.30.1.104","172.30.1.205","TCP","54","49671 > 40538 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53974","26.369604","172.30.1.104","172.30.1.205","TCP","54","49671 > 40542 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53975","26.369636","172.30.1.104","172.30.1.205","TCP","54","49671 > 40546 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53976","26.369681","172.30.1.104","172.30.1.205","TCP","54","49671 > 40550 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53977","26.369701","172.30.1.104","172.30.1.205","TCP","54","49671 > 40554 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53978","26.369722","172.30.1.104","172.30.1.205","TCP","54","49671 > 40558 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53979","26.369741","172.30.1.104","172.30.1.205","TCP","54","49671 > 40562 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53980","26.369784","172.30.1.104","172.30.1.205","TCP","54","49671 > 40566 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53981","26.369805","172.30.1.104","172.30.1.205","TCP","54","49671 > 40570 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53982","26.369825","172.30.1.104","172.30.1.205","TCP","54","49671 > 40574 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53983","26.369907","172.30.1.104","172.30.1.205","TCP","54","49671 > 40578 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53984","26.369926","172.30.1.104","172.30.1.205","TCP","54","49671 > 40578 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53985","26.369933","172.30.1.205","172.30.1.104","TCP","54","40578 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53986","26.369969","172.30.1.104","172.30.1.205","TCP","54","49671 > 40574 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53987","26.369973","172.30.1.205","172.30.1.104","TCP","54","40574 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53988","26.369990","172.30.1.104","172.30.1.205","TCP","54","49671 > 40570 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53989","26.369993","172.30.1.205","172.30.1.104","TCP","54","40570 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53990","26.370009","172.30.1.104","172.30.1.205","TCP","54","49671 > 40566 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53991","26.370011","172.30.1.205","172.30.1.104","TCP","54","40566 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53992","26.370028","172.30.1.104","172.30.1.205","TCP","54","49671 > 40562 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53993","26.370030","172.30.1.205","172.30.1.104","TCP","54","40562 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53994","26.370129","172.30.1.104","172.30.1.205","TCP","54","49671 > 40558 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53995","26.370133","172.30.1.205","172.30.1.104","TCP","54","40558 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53996","26.370147","172.30.1.104","172.30.1.205","TCP","54","49671 > 40554 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53997","26.370150","172.30.1.205","172.30.1.104","TCP","54","40554 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "53998","26.370166","172.30.1.104","172.30.1.205","TCP","54","49671 > 40550 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "53999","26.370169","172.30.1.205","172.30.1.104","TCP","54","40550 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54000","26.370185","172.30.1.104","172.30.1.205","TCP","54","49671 > 40538 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54001","26.370189","172.30.1.205","172.30.1.104","TCP","54","40538 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54002","26.370204","172.30.1.104","172.30.1.205","TCP","54","49671 > 40542 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54003","26.370207","172.30.1.205","172.30.1.104","TCP","54","40542 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54004","26.370224","172.30.1.104","172.30.1.205","TCP","54","49671 > 40546 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54005","26.370228","172.30.1.205","172.30.1.104","TCP","54","40546 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54006","26.370608","172.30.1.104","172.30.1.205","TCP","54","49671 > 40534 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54007","26.370627","172.30.1.104","172.30.1.205","TCP","54","49671 > 40534 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54008","26.370632","172.30.1.205","172.30.1.104","TCP","54","40534 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54009","26.371046","172.30.1.205","172.30.1.104","TCP","54","47944 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54010","26.371157","172.30.1.205","172.30.1.104","TCP","74","40582 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929597 TSecr=0 WS=128" "54011","26.371341","172.30.1.104","172.30.1.205","TCP","54","135 > 47944 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54012","26.371349","172.30.1.104","172.30.1.205","TCP","54","135 > 47944 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54013","26.371354","172.30.1.205","172.30.1.104","TCP","54","47944 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54014","26.371464","172.30.1.104","172.30.1.205","TCP","66","49671 > 40582 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54015","26.371472","172.30.1.205","172.30.1.104","TCP","54","40582 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54016","26.371828","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54017","26.372126","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54018","26.372135","172.30.1.205","172.30.1.104","TCP","54","40582 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54019","26.374064","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54020","26.374459","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54021","26.374466","172.30.1.205","172.30.1.104","TCP","54","40582 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54022","26.375839","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54023","26.379748","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54024","26.379761","172.30.1.205","172.30.1.104","TCP","54","40582 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54025","26.380707","172.30.1.205","172.30.1.104","TCP","74","47948 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929607 TSecr=0 WS=128" "54026","26.381071","172.30.1.104","172.30.1.205","TCP","66","135 > 47948 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54027","26.381082","172.30.1.205","172.30.1.104","TCP","54","47948 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54028","26.381449","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54029","26.381772","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54030","26.381781","172.30.1.205","172.30.1.104","TCP","54","47948 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54031","26.383957","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54032","26.384385","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54033","26.384393","172.30.1.205","172.30.1.104","TCP","54","47948 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54034","26.386237","172.30.1.205","172.30.1.104","TCP","54","47948 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54035","26.386349","172.30.1.205","172.30.1.104","TCP","74","40586 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929612 TSecr=0 WS=128" "54036","26.386553","172.30.1.104","172.30.1.205","TCP","54","135 > 47948 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54037","26.386603","172.30.1.104","172.30.1.205","TCP","54","135 > 47948 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54038","26.386609","172.30.1.205","172.30.1.104","TCP","54","47948 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54039","26.386635","172.30.1.104","172.30.1.205","TCP","66","49671 > 40586 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54040","26.386643","172.30.1.205","172.30.1.104","TCP","54","40586 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54041","26.386982","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54042","26.387408","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54043","26.387417","172.30.1.205","172.30.1.104","TCP","54","40586 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54044","26.389323","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54045","26.389696","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54046","26.389703","172.30.1.205","172.30.1.104","TCP","54","40586 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54047","26.391045","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54048","26.395129","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54049","26.395139","172.30.1.205","172.30.1.104","TCP","54","40586 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54050","26.396078","172.30.1.205","172.30.1.104","TCP","74","47952 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929622 TSecr=0 WS=128" "54051","26.396458","172.30.1.104","172.30.1.205","TCP","66","135 > 47952 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54052","26.396470","172.30.1.205","172.30.1.104","TCP","54","47952 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54053","26.396850","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54054","26.397144","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54055","26.397154","172.30.1.205","172.30.1.104","TCP","54","47952 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54056","26.399353","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54057","26.399784","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54058","26.399791","172.30.1.205","172.30.1.104","TCP","54","47952 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54059","26.401623","172.30.1.205","172.30.1.104","TCP","54","47952 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54060","26.401736","172.30.1.205","172.30.1.104","TCP","74","40590 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929628 TSecr=0 WS=128" "54061","26.401906","172.30.1.104","172.30.1.205","TCP","54","135 > 47952 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54062","26.401936","172.30.1.104","172.30.1.205","TCP","54","135 > 47952 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54063","26.401942","172.30.1.205","172.30.1.104","TCP","54","47952 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54064","26.402016","172.30.1.104","172.30.1.205","TCP","66","49671 > 40590 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54065","26.402025","172.30.1.205","172.30.1.104","TCP","54","40590 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54066","26.402388","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54067","26.402693","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54068","26.402703","172.30.1.205","172.30.1.104","TCP","54","40590 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54069","26.404603","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54070","26.405032","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54071","26.405039","172.30.1.205","172.30.1.104","TCP","54","40590 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54072","26.406457","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54073","26.410357","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54074","26.410367","172.30.1.205","172.30.1.104","TCP","54","40590 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54075","26.411355","172.30.1.205","172.30.1.104","TCP","74","47956 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929637 TSecr=0 WS=128" "54076","26.411663","172.30.1.104","172.30.1.205","TCP","66","135 > 47956 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54077","26.411674","172.30.1.205","172.30.1.104","TCP","54","47956 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54078","26.412029","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54079","26.412341","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54080","26.412349","172.30.1.205","172.30.1.104","TCP","54","47956 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54081","26.414575","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54082","26.414969","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54083","26.414977","172.30.1.205","172.30.1.104","TCP","54","47956 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54084","26.416819","172.30.1.205","172.30.1.104","TCP","54","47956 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54085","26.416929","172.30.1.205","172.30.1.104","TCP","74","40594 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929643 TSecr=0 WS=128" "54086","26.417171","172.30.1.104","172.30.1.205","TCP","54","135 > 47956 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54087","26.417203","172.30.1.104","172.30.1.205","TCP","54","135 > 47956 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54088","26.417209","172.30.1.205","172.30.1.104","TCP","54","47956 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54089","26.417306","172.30.1.104","172.30.1.205","TCP","66","49671 > 40594 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54090","26.417315","172.30.1.205","172.30.1.104","TCP","54","40594 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54091","26.417661","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54092","26.417991","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54093","26.418000","172.30.1.205","172.30.1.104","TCP","54","40594 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54094","26.419902","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54095","26.420284","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54096","26.420290","172.30.1.205","172.30.1.104","TCP","54","40594 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54097","26.421677","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54098","26.425713","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54099","26.425724","172.30.1.205","172.30.1.104","TCP","54","40594 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54100","26.426711","172.30.1.205","172.30.1.104","TCP","74","47960 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929653 TSecr=0 WS=128" "54101","26.426996","172.30.1.104","172.30.1.205","TCP","66","135 > 47960 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54102","26.427006","172.30.1.205","172.30.1.104","TCP","54","47960 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54103","26.427363","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54104","26.427658","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54105","26.427667","172.30.1.205","172.30.1.104","TCP","54","47960 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54106","26.429879","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54107","26.430454","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54108","26.430467","172.30.1.205","172.30.1.104","TCP","54","47960 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54109","26.432404","172.30.1.205","172.30.1.104","TCP","54","47960 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54110","26.432515","172.30.1.205","172.30.1.104","TCP","74","40598 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929658 TSecr=0 WS=128" "54111","26.432793","172.30.1.104","172.30.1.205","TCP","54","135 > 47960 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54112","26.432802","172.30.1.104","172.30.1.205","TCP","54","135 > 47960 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54113","26.432808","172.30.1.205","172.30.1.104","TCP","54","47960 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54114","26.432879","172.30.1.104","172.30.1.205","TCP","66","49671 > 40598 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54115","26.432887","172.30.1.205","172.30.1.104","TCP","54","40598 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54116","26.433239","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54117","26.433532","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54118","26.433541","172.30.1.205","172.30.1.104","TCP","54","40598 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54119","26.435430","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54120","26.435836","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54121","26.435842","172.30.1.205","172.30.1.104","TCP","54","40598 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54122","26.437223","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54123","26.441111","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54124","26.441122","172.30.1.205","172.30.1.104","TCP","54","40598 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54125","26.442110","172.30.1.205","172.30.1.104","TCP","74","47964 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929668 TSecr=0 WS=128" "54126","26.442402","172.30.1.104","172.30.1.205","TCP","66","135 > 47964 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54127","26.442414","172.30.1.205","172.30.1.104","TCP","54","47964 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54128","26.442772","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54129","26.443134","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54130","26.443142","172.30.1.205","172.30.1.104","TCP","54","47964 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54131","26.445359","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54132","26.445770","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54133","26.445776","172.30.1.205","172.30.1.104","TCP","54","47964 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54134","26.447589","172.30.1.205","172.30.1.104","TCP","54","47964 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54135","26.447701","172.30.1.205","172.30.1.104","TCP","74","40602 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929674 TSecr=0 WS=128" "54136","26.447866","172.30.1.104","172.30.1.205","TCP","54","135 > 47964 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54137","26.447899","172.30.1.104","172.30.1.205","TCP","54","135 > 47964 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54138","26.447905","172.30.1.205","172.30.1.104","TCP","54","47964 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54139","26.447992","172.30.1.104","172.30.1.205","TCP","66","49671 > 40602 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54140","26.448000","172.30.1.205","172.30.1.104","TCP","54","40602 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54141","26.448347","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54142","26.448650","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54143","26.448662","172.30.1.205","172.30.1.104","TCP","54","40602 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54144","26.450577","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54145","26.450957","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54146","26.450964","172.30.1.205","172.30.1.104","TCP","54","40602 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54147","26.452341","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54148","26.456400","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54149","26.456422","172.30.1.205","172.30.1.104","TCP","54","40602 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54150","26.457445","172.30.1.205","172.30.1.104","TCP","74","47968 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929683 TSecr=0 WS=128" "54151","26.457774","172.30.1.104","172.30.1.205","TCP","66","135 > 47968 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54152","26.457797","172.30.1.205","172.30.1.104","TCP","54","47968 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54153","26.458283","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54154","26.458638","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54155","26.458647","172.30.1.205","172.30.1.104","TCP","54","47968 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54156","26.460871","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54157","26.461302","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54158","26.461309","172.30.1.205","172.30.1.104","TCP","54","47968 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54159","26.463130","172.30.1.205","172.30.1.104","TCP","54","47968 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54160","26.463242","172.30.1.205","172.30.1.104","TCP","74","40606 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929689 TSecr=0 WS=128" "54161","26.463403","172.30.1.104","172.30.1.205","TCP","54","135 > 47968 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54162","26.463436","172.30.1.104","172.30.1.205","TCP","54","135 > 47968 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54163","26.463442","172.30.1.205","172.30.1.104","TCP","54","47968 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54164","26.463524","172.30.1.104","172.30.1.205","TCP","66","49671 > 40606 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54165","26.463533","172.30.1.205","172.30.1.104","TCP","54","40606 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54166","26.463878","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54167","26.464164","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54168","26.464171","172.30.1.205","172.30.1.104","TCP","54","40606 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54169","26.466071","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54170","26.466504","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54171","26.466510","172.30.1.205","172.30.1.104","TCP","54","40606 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54172","26.467870","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54173","26.471871","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54174","26.471882","172.30.1.205","172.30.1.104","TCP","54","40606 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54175","26.472911","172.30.1.205","172.30.1.104","TCP","74","47972 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929699 TSecr=0 WS=128" "54176","26.473260","172.30.1.104","172.30.1.205","TCP","66","135 > 47972 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54177","26.473272","172.30.1.205","172.30.1.104","TCP","54","47972 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54178","26.473634","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54179","26.473929","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54180","26.473938","172.30.1.205","172.30.1.104","TCP","54","47972 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54181","26.476146","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54182","26.476556","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54183","26.476562","172.30.1.205","172.30.1.104","TCP","54","47972 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54184","26.478390","172.30.1.205","172.30.1.104","TCP","54","47972 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54185","26.478502","172.30.1.205","172.30.1.104","TCP","74","40610 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929704 TSecr=0 WS=128" "54186","26.478671","172.30.1.104","172.30.1.205","TCP","54","135 > 47972 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54187","26.478695","172.30.1.104","172.30.1.205","TCP","54","135 > 47972 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54188","26.478701","172.30.1.205","172.30.1.104","TCP","54","47972 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54189","26.478779","172.30.1.104","172.30.1.205","TCP","66","49671 > 40610 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54190","26.478787","172.30.1.205","172.30.1.104","TCP","54","40610 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54191","26.479141","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54192","26.479429","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54193","26.479436","172.30.1.205","172.30.1.104","TCP","54","40610 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54194","26.481345","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54195","26.481702","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54196","26.481708","172.30.1.205","172.30.1.104","TCP","54","40610 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54197","26.483071","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54198","26.486931","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54199","26.486940","172.30.1.205","172.30.1.104","TCP","54","40610 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54200","26.487888","172.30.1.205","172.30.1.104","TCP","74","47976 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929714 TSecr=0 WS=128" "54201","26.488180","172.30.1.104","172.30.1.205","TCP","66","135 > 47976 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54202","26.488190","172.30.1.205","172.30.1.104","TCP","54","47976 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54203","26.488540","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54204","26.488819","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54205","26.488828","172.30.1.205","172.30.1.104","TCP","54","47976 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54206","26.491022","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54207","26.491459","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54208","26.491465","172.30.1.205","172.30.1.104","TCP","54","47976 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54209","26.493294","172.30.1.205","172.30.1.104","TCP","54","47976 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54210","26.493410","172.30.1.205","172.30.1.104","TCP","74","40614 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929719 TSecr=0 WS=128" "54211","26.493560","172.30.1.104","172.30.1.205","TCP","54","135 > 47976 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54212","26.493571","172.30.1.104","172.30.1.205","TCP","54","135 > 47976 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54213","26.493576","172.30.1.205","172.30.1.104","TCP","54","47976 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54214","26.493714","172.30.1.104","172.30.1.205","TCP","66","49671 > 40614 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54215","26.493722","172.30.1.205","172.30.1.104","TCP","54","40614 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54216","26.494070","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54217","26.494414","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54218","26.494431","172.30.1.205","172.30.1.104","TCP","54","40614 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54219","26.496553","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54220","26.496948","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54221","26.496954","172.30.1.205","172.30.1.104","TCP","54","40614 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54222","26.498335","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54223","26.502277","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54224","26.502287","172.30.1.205","172.30.1.104","TCP","54","40614 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54225","26.503260","172.30.1.205","172.30.1.104","TCP","74","47980 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929729 TSecr=0 WS=128" "54226","26.503613","172.30.1.104","172.30.1.205","TCP","66","135 > 47980 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54227","26.503635","172.30.1.205","172.30.1.104","TCP","54","47980 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54228","26.504161","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54229","26.504505","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54230","26.504515","172.30.1.205","172.30.1.104","TCP","54","47980 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54231","26.506806","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54232","26.507209","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54233","26.507216","172.30.1.205","172.30.1.104","TCP","54","47980 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54234","26.509052","172.30.1.205","172.30.1.104","TCP","54","47980 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54235","26.509163","172.30.1.205","172.30.1.104","TCP","74","40618 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929735 TSecr=0 WS=128" "54236","26.509314","172.30.1.104","172.30.1.205","TCP","54","135 > 47980 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54237","26.509325","172.30.1.104","172.30.1.205","TCP","54","135 > 47980 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54238","26.509330","172.30.1.205","172.30.1.104","TCP","54","47980 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54239","26.509446","172.30.1.104","172.30.1.205","TCP","66","49671 > 40618 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54240","26.509455","172.30.1.205","172.30.1.104","TCP","54","40618 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54241","26.509805","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54242","26.510069","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54243","26.510076","172.30.1.205","172.30.1.104","TCP","54","40618 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54244","26.511933","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54245","26.512371","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54246","26.512377","172.30.1.205","172.30.1.104","TCP","54","40618 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54247","26.513756","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54248","26.517727","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54249","26.517739","172.30.1.205","172.30.1.104","TCP","54","40618 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54250","26.518739","172.30.1.205","172.30.1.104","TCP","74","47984 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929745 TSecr=0 WS=128" "54251","26.519093","172.30.1.104","172.30.1.205","TCP","66","135 > 47984 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54252","26.519105","172.30.1.205","172.30.1.104","TCP","54","47984 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54253","26.519459","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54254","26.519758","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54255","26.519767","172.30.1.205","172.30.1.104","TCP","54","47984 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54256","26.522049","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54257","26.522434","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54258","26.522441","172.30.1.205","172.30.1.104","TCP","54","47984 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54259","26.524268","172.30.1.205","172.30.1.104","TCP","54","47984 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54260","26.524394","172.30.1.205","172.30.1.104","TCP","74","40622 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929750 TSecr=0 WS=128" "54261","26.524523","172.30.1.104","172.30.1.205","TCP","54","135 > 47984 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54262","26.524537","172.30.1.104","172.30.1.205","TCP","54","135 > 47984 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54263","26.524543","172.30.1.205","172.30.1.104","TCP","54","47984 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54264","26.524660","172.30.1.104","172.30.1.205","TCP","66","49671 > 40622 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54265","26.524669","172.30.1.205","172.30.1.104","TCP","54","40622 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54266","26.525050","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54267","26.526212","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54268","26.526219","172.30.1.205","172.30.1.104","TCP","54","40622 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54269","26.528108","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54270","26.528465","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54271","26.528472","172.30.1.205","172.30.1.104","TCP","54","40622 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54272","26.529864","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54273","26.533778","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54274","26.533789","172.30.1.205","172.30.1.104","TCP","54","40622 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54275","26.534800","172.30.1.205","172.30.1.104","TCP","74","47988 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929761 TSecr=0 WS=128" "54276","26.535169","172.30.1.104","172.30.1.205","TCP","66","135 > 47988 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54277","26.535182","172.30.1.205","172.30.1.104","TCP","54","47988 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54278","26.535554","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54279","26.535839","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54280","26.535857","172.30.1.205","172.30.1.104","TCP","54","47988 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54281","26.538350","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54282","26.538736","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54283","26.538743","172.30.1.205","172.30.1.104","TCP","54","47988 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54284","26.540568","172.30.1.205","172.30.1.104","TCP","54","47988 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54285","26.540681","172.30.1.205","172.30.1.104","TCP","74","40626 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929767 TSecr=0 WS=128" "54286","26.540825","172.30.1.104","172.30.1.205","TCP","54","135 > 47988 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54287","26.540854","172.30.1.104","172.30.1.205","TCP","54","135 > 47988 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54288","26.540861","172.30.1.205","172.30.1.104","TCP","54","47988 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54289","26.540950","172.30.1.104","172.30.1.205","TCP","66","49671 > 40626 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54290","26.540958","172.30.1.205","172.30.1.104","TCP","54","40626 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54291","26.541334","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54292","26.541615","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54293","26.541623","172.30.1.205","172.30.1.104","TCP","54","40626 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54294","26.543489","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54295","26.543879","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54296","26.543892","172.30.1.205","172.30.1.104","TCP","54","40626 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54297","26.545471","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54298","26.549467","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54299","26.549477","172.30.1.205","172.30.1.104","TCP","54","40626 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54300","26.550432","172.30.1.205","172.30.1.104","TCP","74","47992 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929776 TSecr=0 WS=128" "54301","26.550787","172.30.1.104","172.30.1.205","TCP","66","135 > 47992 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54302","26.550808","172.30.1.205","172.30.1.104","TCP","54","47992 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54303","26.551412","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54304","26.551719","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54305","26.551728","172.30.1.205","172.30.1.104","TCP","54","47992 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54306","26.553931","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54307","26.554337","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54308","26.554343","172.30.1.205","172.30.1.104","TCP","54","47992 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54309","26.555198","172.30.1.205","172.30.1.104","TCP","54","40586 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "54310","26.555248","172.30.1.205","172.30.1.104","TCP","54","40590 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "54311","26.555285","172.30.1.205","172.30.1.104","TCP","54","40594 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "54312","26.555315","172.30.1.205","172.30.1.104","TCP","54","40598 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "54313","26.555343","172.30.1.205","172.30.1.104","TCP","54","40602 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "54314","26.555371","172.30.1.205","172.30.1.104","TCP","54","40606 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "54315","26.555398","172.30.1.205","172.30.1.104","TCP","54","40610 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "54316","26.555430","172.30.1.205","172.30.1.104","TCP","54","40614 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "54317","26.555453","172.30.1.205","172.30.1.104","TCP","54","40618 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "54318","26.555473","172.30.1.104","172.30.1.205","TCP","54","49671 > 40586 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54319","26.555504","172.30.1.205","172.30.1.104","TCP","54","40622 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "54320","26.555538","172.30.1.205","172.30.1.104","TCP","54","40626 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "54321","26.555588","172.30.1.104","172.30.1.205","TCP","54","49671 > 40590 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54322","26.555611","172.30.1.104","172.30.1.205","TCP","54","49671 > 40594 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54323","26.555632","172.30.1.104","172.30.1.205","TCP","54","49671 > 40598 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54324","26.555639","172.30.1.205","172.30.1.104","TCP","54","40582 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "54325","26.555652","172.30.1.104","172.30.1.205","TCP","54","49671 > 40598 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54326","26.555658","172.30.1.205","172.30.1.104","TCP","54","40598 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54327","26.555744","172.30.1.104","172.30.1.205","TCP","54","49671 > 40602 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54328","26.555762","172.30.1.104","172.30.1.205","TCP","54","49671 > 40606 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54329","26.555783","172.30.1.104","172.30.1.205","TCP","54","49671 > 40594 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54330","26.555788","172.30.1.205","172.30.1.104","TCP","54","40594 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54331","26.555802","172.30.1.104","172.30.1.205","TCP","54","49671 > 40606 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54332","26.555806","172.30.1.205","172.30.1.104","TCP","54","40606 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54333","26.555824","172.30.1.104","172.30.1.205","TCP","54","49671 > 40602 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54334","26.555828","172.30.1.205","172.30.1.104","TCP","54","40602 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54335","26.555843","172.30.1.104","172.30.1.205","TCP","54","49671 > 40586 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54336","26.555846","172.30.1.205","172.30.1.104","TCP","54","40586 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54337","26.555864","172.30.1.104","172.30.1.205","TCP","54","49671 > 40590 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54338","26.555867","172.30.1.205","172.30.1.104","TCP","54","40590 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54339","26.555882","172.30.1.104","172.30.1.205","TCP","54","49671 > 40610 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54340","26.555902","172.30.1.104","172.30.1.205","TCP","54","49671 > 40614 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54341","26.555924","172.30.1.104","172.30.1.205","TCP","54","49671 > 40610 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54342","26.555927","172.30.1.205","172.30.1.104","TCP","54","40610 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54343","26.556049","172.30.1.104","172.30.1.205","TCP","54","49671 > 40618 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54344","26.556068","172.30.1.104","172.30.1.205","TCP","54","49671 > 40622 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54345","26.556088","172.30.1.104","172.30.1.205","TCP","54","49671 > 40622 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54346","26.556093","172.30.1.205","172.30.1.104","TCP","54","40622 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54347","26.556107","172.30.1.104","172.30.1.205","TCP","54","49671 > 40614 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54348","26.556110","172.30.1.205","172.30.1.104","TCP","54","40614 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54349","26.556126","172.30.1.104","172.30.1.205","TCP","54","49671 > 40618 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54350","26.556138","172.30.1.205","172.30.1.104","TCP","54","40618 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54351","26.556254","172.30.1.104","172.30.1.205","TCP","54","49671 > 40626 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54352","26.556287","172.30.1.104","172.30.1.205","TCP","54","49671 > 40582 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54353","26.556314","172.30.1.104","172.30.1.205","TCP","54","49671 > 40626 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54354","26.556319","172.30.1.205","172.30.1.104","TCP","54","40626 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54355","26.556334","172.30.1.104","172.30.1.205","TCP","54","49671 > 40582 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54356","26.556336","172.30.1.205","172.30.1.104","TCP","54","40582 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54357","26.557331","172.30.1.205","172.30.1.104","TCP","54","47992 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54358","26.557448","172.30.1.205","172.30.1.104","TCP","74","40630 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929783 TSecr=0 WS=128" "54359","26.557591","172.30.1.104","172.30.1.205","TCP","54","135 > 47992 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54360","26.557612","172.30.1.104","172.30.1.205","TCP","54","135 > 47992 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54361","26.557617","172.30.1.205","172.30.1.104","TCP","54","47992 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54362","26.557755","172.30.1.104","172.30.1.205","TCP","66","49671 > 40630 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54363","26.557764","172.30.1.205","172.30.1.104","TCP","54","40630 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54364","26.558118","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54365","26.558920","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54366","26.558929","172.30.1.205","172.30.1.104","TCP","54","40630 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54367","26.560827","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54368","26.561185","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54369","26.561192","172.30.1.205","172.30.1.104","TCP","54","40630 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54370","26.562553","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54371","26.566466","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54372","26.566485","172.30.1.205","172.30.1.104","TCP","54","40630 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54373","26.567655","172.30.1.205","172.30.1.104","TCP","74","47996 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929794 TSecr=0 WS=128" "54374","26.567952","172.30.1.104","172.30.1.205","TCP","66","135 > 47996 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54375","26.567962","172.30.1.205","172.30.1.104","TCP","54","47996 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54376","26.568315","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54377","26.568626","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54378","26.568635","172.30.1.205","172.30.1.104","TCP","54","47996 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54379","26.570858","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54380","26.571232","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54381","26.571239","172.30.1.205","172.30.1.104","TCP","54","47996 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54382","26.573079","172.30.1.205","172.30.1.104","TCP","54","47996 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54383","26.573189","172.30.1.205","172.30.1.104","TCP","74","40634 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929799 TSecr=0 WS=128" "54384","26.573377","172.30.1.104","172.30.1.205","TCP","54","135 > 47996 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54385","26.573396","172.30.1.104","172.30.1.205","TCP","54","135 > 47996 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54386","26.573406","172.30.1.205","172.30.1.104","TCP","54","47996 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54387","26.573450","172.30.1.104","172.30.1.205","TCP","66","49671 > 40634 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54388","26.573467","172.30.1.205","172.30.1.104","TCP","54","40634 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54389","26.574014","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54390","26.574276","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54391","26.574283","172.30.1.205","172.30.1.104","TCP","54","40634 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54392","26.576149","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54393","26.590426","172.30.1.104","172.30.1.205","TCP","54","49671 > 40634 [ACK] Seq=61 Ack=201 Win=2150400 Len=0" "54394","26.590536","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54395","26.590540","172.30.1.205","172.30.1.104","TCP","54","40634 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54396","26.591952","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54397","26.596021","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54398","26.596045","172.30.1.205","172.30.1.104","TCP","54","40634 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54399","26.597153","172.30.1.205","172.30.1.104","TCP","74","48000 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929823 TSecr=0 WS=128" "54400","26.597459","172.30.1.104","172.30.1.205","TCP","66","135 > 48000 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54401","26.597470","172.30.1.205","172.30.1.104","TCP","54","48000 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54402","26.597836","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54403","26.598179","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54404","26.598188","172.30.1.205","172.30.1.104","TCP","54","48000 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54405","26.600397","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54406","26.600788","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54407","26.600796","172.30.1.205","172.30.1.104","TCP","54","48000 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54408","26.602657","172.30.1.205","172.30.1.104","TCP","54","48000 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54409","26.602769","172.30.1.205","172.30.1.104","TCP","74","40638 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929829 TSecr=0 WS=128" "54410","26.602901","172.30.1.104","172.30.1.205","TCP","54","135 > 48000 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54411","26.602954","172.30.1.104","172.30.1.205","TCP","54","135 > 48000 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54412","26.602960","172.30.1.205","172.30.1.104","TCP","54","48000 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54413","26.603034","172.30.1.104","172.30.1.205","TCP","66","49671 > 40638 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54414","26.603042","172.30.1.205","172.30.1.104","TCP","54","40638 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54415","26.603388","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54416","26.603701","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54417","26.603709","172.30.1.205","172.30.1.104","TCP","54","40638 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54418","26.605655","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54419","26.606094","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54420","26.606101","172.30.1.205","172.30.1.104","TCP","54","40638 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54421","26.607454","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54422","26.611449","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54423","26.611463","172.30.1.205","172.30.1.104","TCP","54","40638 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54424","26.612455","172.30.1.205","172.30.1.104","TCP","74","48004 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929838 TSecr=0 WS=128" "54425","26.612788","172.30.1.104","172.30.1.205","TCP","66","135 > 48004 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54426","26.612807","172.30.1.205","172.30.1.104","TCP","54","48004 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54427","26.613169","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54428","26.613440","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54429","26.613450","172.30.1.205","172.30.1.104","TCP","54","48004 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54430","26.615643","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54431","26.616019","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54432","26.616026","172.30.1.205","172.30.1.104","TCP","54","48004 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54433","26.617860","172.30.1.205","172.30.1.104","TCP","54","48004 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54434","26.617970","172.30.1.205","172.30.1.104","TCP","74","40642 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929844 TSecr=0 WS=128" "54435","26.618156","172.30.1.104","172.30.1.205","TCP","54","135 > 48004 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54436","26.618190","172.30.1.104","172.30.1.205","TCP","54","135 > 48004 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54437","26.618195","172.30.1.205","172.30.1.104","TCP","54","48004 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54438","26.618260","172.30.1.104","172.30.1.205","TCP","66","49671 > 40642 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54439","26.618268","172.30.1.205","172.30.1.104","TCP","54","40642 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54440","26.618617","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54441","26.618914","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54442","26.618922","172.30.1.205","172.30.1.104","TCP","54","40642 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54443","26.620854","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54444","26.621293","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54445","26.621299","172.30.1.205","172.30.1.104","TCP","54","40642 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54446","26.622664","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54447","26.627370","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54448","26.627379","172.30.1.205","172.30.1.104","TCP","54","40642 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54449","26.628367","172.30.1.205","172.30.1.104","TCP","74","48008 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929854 TSecr=0 WS=128" "54450","26.629009","172.30.1.104","172.30.1.205","TCP","66","135 > 48008 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54451","26.629020","172.30.1.205","172.30.1.104","TCP","54","48008 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54452","26.629393","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54453","26.629688","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54454","26.629696","172.30.1.205","172.30.1.104","TCP","54","48008 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54455","26.631923","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54456","26.632311","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54457","26.632317","172.30.1.205","172.30.1.104","TCP","54","48008 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54458","26.634149","172.30.1.205","172.30.1.104","TCP","54","48008 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54459","26.634259","172.30.1.205","172.30.1.104","TCP","74","40646 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929860 TSecr=0 WS=128" "54460","26.634434","172.30.1.104","172.30.1.205","TCP","54","135 > 48008 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54461","26.634462","172.30.1.104","172.30.1.205","TCP","54","135 > 48008 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54462","26.634467","172.30.1.205","172.30.1.104","TCP","54","48008 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54463","26.634546","172.30.1.104","172.30.1.205","TCP","66","49671 > 40646 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54464","26.634554","172.30.1.205","172.30.1.104","TCP","54","40646 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54465","26.634907","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54466","26.635173","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54467","26.635182","172.30.1.205","172.30.1.104","TCP","54","40646 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54468","26.637076","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54469","26.637438","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54470","26.637451","172.30.1.205","172.30.1.104","TCP","54","40646 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54471","26.639041","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54472","26.642809","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54473","26.642841","172.30.1.205","172.30.1.104","TCP","54","40646 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54474","26.643788","172.30.1.205","172.30.1.104","TCP","74","48012 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929870 TSecr=0 WS=128" "54475","26.644142","172.30.1.104","172.30.1.205","TCP","66","135 > 48012 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54476","26.644152","172.30.1.205","172.30.1.104","TCP","54","48012 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54477","26.644528","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54478","26.644888","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54479","26.644897","172.30.1.205","172.30.1.104","TCP","54","48012 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54480","26.647095","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54481","26.647712","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54482","26.647719","172.30.1.205","172.30.1.104","TCP","54","48012 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54483","26.649614","172.30.1.205","172.30.1.104","TCP","54","48012 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54484","26.649723","172.30.1.205","172.30.1.104","TCP","74","40650 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929876 TSecr=0 WS=128" "54485","26.649862","172.30.1.104","172.30.1.205","TCP","54","135 > 48012 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54486","26.649901","172.30.1.104","172.30.1.205","TCP","54","135 > 48012 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54487","26.649906","172.30.1.205","172.30.1.104","TCP","54","48012 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54488","26.650036","172.30.1.104","172.30.1.205","TCP","66","49671 > 40650 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54489","26.650044","172.30.1.205","172.30.1.104","TCP","54","40650 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54490","26.650419","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54491","26.650692","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54492","26.650702","172.30.1.205","172.30.1.104","TCP","54","40650 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54493","26.652658","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54494","26.653103","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54495","26.653115","172.30.1.205","172.30.1.104","TCP","54","40650 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54496","26.654664","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54497","26.658656","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54498","26.658666","172.30.1.205","172.30.1.104","TCP","54","40650 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54499","26.659621","172.30.1.205","172.30.1.104","TCP","74","48016 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929886 TSecr=0 WS=128" "54500","26.659971","172.30.1.104","172.30.1.205","TCP","66","135 > 48016 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54501","26.659982","172.30.1.205","172.30.1.104","TCP","54","48016 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54502","26.660330","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54503","26.660628","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54504","26.660637","172.30.1.205","172.30.1.104","TCP","54","48016 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54505","26.662849","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54506","26.663287","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54507","26.663293","172.30.1.205","172.30.1.104","TCP","54","48016 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54508","26.665165","172.30.1.205","172.30.1.104","TCP","54","48016 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54509","26.665275","172.30.1.205","172.30.1.104","TCP","74","40654 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929891 TSecr=0 WS=128" "54510","26.665426","172.30.1.104","172.30.1.205","TCP","54","135 > 48016 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54511","26.665441","172.30.1.104","172.30.1.205","TCP","54","135 > 48016 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54512","26.665446","172.30.1.205","172.30.1.104","TCP","54","48016 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54513","26.665553","172.30.1.104","172.30.1.205","TCP","66","49671 > 40654 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54514","26.665561","172.30.1.205","172.30.1.104","TCP","54","40654 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54515","26.665903","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54516","26.666205","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54517","26.666214","172.30.1.205","172.30.1.104","TCP","54","40654 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54518","26.668105","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54519","26.668586","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54520","26.668592","172.30.1.205","172.30.1.104","TCP","54","40654 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54521","26.669962","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54522","26.673893","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54523","26.673921","172.30.1.205","172.30.1.104","TCP","54","40654 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54524","26.675168","172.30.1.205","172.30.1.104","TCP","74","48020 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929901 TSecr=0 WS=128" "54525","26.675474","172.30.1.104","172.30.1.205","TCP","66","135 > 48020 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54526","26.675487","172.30.1.205","172.30.1.104","TCP","54","48020 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54527","26.675847","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54528","26.676205","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54529","26.676214","172.30.1.205","172.30.1.104","TCP","54","48020 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54530","26.678458","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54531","26.678863","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54532","26.678870","172.30.1.205","172.30.1.104","TCP","54","48020 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54533","26.680735","172.30.1.205","172.30.1.104","TCP","54","48020 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54534","26.680871","172.30.1.205","172.30.1.104","TCP","74","40658 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929907 TSecr=0 WS=128" "54535","26.681043","172.30.1.104","172.30.1.205","TCP","54","135 > 48020 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54536","26.681081","172.30.1.104","172.30.1.205","TCP","54","135 > 48020 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54537","26.681086","172.30.1.205","172.30.1.104","TCP","54","48020 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54538","26.681206","172.30.1.104","172.30.1.205","TCP","66","49671 > 40658 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54539","26.681214","172.30.1.205","172.30.1.104","TCP","54","40658 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54540","26.681562","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54541","26.681861","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54542","26.681870","172.30.1.205","172.30.1.104","TCP","54","40658 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54543","26.683767","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54544","26.684183","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54545","26.684190","172.30.1.205","172.30.1.104","TCP","54","40658 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54546","26.685613","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54547","26.689512","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54548","26.689525","172.30.1.205","172.30.1.104","TCP","54","40658 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54549","26.690565","172.30.1.205","172.30.1.104","TCP","74","48024 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929916 TSecr=0 WS=128" "54550","26.690853","172.30.1.104","172.30.1.205","TCP","66","135 > 48024 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54551","26.690864","172.30.1.205","172.30.1.104","TCP","54","48024 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54552","26.691222","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54553","26.691555","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54554","26.691564","172.30.1.205","172.30.1.104","TCP","54","48024 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54555","26.693780","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54556","26.694237","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54557","26.694243","172.30.1.205","172.30.1.104","TCP","54","48024 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54558","26.696060","172.30.1.205","172.30.1.104","TCP","54","48024 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54559","26.696172","172.30.1.205","172.30.1.104","TCP","74","40662 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929922 TSecr=0 WS=128" "54560","26.696393","172.30.1.104","172.30.1.205","TCP","54","135 > 48024 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54561","26.696405","172.30.1.104","172.30.1.205","TCP","54","135 > 48024 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54562","26.696410","172.30.1.205","172.30.1.104","TCP","54","48024 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54563","26.696481","172.30.1.104","172.30.1.205","TCP","66","49671 > 40662 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54564","26.696489","172.30.1.205","172.30.1.104","TCP","54","40662 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54565","26.696858","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54566","26.697143","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54567","26.697151","172.30.1.205","172.30.1.104","TCP","54","40662 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54568","26.699032","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54569","26.699378","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54570","26.699385","172.30.1.205","172.30.1.104","TCP","54","40662 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54571","26.700768","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54572","26.704741","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54573","26.704752","172.30.1.205","172.30.1.104","TCP","54","40662 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54574","26.705724","172.30.1.205","172.30.1.104","TCP","74","48028 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929932 TSecr=0 WS=128" "54575","26.706861","172.30.1.104","172.30.1.205","TCP","66","135 > 48028 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54576","26.706872","172.30.1.205","172.30.1.104","TCP","54","48028 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54577","26.707222","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54578","26.707520","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54579","26.707529","172.30.1.205","172.30.1.104","TCP","54","48028 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54580","26.709730","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54581","26.710131","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54582","26.710137","172.30.1.205","172.30.1.104","TCP","54","48028 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54583","26.711940","172.30.1.205","172.30.1.104","TCP","54","48028 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54584","26.712067","172.30.1.205","172.30.1.104","TCP","74","40666 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929938 TSecr=0 WS=128" "54585","26.712195","172.30.1.104","172.30.1.205","TCP","54","135 > 48028 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54586","26.712222","172.30.1.104","172.30.1.205","TCP","54","135 > 48028 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54587","26.712227","172.30.1.205","172.30.1.104","TCP","54","48028 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54588","26.712321","172.30.1.104","172.30.1.205","TCP","66","49671 > 40666 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54589","26.712329","172.30.1.205","172.30.1.104","TCP","54","40666 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54590","26.712671","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54591","26.712951","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54592","26.712960","172.30.1.205","172.30.1.104","TCP","54","40666 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54593","26.714823","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54594","26.715492","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54595","26.715499","172.30.1.205","172.30.1.104","TCP","54","40666 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54596","26.716866","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54597","26.720762","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54598","26.720773","172.30.1.205","172.30.1.104","TCP","54","40666 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54599","26.721763","172.30.1.205","172.30.1.104","TCP","74","48032 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929948 TSecr=0 WS=128" "54600","26.722046","172.30.1.104","172.30.1.205","TCP","66","135 > 48032 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54601","26.722057","172.30.1.205","172.30.1.104","TCP","54","48032 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54602","26.722411","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54603","26.722681","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54604","26.722693","172.30.1.205","172.30.1.104","TCP","54","48032 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54605","26.724902","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54606","26.725263","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54607","26.725270","172.30.1.205","172.30.1.104","TCP","54","48032 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54608","26.727080","172.30.1.205","172.30.1.104","TCP","54","48032 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54609","26.727193","172.30.1.205","172.30.1.104","TCP","74","40670 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929953 TSecr=0 WS=128" "54610","26.727431","172.30.1.104","172.30.1.205","TCP","54","135 > 48032 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54611","26.727440","172.30.1.104","172.30.1.205","TCP","54","135 > 48032 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54612","26.727446","172.30.1.205","172.30.1.104","TCP","54","48032 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54613","26.727551","172.30.1.104","172.30.1.205","TCP","66","49671 > 40670 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54614","26.727559","172.30.1.205","172.30.1.104","TCP","54","40670 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54615","26.727918","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54616","26.728233","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54617","26.728241","172.30.1.205","172.30.1.104","TCP","54","40670 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54618","26.730161","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54619","26.730548","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54620","26.730554","172.30.1.205","172.30.1.104","TCP","54","40670 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54621","26.731899","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54622","26.735803","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54623","26.735813","172.30.1.205","172.30.1.104","TCP","54","40670 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54624","26.736800","172.30.1.205","172.30.1.104","TCP","74","48036 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929963 TSecr=0 WS=128" "54625","26.737137","172.30.1.104","172.30.1.205","TCP","66","135 > 48036 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54626","26.737149","172.30.1.205","172.30.1.104","TCP","54","48036 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54627","26.737509","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54628","26.737796","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54629","26.737804","172.30.1.205","172.30.1.104","TCP","54","48036 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54630","26.739985","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54631","26.740353","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54632","26.740359","172.30.1.205","172.30.1.104","TCP","54","48036 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54633","26.742181","172.30.1.205","172.30.1.104","TCP","54","48036 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54634","26.742291","172.30.1.205","172.30.1.104","TCP","74","40674 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929968 TSecr=0 WS=128" "54635","26.742479","172.30.1.104","172.30.1.205","TCP","54","135 > 48036 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54636","26.742492","172.30.1.104","172.30.1.205","TCP","54","135 > 48036 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54637","26.742499","172.30.1.205","172.30.1.104","TCP","54","48036 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54638","26.742601","172.30.1.104","172.30.1.205","TCP","66","49671 > 40674 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54639","26.742612","172.30.1.205","172.30.1.104","TCP","54","40674 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54640","26.742993","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54641","26.743284","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54642","26.743292","172.30.1.205","172.30.1.104","TCP","54","40674 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54643","26.745212","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54644","26.745565","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54645","26.745571","172.30.1.205","172.30.1.104","TCP","54","40674 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54646","26.746930","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54647","26.750894","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54648","26.750906","172.30.1.205","172.30.1.104","TCP","54","40674 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54649","26.751874","172.30.1.205","172.30.1.104","TCP","74","48040 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929978 TSecr=0 WS=128" "54650","26.752191","172.30.1.104","172.30.1.205","TCP","66","135 > 48040 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54651","26.752201","172.30.1.205","172.30.1.104","TCP","54","48040 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54652","26.752552","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54653","26.752936","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54654","26.752948","172.30.1.205","172.30.1.104","TCP","54","48040 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54655","26.755208","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54656","26.755620","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54657","26.755627","172.30.1.205","172.30.1.104","TCP","54","48040 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54658","26.756522","172.30.1.205","172.30.1.104","TCP","54","40634 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "54659","26.756577","172.30.1.205","172.30.1.104","TCP","54","40638 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "54660","26.756616","172.30.1.205","172.30.1.104","TCP","54","40642 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "54661","26.756647","172.30.1.205","172.30.1.104","TCP","54","40646 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "54662","26.756681","172.30.1.205","172.30.1.104","TCP","54","40650 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "54663","26.756723","172.30.1.205","172.30.1.104","TCP","54","40654 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "54664","26.756755","172.30.1.205","172.30.1.104","TCP","54","40658 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "54665","26.756812","172.30.1.205","172.30.1.104","TCP","54","40662 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "54666","26.756847","172.30.1.205","172.30.1.104","TCP","54","40666 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "54667","26.756874","172.30.1.205","172.30.1.104","TCP","54","40670 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "54668","26.756883","172.30.1.104","172.30.1.205","TCP","54","49671 > 40634 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54669","26.756898","172.30.1.104","172.30.1.205","TCP","54","49671 > 40634 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54670","26.756904","172.30.1.205","172.30.1.104","TCP","54","40634 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54671","26.756940","172.30.1.205","172.30.1.104","TCP","54","40674 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "54672","26.757012","172.30.1.205","172.30.1.104","TCP","54","40630 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "54673","26.757035","172.30.1.104","172.30.1.205","TCP","54","49671 > 40638 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54674","26.757063","172.30.1.104","172.30.1.205","TCP","54","49671 > 40642 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54675","26.757252","172.30.1.104","172.30.1.205","TCP","54","49671 > 40646 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54676","26.757267","172.30.1.104","172.30.1.205","TCP","54","49671 > 40650 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54677","26.757280","172.30.1.104","172.30.1.205","TCP","54","49671 > 40654 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54678","26.757299","172.30.1.104","172.30.1.205","TCP","54","49671 > 40658 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54679","26.757320","172.30.1.104","172.30.1.205","TCP","54","49671 > 40662 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54680","26.757339","172.30.1.104","172.30.1.205","TCP","54","49671 > 40662 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54681","26.757345","172.30.1.205","172.30.1.104","TCP","54","40662 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54682","26.757712","172.30.1.104","172.30.1.205","TCP","54","49671 > 40658 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54683","26.757718","172.30.1.205","172.30.1.104","TCP","54","40658 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54684","26.757725","172.30.1.104","172.30.1.205","TCP","54","49671 > 40654 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54685","26.757727","172.30.1.205","172.30.1.104","TCP","54","40654 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54686","26.757728","172.30.1.104","172.30.1.205","TCP","54","49671 > 40650 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54687","26.757730","172.30.1.205","172.30.1.104","TCP","54","40650 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54688","26.757734","172.30.1.104","172.30.1.205","TCP","54","49671 > 40638 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54689","26.757736","172.30.1.205","172.30.1.104","TCP","54","40638 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54690","26.757737","172.30.1.104","172.30.1.205","TCP","54","49671 > 40666 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54691","26.757743","172.30.1.104","172.30.1.205","TCP","54","49671 > 40642 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54692","26.757745","172.30.1.205","172.30.1.104","TCP","54","40642 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54693","26.757747","172.30.1.104","172.30.1.205","TCP","54","49671 > 40670 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54694","26.757749","172.30.1.104","172.30.1.205","TCP","54","49671 > 40670 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54695","26.757751","172.30.1.205","172.30.1.104","TCP","54","40670 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54696","26.757756","172.30.1.104","172.30.1.205","TCP","54","49671 > 40674 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54697","26.757760","172.30.1.104","172.30.1.205","TCP","54","49671 > 40630 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54698","26.757762","172.30.1.104","172.30.1.205","TCP","54","49671 > 40630 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54699","26.757764","172.30.1.205","172.30.1.104","TCP","54","40630 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54700","26.757765","172.30.1.104","172.30.1.205","TCP","54","49671 > 40674 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54701","26.757767","172.30.1.205","172.30.1.104","TCP","54","40674 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54702","26.757769","172.30.1.104","172.30.1.205","TCP","54","49671 > 40646 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54703","26.757771","172.30.1.205","172.30.1.104","TCP","54","40646 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54704","26.757772","172.30.1.104","172.30.1.205","TCP","54","49671 > 40666 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "54705","26.757773","172.30.1.205","172.30.1.104","TCP","54","40666 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "54706","26.758521","172.30.1.205","172.30.1.104","TCP","54","48040 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54707","26.758639","172.30.1.205","172.30.1.104","TCP","74","40678 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929985 TSecr=0 WS=128" "54708","26.758784","172.30.1.104","172.30.1.205","TCP","54","135 > 48040 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54709","26.758813","172.30.1.104","172.30.1.205","TCP","54","135 > 48040 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54710","26.758818","172.30.1.205","172.30.1.104","TCP","54","48040 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54711","26.758918","172.30.1.104","172.30.1.205","TCP","66","49671 > 40678 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54712","26.758929","172.30.1.205","172.30.1.104","TCP","54","40678 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54713","26.759505","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54714","26.759793","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54715","26.759802","172.30.1.205","172.30.1.104","TCP","54","40678 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54716","26.761733","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54717","26.762083","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54718","26.762089","172.30.1.205","172.30.1.104","TCP","54","40678 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54719","26.763459","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54720","26.767435","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54721","26.767449","172.30.1.205","172.30.1.104","TCP","54","40678 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54722","26.768408","172.30.1.205","172.30.1.104","TCP","74","48044 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499929994 TSecr=0 WS=128" "54723","26.768744","172.30.1.104","172.30.1.205","TCP","66","135 > 48044 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54724","26.768755","172.30.1.205","172.30.1.104","TCP","54","48044 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54725","26.769109","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54726","26.769437","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54727","26.769446","172.30.1.205","172.30.1.104","TCP","54","48044 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54728","26.771619","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54729","26.772014","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54730","26.772026","172.30.1.205","172.30.1.104","TCP","54","48044 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54731","26.774041","172.30.1.205","172.30.1.104","TCP","54","48044 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54732","26.774152","172.30.1.205","172.30.1.104","TCP","74","40682 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930000 TSecr=0 WS=128" "54733","26.774300","172.30.1.104","172.30.1.205","TCP","54","135 > 48044 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54734","26.774315","172.30.1.104","172.30.1.205","TCP","54","135 > 48044 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54735","26.774321","172.30.1.205","172.30.1.104","TCP","54","48044 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54736","26.774436","172.30.1.104","172.30.1.205","TCP","66","49671 > 40682 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54737","26.774444","172.30.1.205","172.30.1.104","TCP","54","40682 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54738","26.774794","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54739","26.775085","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54740","26.775096","172.30.1.205","172.30.1.104","TCP","54","40682 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54741","26.777025","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54742","26.777447","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54743","26.777453","172.30.1.205","172.30.1.104","TCP","54","40682 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54744","26.778813","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54745","26.782786","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54746","26.782804","172.30.1.205","172.30.1.104","TCP","54","40682 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54747","26.783749","172.30.1.205","172.30.1.104","TCP","74","48048 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930010 TSecr=0 WS=128" "54748","26.784087","172.30.1.104","172.30.1.205","TCP","66","135 > 48048 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54749","26.784098","172.30.1.205","172.30.1.104","TCP","54","48048 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54750","26.784447","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54751","26.784791","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54752","26.784801","172.30.1.205","172.30.1.104","TCP","54","48048 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54753","26.787003","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54754","26.787400","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54755","26.787410","172.30.1.205","172.30.1.104","TCP","54","48048 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54756","26.789324","172.30.1.205","172.30.1.104","TCP","54","48048 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54757","26.789446","172.30.1.205","172.30.1.104","TCP","74","40686 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930015 TSecr=0 WS=128" "54758","26.789593","172.30.1.104","172.30.1.205","TCP","54","135 > 48048 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54759","26.789627","172.30.1.104","172.30.1.205","TCP","54","135 > 48048 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54760","26.789632","172.30.1.205","172.30.1.104","TCP","54","48048 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54761","26.789704","172.30.1.104","172.30.1.205","TCP","66","49671 > 40686 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54762","26.789713","172.30.1.205","172.30.1.104","TCP","54","40686 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54763","26.790067","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54764","26.790355","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54765","26.790364","172.30.1.205","172.30.1.104","TCP","54","40686 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54766","26.792244","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54767","26.792597","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54768","26.792603","172.30.1.205","172.30.1.104","TCP","54","40686 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54769","26.793985","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54770","26.798011","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54771","26.798030","172.30.1.205","172.30.1.104","TCP","54","40686 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54772","26.799116","172.30.1.205","172.30.1.104","TCP","74","48052 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930025 TSecr=0 WS=128" "54773","26.799390","172.30.1.104","172.30.1.205","TCP","66","135 > 48052 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54774","26.799401","172.30.1.205","172.30.1.104","TCP","54","48052 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54775","26.799752","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54776","26.800091","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54777","26.800101","172.30.1.205","172.30.1.104","TCP","54","48052 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54778","26.802329","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54779","26.802691","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54780","26.802698","172.30.1.205","172.30.1.104","TCP","54","48052 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54781","26.804519","172.30.1.205","172.30.1.104","TCP","54","48052 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54782","26.804630","172.30.1.205","172.30.1.104","TCP","74","40690 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930031 TSecr=0 WS=128" "54783","26.804784","172.30.1.104","172.30.1.205","TCP","54","135 > 48052 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54784","26.804799","172.30.1.104","172.30.1.205","TCP","54","135 > 48052 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54785","26.804804","172.30.1.205","172.30.1.104","TCP","54","48052 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54786","26.804918","172.30.1.104","172.30.1.205","TCP","66","49671 > 40690 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54787","26.804927","172.30.1.205","172.30.1.104","TCP","54","40690 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54788","26.805295","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54789","26.805592","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54790","26.805601","172.30.1.205","172.30.1.104","TCP","54","40690 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54791","26.807463","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54792","26.807902","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54793","26.807909","172.30.1.205","172.30.1.104","TCP","54","40690 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54794","26.809294","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54795","26.813268","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54796","26.813279","172.30.1.205","172.30.1.104","TCP","54","40690 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54797","26.814246","172.30.1.205","172.30.1.104","TCP","74","48056 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930040 TSecr=0 WS=128" "54798","26.814577","172.30.1.104","172.30.1.205","TCP","66","135 > 48056 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54799","26.814589","172.30.1.205","172.30.1.104","TCP","54","48056 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54800","26.814947","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54801","26.815317","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54802","26.815326","172.30.1.205","172.30.1.104","TCP","54","48056 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54803","26.817533","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54804","26.817954","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54805","26.817961","172.30.1.205","172.30.1.104","TCP","54","48056 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54806","26.819786","172.30.1.205","172.30.1.104","TCP","54","48056 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54807","26.819898","172.30.1.205","172.30.1.104","TCP","74","40694 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930046 TSecr=0 WS=128" "54808","26.820040","172.30.1.104","172.30.1.205","TCP","54","135 > 48056 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54809","26.820051","172.30.1.104","172.30.1.205","TCP","54","135 > 48056 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54810","26.820057","172.30.1.205","172.30.1.104","TCP","54","48056 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54811","26.820148","172.30.1.104","172.30.1.205","TCP","66","49671 > 40694 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54812","26.820156","172.30.1.205","172.30.1.104","TCP","54","40694 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54813","26.820501","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54814","26.820792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54815","26.820800","172.30.1.205","172.30.1.104","TCP","54","40694 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54816","26.822683","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54817","26.823443","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54818","26.823449","172.30.1.205","172.30.1.104","TCP","54","40694 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54819","26.824825","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54820","26.828798","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54821","26.828808","172.30.1.205","172.30.1.104","TCP","54","40694 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54822","26.829766","172.30.1.205","172.30.1.104","TCP","74","48060 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930056 TSecr=0 WS=128" "54823","26.830086","172.30.1.104","172.30.1.205","TCP","66","135 > 48060 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54824","26.830098","172.30.1.205","172.30.1.104","TCP","54","48060 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54825","26.830459","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54826","26.830796","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54827","26.830805","172.30.1.205","172.30.1.104","TCP","54","48060 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54828","26.833018","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54829","26.833422","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54830","26.833429","172.30.1.205","172.30.1.104","TCP","54","48060 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54831","26.835253","172.30.1.205","172.30.1.104","TCP","54","48060 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54832","26.835366","172.30.1.205","172.30.1.104","TCP","74","40698 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930061 TSecr=0 WS=128" "54833","26.835548","172.30.1.104","172.30.1.205","TCP","54","135 > 48060 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54834","26.835605","172.30.1.104","172.30.1.205","TCP","54","135 > 48060 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54835","26.835611","172.30.1.205","172.30.1.104","TCP","54","48060 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54836","26.835636","172.30.1.104","172.30.1.205","TCP","66","49671 > 40698 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54837","26.835644","172.30.1.205","172.30.1.104","TCP","54","40698 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54838","26.836016","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54839","26.836324","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54840","26.836332","172.30.1.205","172.30.1.104","TCP","54","40698 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54841","26.838274","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54842","26.838621","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54843","26.838625","172.30.1.205","172.30.1.104","TCP","54","40698 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54844","26.839990","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54845","26.844013","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54846","26.844023","172.30.1.205","172.30.1.104","TCP","54","40698 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54847","26.845019","172.30.1.205","172.30.1.104","TCP","74","48064 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930071 TSecr=0 WS=128" "54848","26.845350","172.30.1.104","172.30.1.205","TCP","66","135 > 48064 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54849","26.845362","172.30.1.205","172.30.1.104","TCP","54","48064 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54850","26.845724","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54851","26.846011","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54852","26.846020","172.30.1.205","172.30.1.104","TCP","54","48064 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54853","26.848266","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54854","26.848671","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54855","26.848680","172.30.1.205","172.30.1.104","TCP","54","48064 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54856","26.850574","172.30.1.205","172.30.1.104","TCP","54","48064 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54857","26.850696","172.30.1.205","172.30.1.104","TCP","74","40702 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930077 TSecr=0 WS=128" "54858","26.850863","172.30.1.104","172.30.1.205","TCP","54","135 > 48064 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54859","26.850873","172.30.1.104","172.30.1.205","TCP","54","135 > 48064 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54860","26.850879","172.30.1.205","172.30.1.104","TCP","54","48064 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54861","26.850958","172.30.1.104","172.30.1.205","TCP","66","49671 > 40702 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54862","26.850966","172.30.1.205","172.30.1.104","TCP","54","40702 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54863","26.851313","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54864","26.851660","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54865","26.851667","172.30.1.205","172.30.1.104","TCP","54","40702 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54866","26.853590","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54867","26.853953","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54868","26.853965","172.30.1.205","172.30.1.104","TCP","54","40702 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54869","26.855591","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54870","26.859647","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54871","26.859657","172.30.1.205","172.30.1.104","TCP","54","40702 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54872","26.860614","172.30.1.205","172.30.1.104","TCP","74","48068 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930087 TSecr=0 WS=128" "54873","26.860912","172.30.1.104","172.30.1.205","TCP","66","135 > 48068 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54874","26.860924","172.30.1.205","172.30.1.104","TCP","54","48068 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54875","26.861292","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54876","26.861591","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54877","26.861600","172.30.1.205","172.30.1.104","TCP","54","48068 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54878","26.863820","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54879","26.864216","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54880","26.864231","172.30.1.205","172.30.1.104","TCP","54","48068 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54881","26.866063","172.30.1.205","172.30.1.104","TCP","54","48068 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54882","26.866175","172.30.1.205","172.30.1.104","TCP","74","40706 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930092 TSecr=0 WS=128" "54883","26.866343","172.30.1.104","172.30.1.205","TCP","54","135 > 48068 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54884","26.866391","172.30.1.104","172.30.1.205","TCP","54","135 > 48068 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54885","26.866397","172.30.1.205","172.30.1.104","TCP","54","48068 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54886","26.866453","172.30.1.104","172.30.1.205","TCP","66","49671 > 40706 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54887","26.866469","172.30.1.205","172.30.1.104","TCP","54","40706 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54888","26.866877","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54889","26.867186","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54890","26.867198","172.30.1.205","172.30.1.104","TCP","54","40706 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54891","26.869159","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54892","26.869523","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54893","26.869536","172.30.1.205","172.30.1.104","TCP","54","40706 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54894","26.871154","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54895","26.875219","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54896","26.875243","172.30.1.205","172.30.1.104","TCP","54","40706 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54897","26.876210","172.30.1.205","172.30.1.104","TCP","74","48072 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930102 TSecr=0 WS=128" "54898","26.876547","172.30.1.104","172.30.1.205","TCP","66","135 > 48072 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54899","26.876559","172.30.1.205","172.30.1.104","TCP","54","48072 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54900","26.876951","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54901","26.877252","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54902","26.877262","172.30.1.205","172.30.1.104","TCP","54","48072 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54903","26.879455","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54904","26.879856","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54905","26.879863","172.30.1.205","172.30.1.104","TCP","54","48072 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54906","26.881721","172.30.1.205","172.30.1.104","TCP","54","48072 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54907","26.881834","172.30.1.205","172.30.1.104","TCP","74","40710 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930108 TSecr=0 WS=128" "54908","26.881982","172.30.1.104","172.30.1.205","TCP","54","135 > 48072 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54909","26.882031","172.30.1.104","172.30.1.205","TCP","54","135 > 48072 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54910","26.882036","172.30.1.205","172.30.1.104","TCP","54","48072 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54911","26.882105","172.30.1.104","172.30.1.205","TCP","66","49671 > 40710 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54912","26.882113","172.30.1.205","172.30.1.104","TCP","54","40710 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54913","26.882463","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54914","26.882730","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54915","26.882739","172.30.1.205","172.30.1.104","TCP","54","40710 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54916","26.884613","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54917","26.885096","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54918","26.885103","172.30.1.205","172.30.1.104","TCP","54","40710 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54919","26.886470","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54920","26.890594","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54921","26.890605","172.30.1.205","172.30.1.104","TCP","54","40710 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54922","26.891568","172.30.1.205","172.30.1.104","TCP","74","48076 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930117 TSecr=0 WS=128" "54923","26.891888","172.30.1.104","172.30.1.205","TCP","66","135 > 48076 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54924","26.891898","172.30.1.205","172.30.1.104","TCP","54","48076 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54925","26.892248","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54926","26.892519","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54927","26.892528","172.30.1.205","172.30.1.104","TCP","54","48076 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54928","26.894752","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54929","26.895110","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54930","26.895117","172.30.1.205","172.30.1.104","TCP","54","48076 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54931","26.896991","172.30.1.205","172.30.1.104","TCP","54","48076 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54932","26.897100","172.30.1.205","172.30.1.104","TCP","74","40714 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930123 TSecr=0 WS=128" "54933","26.897250","172.30.1.104","172.30.1.205","TCP","54","135 > 48076 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54934","26.897288","172.30.1.104","172.30.1.205","TCP","54","135 > 48076 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54935","26.897293","172.30.1.205","172.30.1.104","TCP","54","48076 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54936","26.897405","172.30.1.104","172.30.1.205","TCP","66","49671 > 40714 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54937","26.897413","172.30.1.205","172.30.1.104","TCP","54","40714 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54938","26.897769","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54939","26.898518","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54940","26.898527","172.30.1.205","172.30.1.104","TCP","54","40714 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54941","26.900418","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54942","26.900742","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54943","26.900749","172.30.1.205","172.30.1.104","TCP","54","40714 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54944","26.902119","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54945","26.906023","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54946","26.906032","172.30.1.205","172.30.1.104","TCP","54","40714 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54947","26.906985","172.30.1.205","172.30.1.104","TCP","74","48080 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930133 TSecr=0 WS=128" "54948","26.907279","172.30.1.104","172.30.1.205","TCP","66","135 > 48080 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54949","26.907289","172.30.1.205","172.30.1.104","TCP","54","48080 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54950","26.907644","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54951","26.907962","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54952","26.907980","172.30.1.205","172.30.1.104","TCP","54","48080 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54953","26.910259","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54954","26.910638","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54955","26.910645","172.30.1.205","172.30.1.104","TCP","54","48080 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54956","26.912484","172.30.1.205","172.30.1.104","TCP","54","48080 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54957","26.912599","172.30.1.205","172.30.1.104","TCP","74","40718 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930139 TSecr=0 WS=128" "54958","26.912721","172.30.1.104","172.30.1.205","TCP","54","135 > 48080 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54959","26.912732","172.30.1.104","172.30.1.205","TCP","54","135 > 48080 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54960","26.912737","172.30.1.205","172.30.1.104","TCP","54","48080 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54961","26.912863","172.30.1.104","172.30.1.205","TCP","66","49671 > 40718 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54962","26.912872","172.30.1.205","172.30.1.104","TCP","54","40718 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54963","26.913236","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54964","26.913526","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54965","26.913534","172.30.1.205","172.30.1.104","TCP","54","40718 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54966","26.915411","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54967","26.915757","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54968","26.915763","172.30.1.205","172.30.1.104","TCP","54","40718 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54969","26.917173","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54970","26.921091","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54971","26.921101","172.30.1.205","172.30.1.104","TCP","54","40718 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54972","26.922053","172.30.1.205","172.30.1.104","TCP","74","48084 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930148 TSecr=0 WS=128" "54973","26.922329","172.30.1.104","172.30.1.205","TCP","66","135 > 48084 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54974","26.922339","172.30.1.205","172.30.1.104","TCP","54","48084 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54975","26.922701","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "54976","26.922965","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54977","26.922974","172.30.1.205","172.30.1.104","TCP","54","48084 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54978","26.925188","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "54979","26.925568","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "54980","26.925574","172.30.1.205","172.30.1.104","TCP","54","48084 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "54981","26.927396","172.30.1.205","172.30.1.104","TCP","54","48084 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "54982","26.927507","172.30.1.205","172.30.1.104","TCP","74","40722 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930153 TSecr=0 WS=128" "54983","26.928011","172.30.1.104","172.30.1.205","TCP","54","135 > 48084 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54984","26.928123","172.30.1.104","172.30.1.205","TCP","54","135 > 48084 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "54985","26.928128","172.30.1.205","172.30.1.104","TCP","54","48084 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "54986","26.928133","172.30.1.104","172.30.1.205","TCP","66","49671 > 40722 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54987","26.928145","172.30.1.205","172.30.1.104","TCP","54","40722 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "54988","26.928493","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "54989","26.928792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "54990","26.928805","172.30.1.205","172.30.1.104","TCP","54","40722 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "54991","26.930773","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "54992","26.931158","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "54993","26.931165","172.30.1.205","172.30.1.104","TCP","54","40722 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "54994","26.932540","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "54995","26.936863","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "54996","26.936873","172.30.1.205","172.30.1.104","TCP","54","40722 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "54997","26.937828","172.30.1.205","172.30.1.104","TCP","74","48088 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930164 TSecr=0 WS=128" "54998","26.938183","172.30.1.104","172.30.1.205","TCP","66","135 > 48088 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "54999","26.938204","172.30.1.205","172.30.1.104","TCP","54","48088 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55000","26.938692","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55001","26.939059","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55002","26.939067","172.30.1.205","172.30.1.104","TCP","54","48088 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55003","26.941276","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55004","26.941740","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55005","26.941750","172.30.1.205","172.30.1.104","TCP","54","48088 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55006","26.942672","172.30.1.205","172.30.1.104","TCP","54","40682 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55007","26.942723","172.30.1.205","172.30.1.104","TCP","54","40686 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55008","26.942761","172.30.1.205","172.30.1.104","TCP","54","40690 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55009","26.942794","172.30.1.205","172.30.1.104","TCP","54","40694 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55010","26.942825","172.30.1.205","172.30.1.104","TCP","54","40698 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55011","26.942856","172.30.1.205","172.30.1.104","TCP","54","40702 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55012","26.942887","172.30.1.205","172.30.1.104","TCP","54","40706 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55013","26.942915","172.30.1.205","172.30.1.104","TCP","54","40710 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55014","26.942941","172.30.1.205","172.30.1.104","TCP","54","40714 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55015","26.942952","172.30.1.104","172.30.1.205","TCP","54","49671 > 40682 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55016","26.942967","172.30.1.104","172.30.1.205","TCP","54","49671 > 40686 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55017","26.942998","172.30.1.205","172.30.1.104","TCP","54","40718 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55018","26.943032","172.30.1.205","172.30.1.104","TCP","54","40722 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55019","26.943110","172.30.1.205","172.30.1.104","TCP","54","40678 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55020","26.943116","172.30.1.104","172.30.1.205","TCP","54","49671 > 40690 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55021","26.943131","172.30.1.104","172.30.1.205","TCP","54","49671 > 40682 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55022","26.943137","172.30.1.205","172.30.1.104","TCP","54","40682 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55023","26.943165","172.30.1.104","172.30.1.205","TCP","54","49671 > 40686 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55024","26.943168","172.30.1.205","172.30.1.104","TCP","54","40686 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55025","26.943185","172.30.1.104","172.30.1.205","TCP","54","49671 > 40690 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55026","26.943188","172.30.1.205","172.30.1.104","TCP","54","40690 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55027","26.943205","172.30.1.104","172.30.1.205","TCP","54","49671 > 40694 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55028","26.943226","172.30.1.104","172.30.1.205","TCP","54","49671 > 40698 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55029","26.943247","172.30.1.104","172.30.1.205","TCP","54","49671 > 40694 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55030","26.943251","172.30.1.205","172.30.1.104","TCP","54","40694 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55031","26.943267","172.30.1.104","172.30.1.205","TCP","54","49671 > 40702 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55032","26.943405","172.30.1.104","172.30.1.205","TCP","54","49671 > 40706 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55033","26.943425","172.30.1.104","172.30.1.205","TCP","54","49671 > 40706 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55034","26.943429","172.30.1.205","172.30.1.104","TCP","54","40706 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55035","26.943454","172.30.1.104","172.30.1.205","TCP","54","49671 > 40698 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55036","26.943457","172.30.1.205","172.30.1.104","TCP","54","40698 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55037","26.943480","172.30.1.104","172.30.1.205","TCP","54","49671 > 40702 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55038","26.943484","172.30.1.205","172.30.1.104","TCP","54","40702 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55039","26.943512","172.30.1.104","172.30.1.205","TCP","54","49671 > 40710 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55040","26.943532","172.30.1.104","172.30.1.205","TCP","54","49671 > 40714 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55041","26.943551","172.30.1.104","172.30.1.205","TCP","54","49671 > 40718 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55042","26.943636","172.30.1.104","172.30.1.205","TCP","54","49671 > 40710 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55043","26.943640","172.30.1.205","172.30.1.104","TCP","54","40710 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55044","26.943655","172.30.1.104","172.30.1.205","TCP","54","49671 > 40722 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55045","26.943676","172.30.1.104","172.30.1.205","TCP","54","49671 > 40722 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55046","26.943680","172.30.1.205","172.30.1.104","TCP","54","40722 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55047","26.943696","172.30.1.104","172.30.1.205","TCP","54","49671 > 40714 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55048","26.943699","172.30.1.205","172.30.1.104","TCP","54","40714 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55049","26.943716","172.30.1.104","172.30.1.205","TCP","54","49671 > 40718 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55050","26.943718","172.30.1.205","172.30.1.104","TCP","54","40718 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55051","26.943735","172.30.1.104","172.30.1.205","TCP","54","49671 > 40678 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55052","26.943755","172.30.1.104","172.30.1.205","TCP","54","49671 > 40678 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55053","26.943758","172.30.1.205","172.30.1.104","TCP","54","40678 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55054","26.944679","172.30.1.205","172.30.1.104","TCP","54","48088 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55055","26.944822","172.30.1.205","172.30.1.104","TCP","74","40726 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930171 TSecr=0 WS=128" "55056","26.944945","172.30.1.104","172.30.1.205","TCP","54","135 > 48088 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55057","26.944966","172.30.1.104","172.30.1.205","TCP","54","135 > 48088 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55058","26.944971","172.30.1.205","172.30.1.104","TCP","54","48088 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55059","26.945102","172.30.1.104","172.30.1.205","TCP","66","49671 > 40726 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55060","26.945111","172.30.1.205","172.30.1.104","TCP","54","40726 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55061","26.945485","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55062","26.945762","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55063","26.945771","172.30.1.205","172.30.1.104","TCP","54","40726 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55064","26.947729","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55065","26.948414","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55066","26.948426","172.30.1.205","172.30.1.104","TCP","54","40726 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55067","26.950038","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55068","26.954098","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55069","26.954109","172.30.1.205","172.30.1.104","TCP","54","40726 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55070","26.955061","172.30.1.205","172.30.1.104","TCP","74","48092 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930181 TSecr=0 WS=128" "55071","26.955391","172.30.1.104","172.30.1.205","TCP","66","135 > 48092 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55072","26.955403","172.30.1.205","172.30.1.104","TCP","54","48092 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55073","26.955761","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55074","26.956081","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55075","26.956089","172.30.1.205","172.30.1.104","TCP","54","48092 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55076","26.958285","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55077","26.958695","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55078","26.958701","172.30.1.205","172.30.1.104","TCP","54","48092 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55079","26.960514","172.30.1.205","172.30.1.104","TCP","54","48092 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55080","26.960625","172.30.1.205","172.30.1.104","TCP","74","40730 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930187 TSecr=0 WS=128" "55081","26.960793","172.30.1.104","172.30.1.205","TCP","54","135 > 48092 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55082","26.960811","172.30.1.104","172.30.1.205","TCP","54","135 > 48092 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55083","26.960816","172.30.1.205","172.30.1.104","TCP","54","48092 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55084","26.960895","172.30.1.104","172.30.1.205","TCP","66","49671 > 40730 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55085","26.960904","172.30.1.205","172.30.1.104","TCP","54","40730 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55086","26.961258","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55087","26.961533","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55088","26.961542","172.30.1.205","172.30.1.104","TCP","54","40730 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55089","26.963416","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55090","26.963797","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55091","26.963803","172.30.1.205","172.30.1.104","TCP","54","40730 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55092","26.965182","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55093","26.969153","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55094","26.969163","172.30.1.205","172.30.1.104","TCP","54","40730 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55095","26.970114","172.30.1.205","172.30.1.104","TCP","74","48096 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930196 TSecr=0 WS=128" "55096","26.970402","172.30.1.104","172.30.1.205","TCP","66","135 > 48096 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55097","26.970413","172.30.1.205","172.30.1.104","TCP","54","48096 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55098","26.970773","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55099","26.971042","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55100","26.971052","172.30.1.205","172.30.1.104","TCP","54","48096 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55101","26.973279","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55102","26.973708","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55103","26.973715","172.30.1.205","172.30.1.104","TCP","54","48096 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55104","26.975520","172.30.1.205","172.30.1.104","TCP","54","48096 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55105","26.975632","172.30.1.205","172.30.1.104","TCP","74","40734 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930202 TSecr=0 WS=128" "55106","26.975847","172.30.1.104","172.30.1.205","TCP","54","135 > 48096 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55107","26.975856","172.30.1.104","172.30.1.205","TCP","54","135 > 48096 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55108","26.975861","172.30.1.205","172.30.1.104","TCP","54","48096 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55109","26.975906","172.30.1.104","172.30.1.205","TCP","66","49671 > 40734 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55110","26.975915","172.30.1.205","172.30.1.104","TCP","54","40734 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55111","26.976258","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55112","26.976553","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55113","26.976560","172.30.1.205","172.30.1.104","TCP","54","40734 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55114","26.978466","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55115","26.978830","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55116","26.978836","172.30.1.205","172.30.1.104","TCP","54","40734 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55117","26.980191","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55118","26.984355","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55119","26.984366","172.30.1.205","172.30.1.104","TCP","54","40734 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55120","26.985365","172.30.1.205","172.30.1.104","TCP","74","48100 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930211 TSecr=0 WS=128" "55121","26.985656","172.30.1.104","172.30.1.205","TCP","66","135 > 48100 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55122","26.985667","172.30.1.205","172.30.1.104","TCP","54","48100 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55123","26.986021","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55124","26.986308","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55125","26.986317","172.30.1.205","172.30.1.104","TCP","54","48100 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55126","26.988512","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55127","26.988892","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55128","26.988898","172.30.1.205","172.30.1.104","TCP","54","48100 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55129","26.990720","172.30.1.205","172.30.1.104","TCP","54","48100 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55130","26.990831","172.30.1.205","172.30.1.104","TCP","74","40738 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930217 TSecr=0 WS=128" "55131","26.990994","172.30.1.104","172.30.1.205","TCP","54","135 > 48100 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55132","26.991003","172.30.1.104","172.30.1.205","TCP","54","135 > 48100 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55133","26.991009","172.30.1.205","172.30.1.104","TCP","54","48100 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55134","26.991112","172.30.1.104","172.30.1.205","TCP","66","49671 > 40738 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55135","26.991121","172.30.1.205","172.30.1.104","TCP","54","40738 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55136","26.991466","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55137","26.991741","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55138","26.991749","172.30.1.205","172.30.1.104","TCP","54","40738 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55139","26.993666","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55140","26.994780","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55141","26.994787","172.30.1.205","172.30.1.104","TCP","54","40738 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55142","26.996153","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55143","27.000228","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55144","27.000241","172.30.1.205","172.30.1.104","TCP","54","40738 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55145","27.001298","172.30.1.205","172.30.1.104","TCP","74","48104 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930227 TSecr=0 WS=128" "55146","27.001625","172.30.1.104","172.30.1.205","TCP","66","135 > 48104 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55147","27.001637","172.30.1.205","172.30.1.104","TCP","54","48104 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55148","27.002002","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55149","27.002299","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55150","27.002312","172.30.1.205","172.30.1.104","TCP","54","48104 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55151","27.004604","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55152","27.004999","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55153","27.005006","172.30.1.205","172.30.1.104","TCP","54","48104 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55154","27.006849","172.30.1.205","172.30.1.104","TCP","54","48104 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55155","27.006984","172.30.1.205","172.30.1.104","TCP","74","40742 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930233 TSecr=0 WS=128" "55156","27.007135","172.30.1.104","172.30.1.205","TCP","54","135 > 48104 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55157","27.007147","172.30.1.104","172.30.1.205","TCP","54","135 > 48104 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55158","27.007153","172.30.1.205","172.30.1.104","TCP","54","48104 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55159","27.007250","172.30.1.104","172.30.1.205","TCP","66","49671 > 40742 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55160","27.007258","172.30.1.205","172.30.1.104","TCP","54","40742 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55161","27.007606","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55162","27.007971","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55163","27.007989","172.30.1.205","172.30.1.104","TCP","54","40742 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55164","27.010014","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55165","27.010399","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55166","27.010405","172.30.1.205","172.30.1.104","TCP","54","40742 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55167","27.011799","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55168","27.015900","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55169","27.015917","172.30.1.205","172.30.1.104","TCP","54","40742 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55170","27.017056","172.30.1.205","172.30.1.104","TCP","74","48108 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930243 TSecr=0 WS=128" "55171","27.017380","172.30.1.104","172.30.1.205","TCP","66","135 > 48108 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55172","27.017393","172.30.1.205","172.30.1.104","TCP","54","48108 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55173","27.017763","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55174","27.018047","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55175","27.018057","172.30.1.205","172.30.1.104","TCP","54","48108 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55176","27.020330","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55177","27.020718","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55178","27.020725","172.30.1.205","172.30.1.104","TCP","54","48108 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55179","27.022570","172.30.1.205","172.30.1.104","TCP","54","48108 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55180","27.022693","172.30.1.205","172.30.1.104","TCP","74","40746 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930249 TSecr=0 WS=128" "55181","27.022883","172.30.1.104","172.30.1.205","TCP","54","135 > 48108 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55182","27.022909","172.30.1.104","172.30.1.205","TCP","54","135 > 48108 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55183","27.022916","172.30.1.205","172.30.1.104","TCP","54","48108 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55184","27.023000","172.30.1.104","172.30.1.205","TCP","66","49671 > 40746 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55185","27.023008","172.30.1.205","172.30.1.104","TCP","54","40746 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55186","27.023357","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55187","27.023683","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55188","27.023692","172.30.1.205","172.30.1.104","TCP","54","40746 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55189","27.025639","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55190","27.026039","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55191","27.026045","172.30.1.205","172.30.1.104","TCP","54","40746 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55192","27.027419","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55193","27.031514","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55194","27.031526","172.30.1.205","172.30.1.104","TCP","54","40746 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55195","27.032539","172.30.1.205","172.30.1.104","TCP","74","48112 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930258 TSecr=0 WS=128" "55196","27.032866","172.30.1.104","172.30.1.205","TCP","66","135 > 48112 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55197","27.032878","172.30.1.205","172.30.1.104","TCP","54","48112 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55198","27.033243","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55199","27.033541","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55200","27.033550","172.30.1.205","172.30.1.104","TCP","54","48112 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55201","27.035765","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55202","27.036149","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55203","27.036155","172.30.1.205","172.30.1.104","TCP","54","48112 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55204","27.038000","172.30.1.205","172.30.1.104","TCP","54","48112 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55205","27.038114","172.30.1.205","172.30.1.104","TCP","74","40750 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930264 TSecr=0 WS=128" "55206","27.038297","172.30.1.104","172.30.1.205","TCP","54","135 > 48112 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55207","27.038365","172.30.1.104","172.30.1.205","TCP","54","135 > 48112 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55208","27.038371","172.30.1.205","172.30.1.104","TCP","54","48112 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55209","27.038457","172.30.1.104","172.30.1.205","TCP","66","49671 > 40750 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55210","27.038466","172.30.1.205","172.30.1.104","TCP","54","40750 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55211","27.038831","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55212","27.039130","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55213","27.039140","172.30.1.205","172.30.1.104","TCP","54","40750 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55214","27.041051","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55215","27.041409","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55216","27.041415","172.30.1.205","172.30.1.104","TCP","54","40750 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55217","27.042785","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55218","27.046899","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55219","27.046909","172.30.1.205","172.30.1.104","TCP","54","40750 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55220","27.047912","172.30.1.205","172.30.1.104","TCP","74","48116 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930274 TSecr=0 WS=128" "55221","27.048230","172.30.1.104","172.30.1.205","TCP","66","135 > 48116 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55222","27.048241","172.30.1.205","172.30.1.104","TCP","54","48116 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55223","27.048595","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55224","27.048881","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55225","27.048890","172.30.1.205","172.30.1.104","TCP","54","48116 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55226","27.051115","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55227","27.051567","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55228","27.051579","172.30.1.205","172.30.1.104","TCP","54","48116 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55229","27.053450","172.30.1.205","172.30.1.104","TCP","54","48116 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55230","27.053569","172.30.1.205","172.30.1.104","TCP","74","40754 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930279 TSecr=0 WS=128" "55231","27.053735","172.30.1.104","172.30.1.205","TCP","54","135 > 48116 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55232","27.053759","172.30.1.104","172.30.1.205","TCP","54","135 > 48116 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55233","27.053766","172.30.1.205","172.30.1.104","TCP","54","48116 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55234","27.053892","172.30.1.104","172.30.1.205","TCP","66","49671 > 40754 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55235","27.053909","172.30.1.205","172.30.1.104","TCP","54","40754 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55236","27.054302","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55237","27.054593","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55238","27.054602","172.30.1.205","172.30.1.104","TCP","54","40754 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55239","27.056511","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55240","27.057787","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55241","27.057794","172.30.1.205","172.30.1.104","TCP","54","40754 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55242","27.059178","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55243","27.063127","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55244","27.063137","172.30.1.205","172.30.1.104","TCP","54","40754 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55245","27.064119","172.30.1.205","172.30.1.104","TCP","74","48120 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930290 TSecr=0 WS=128" "55246","27.064429","172.30.1.104","172.30.1.205","TCP","66","135 > 48120 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55247","27.064440","172.30.1.205","172.30.1.104","TCP","54","48120 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55248","27.064820","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55249","27.065148","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55250","27.065157","172.30.1.205","172.30.1.104","TCP","54","48120 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55251","27.067361","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55252","27.067777","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55253","27.067784","172.30.1.205","172.30.1.104","TCP","54","48120 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55254","27.069624","172.30.1.205","172.30.1.104","TCP","54","48120 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55255","27.069745","172.30.1.205","172.30.1.104","TCP","74","40758 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930296 TSecr=0 WS=128" "55256","27.069909","172.30.1.104","172.30.1.205","TCP","54","135 > 48120 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55257","27.069934","172.30.1.104","172.30.1.205","TCP","54","135 > 48120 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55258","27.069940","172.30.1.205","172.30.1.104","TCP","54","48120 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55259","27.070025","172.30.1.104","172.30.1.205","TCP","66","49671 > 40758 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55260","27.070033","172.30.1.205","172.30.1.104","TCP","54","40758 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55261","27.070383","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55262","27.070660","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55263","27.070669","172.30.1.205","172.30.1.104","TCP","54","40758 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55264","27.072547","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55265","27.072974","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55266","27.072984","172.30.1.205","172.30.1.104","TCP","54","40758 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55267","27.074425","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55268","27.078515","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55269","27.078527","172.30.1.205","172.30.1.104","TCP","54","40758 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55270","27.079548","172.30.1.205","172.30.1.104","TCP","74","48124 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930305 TSecr=0 WS=128" "55271","27.079829","172.30.1.104","172.30.1.205","TCP","66","135 > 48124 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55272","27.079840","172.30.1.205","172.30.1.104","TCP","54","48124 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55273","27.080193","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55274","27.080538","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55275","27.080547","172.30.1.205","172.30.1.104","TCP","54","48124 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55276","27.082763","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55277","27.083166","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55278","27.083172","172.30.1.205","172.30.1.104","TCP","54","48124 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55279","27.085025","172.30.1.205","172.30.1.104","TCP","54","48124 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55280","27.085139","172.30.1.205","172.30.1.104","TCP","74","40762 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930311 TSecr=0 WS=128" "55281","27.085326","172.30.1.104","172.30.1.205","TCP","54","135 > 48124 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55282","27.085351","172.30.1.104","172.30.1.205","TCP","54","135 > 48124 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55283","27.085359","172.30.1.205","172.30.1.104","TCP","54","48124 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55284","27.085456","172.30.1.104","172.30.1.205","TCP","66","49671 > 40762 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55285","27.085466","172.30.1.205","172.30.1.104","TCP","54","40762 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55286","27.085871","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55287","27.086156","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55288","27.086165","172.30.1.205","172.30.1.104","TCP","54","40762 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55289","27.088057","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55290","27.088461","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55291","27.088472","172.30.1.205","172.30.1.104","TCP","54","40762 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55292","27.089949","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55293","27.094005","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55294","27.094020","172.30.1.205","172.30.1.104","TCP","54","40762 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55295","27.095036","172.30.1.205","172.30.1.104","TCP","74","48128 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930321 TSecr=0 WS=128" "55296","27.095397","172.30.1.104","172.30.1.205","TCP","66","135 > 48128 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55297","27.095409","172.30.1.205","172.30.1.104","TCP","54","48128 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55298","27.095774","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55299","27.096069","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55300","27.096077","172.30.1.205","172.30.1.104","TCP","54","48128 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55301","27.098317","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55302","27.098759","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55303","27.098766","172.30.1.205","172.30.1.104","TCP","54","48128 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55304","27.100612","172.30.1.205","172.30.1.104","TCP","54","48128 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55305","27.100725","172.30.1.205","172.30.1.104","TCP","74","40766 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930327 TSecr=0 WS=128" "55306","27.100868","172.30.1.104","172.30.1.205","TCP","54","135 > 48128 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55307","27.100880","172.30.1.104","172.30.1.205","TCP","54","135 > 48128 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55308","27.100887","172.30.1.205","172.30.1.104","TCP","54","48128 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55309","27.100990","172.30.1.104","172.30.1.205","TCP","66","49671 > 40766 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55310","27.100998","172.30.1.205","172.30.1.104","TCP","54","40766 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55311","27.101363","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55312","27.101652","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55313","27.101661","172.30.1.205","172.30.1.104","TCP","54","40766 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55314","27.103537","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55315","27.103900","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55316","27.103907","172.30.1.205","172.30.1.104","TCP","54","40766 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55317","27.105355","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55318","27.109472","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55319","27.109483","172.30.1.205","172.30.1.104","TCP","54","40766 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55320","27.110451","172.30.1.205","172.30.1.104","TCP","74","48132 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930336 TSecr=0 WS=128" "55321","27.110750","172.30.1.104","172.30.1.205","TCP","66","135 > 48132 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55322","27.110761","172.30.1.205","172.30.1.104","TCP","54","48132 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55323","27.111116","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55324","27.111418","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55325","27.111436","172.30.1.205","172.30.1.104","TCP","54","48132 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55326","27.113921","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55327","27.114296","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55328","27.114303","172.30.1.205","172.30.1.104","TCP","54","48132 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55329","27.116248","172.30.1.205","172.30.1.104","TCP","54","48132 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55330","27.116358","172.30.1.205","172.30.1.104","TCP","74","40770 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930342 TSecr=0 WS=128" "55331","27.116525","172.30.1.104","172.30.1.205","TCP","54","135 > 48132 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55332","27.116652","172.30.1.104","172.30.1.205","TCP","54","135 > 48132 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55333","27.116662","172.30.1.205","172.30.1.104","TCP","54","48132 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55334","27.116671","172.30.1.104","172.30.1.205","TCP","66","49671 > 40770 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55335","27.116687","172.30.1.205","172.30.1.104","TCP","54","40770 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55336","27.117106","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55337","27.117383","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55338","27.117392","172.30.1.205","172.30.1.104","TCP","54","40770 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55339","27.119277","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55340","27.119636","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55341","27.119643","172.30.1.205","172.30.1.104","TCP","54","40770 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55342","27.121021","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55343","27.125054","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55344","27.125065","172.30.1.205","172.30.1.104","TCP","54","40770 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55345","27.126024","172.30.1.205","172.30.1.104","TCP","74","48136 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930352 TSecr=0 WS=128" "55346","27.126341","172.30.1.104","172.30.1.205","TCP","66","135 > 48136 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55347","27.126353","172.30.1.205","172.30.1.104","TCP","54","48136 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55348","27.126712","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55349","27.126988","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55350","27.126997","172.30.1.205","172.30.1.104","TCP","54","48136 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55351","27.129199","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55352","27.129577","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55353","27.129583","172.30.1.205","172.30.1.104","TCP","54","48136 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55354","27.130430","172.30.1.205","172.30.1.104","TCP","54","40730 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55355","27.130480","172.30.1.205","172.30.1.104","TCP","54","40734 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55356","27.130527","172.30.1.205","172.30.1.104","TCP","54","40738 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55357","27.130562","172.30.1.205","172.30.1.104","TCP","54","40742 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55358","27.130595","172.30.1.205","172.30.1.104","TCP","54","40746 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55359","27.130627","172.30.1.205","172.30.1.104","TCP","54","40750 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55360","27.130659","172.30.1.205","172.30.1.104","TCP","54","40754 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55361","27.130685","172.30.1.205","172.30.1.104","TCP","54","40758 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55362","27.130717","172.30.1.205","172.30.1.104","TCP","54","40762 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55363","27.130743","172.30.1.205","172.30.1.104","TCP","54","40766 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55364","27.130769","172.30.1.205","172.30.1.104","TCP","54","40770 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55365","27.130810","172.30.1.104","172.30.1.205","TCP","54","49671 > 40730 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55366","27.130830","172.30.1.104","172.30.1.205","TCP","54","49671 > 40734 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55367","27.130850","172.30.1.104","172.30.1.205","TCP","54","49671 > 40738 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55368","27.130870","172.30.1.104","172.30.1.205","TCP","54","49671 > 40742 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55369","27.130890","172.30.1.205","172.30.1.104","TCP","54","40726 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55370","27.130967","172.30.1.104","172.30.1.205","TCP","54","49671 > 40730 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55371","27.130974","172.30.1.205","172.30.1.104","TCP","54","40730 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55372","27.130986","172.30.1.104","172.30.1.205","TCP","54","49671 > 40746 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55373","27.131010","172.30.1.104","172.30.1.205","TCP","54","49671 > 40746 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55374","27.131015","172.30.1.205","172.30.1.104","TCP","54","40746 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55375","27.131030","172.30.1.104","172.30.1.205","TCP","54","49671 > 40742 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55376","27.131033","172.30.1.205","172.30.1.104","TCP","54","40742 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55377","27.131050","172.30.1.104","172.30.1.205","TCP","54","49671 > 40734 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55378","27.131052","172.30.1.205","172.30.1.104","TCP","54","40734 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55379","27.131070","172.30.1.104","172.30.1.205","TCP","54","49671 > 40738 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55380","27.131073","172.30.1.205","172.30.1.104","TCP","54","40738 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55381","27.131092","172.30.1.104","172.30.1.205","TCP","54","49671 > 40750 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55382","27.131118","172.30.1.104","172.30.1.205","TCP","54","49671 > 40754 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55383","27.131243","172.30.1.104","172.30.1.205","TCP","54","49671 > 40758 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55384","27.131249","172.30.1.104","172.30.1.205","TCP","54","49671 > 40750 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55385","27.131253","172.30.1.205","172.30.1.104","TCP","54","40750 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55386","27.131296","172.30.1.104","172.30.1.205","TCP","54","49671 > 40762 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55387","27.131314","172.30.1.104","172.30.1.205","TCP","54","49671 > 40766 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55388","27.131335","172.30.1.104","172.30.1.205","TCP","54","49671 > 40766 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55389","27.131339","172.30.1.205","172.30.1.104","TCP","54","40766 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55390","27.131355","172.30.1.104","172.30.1.205","TCP","54","49671 > 40762 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55391","27.131358","172.30.1.205","172.30.1.104","TCP","54","40762 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55392","27.131383","172.30.1.104","172.30.1.205","TCP","54","49671 > 40754 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55393","27.131392","172.30.1.205","172.30.1.104","TCP","54","40754 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55394","27.131414","172.30.1.104","172.30.1.205","TCP","54","49671 > 40758 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55395","27.131417","172.30.1.205","172.30.1.104","TCP","54","40758 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55396","27.131533","172.30.1.104","172.30.1.205","TCP","54","49671 > 40770 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55397","27.131553","172.30.1.104","172.30.1.205","TCP","54","49671 > 40726 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55398","27.131573","172.30.1.104","172.30.1.205","TCP","54","49671 > 40770 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55399","27.131577","172.30.1.205","172.30.1.104","TCP","54","40770 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55400","27.131594","172.30.1.104","172.30.1.205","TCP","54","49671 > 40726 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55401","27.131597","172.30.1.205","172.30.1.104","TCP","54","40726 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55402","27.132425","172.30.1.205","172.30.1.104","TCP","54","48136 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55403","27.132534","172.30.1.205","172.30.1.104","TCP","74","40774 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930358 TSecr=0 WS=128" "55404","27.132664","172.30.1.104","172.30.1.205","TCP","54","135 > 48136 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55405","27.132685","172.30.1.104","172.30.1.205","TCP","54","135 > 48136 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55406","27.132690","172.30.1.205","172.30.1.104","TCP","54","48136 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55407","27.132835","172.30.1.104","172.30.1.205","TCP","66","49671 > 40774 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55408","27.132844","172.30.1.205","172.30.1.104","TCP","54","40774 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55409","27.133207","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55410","27.133473","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55411","27.133482","172.30.1.205","172.30.1.104","TCP","54","40774 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55412","27.135351","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55413","27.135705","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55414","27.135711","172.30.1.205","172.30.1.104","TCP","54","40774 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55415","27.137102","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55416","27.141041","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55417","27.141054","172.30.1.205","172.30.1.104","TCP","54","40774 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55418","27.142065","172.30.1.205","172.30.1.104","TCP","74","48140 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930368 TSecr=0 WS=128" "55419","27.142345","172.30.1.104","172.30.1.205","TCP","66","135 > 48140 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55420","27.142355","172.30.1.205","172.30.1.104","TCP","54","48140 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55421","27.142714","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55422","27.143009","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55423","27.143023","172.30.1.205","172.30.1.104","TCP","54","48140 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55424","27.145315","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55425","27.145721","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55426","27.145727","172.30.1.205","172.30.1.104","TCP","54","48140 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55427","27.147538","172.30.1.205","172.30.1.104","TCP","54","48140 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55428","27.147656","172.30.1.205","172.30.1.104","TCP","74","40778 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930374 TSecr=0 WS=128" "55429","27.147823","172.30.1.104","172.30.1.205","TCP","54","135 > 48140 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55430","27.147871","172.30.1.104","172.30.1.205","TCP","54","135 > 48140 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55431","27.147876","172.30.1.205","172.30.1.104","TCP","54","48140 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55432","27.147916","172.30.1.104","172.30.1.205","TCP","66","49671 > 40778 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55433","27.147924","172.30.1.205","172.30.1.104","TCP","54","40778 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55434","27.148271","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55435","27.149311","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55436","27.149323","172.30.1.205","172.30.1.104","TCP","54","40778 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55437","27.151223","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55438","27.151587","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55439","27.151594","172.30.1.205","172.30.1.104","TCP","54","40778 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55440","27.152966","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55441","27.156908","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55442","27.156917","172.30.1.205","172.30.1.104","TCP","54","40778 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55443","27.157854","172.30.1.205","172.30.1.104","TCP","74","48144 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930384 TSecr=0 WS=128" "55444","27.158159","172.30.1.104","172.30.1.205","TCP","66","135 > 48144 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55445","27.158170","172.30.1.205","172.30.1.104","TCP","54","48144 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55446","27.158526","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55447","27.158811","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55448","27.158820","172.30.1.205","172.30.1.104","TCP","54","48144 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55449","27.161019","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55450","27.161438","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55451","27.161445","172.30.1.205","172.30.1.104","TCP","54","48144 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55452","27.163242","172.30.1.205","172.30.1.104","TCP","54","48144 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55453","27.163351","172.30.1.205","172.30.1.104","TCP","74","40782 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930389 TSecr=0 WS=128" "55454","27.163526","172.30.1.104","172.30.1.205","TCP","54","135 > 48144 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55455","27.163585","172.30.1.104","172.30.1.205","TCP","54","135 > 48144 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55456","27.163590","172.30.1.205","172.30.1.104","TCP","54","48144 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55457","27.163626","172.30.1.104","172.30.1.205","TCP","66","49671 > 40782 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55458","27.163634","172.30.1.205","172.30.1.104","TCP","54","40782 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55459","27.163988","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55460","27.164301","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55461","27.164309","172.30.1.205","172.30.1.104","TCP","54","40782 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55462","27.166218","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55463","27.166629","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55464","27.166635","172.30.1.205","172.30.1.104","TCP","54","40782 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55465","27.167970","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55466","27.172030","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55467","27.172041","172.30.1.205","172.30.1.104","TCP","54","40782 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55468","27.173004","172.30.1.205","172.30.1.104","TCP","74","48148 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930399 TSecr=0 WS=128" "55469","27.173298","172.30.1.104","172.30.1.205","TCP","66","135 > 48148 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55470","27.173310","172.30.1.205","172.30.1.104","TCP","54","48148 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55471","27.173664","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55472","27.173947","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55473","27.173956","172.30.1.205","172.30.1.104","TCP","54","48148 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55474","27.176143","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55475","27.176528","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55476","27.176534","172.30.1.205","172.30.1.104","TCP","54","48148 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55477","27.178356","172.30.1.205","172.30.1.104","TCP","54","48148 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55478","27.178475","172.30.1.205","172.30.1.104","TCP","74","40786 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930404 TSecr=0 WS=128" "55479","27.178637","172.30.1.104","172.30.1.205","TCP","54","135 > 48148 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55480","27.178673","172.30.1.104","172.30.1.205","TCP","54","135 > 48148 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55481","27.178679","172.30.1.205","172.30.1.104","TCP","54","48148 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55482","27.178767","172.30.1.104","172.30.1.205","TCP","66","49671 > 40786 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55483","27.178775","172.30.1.205","172.30.1.104","TCP","54","40786 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55484","27.179121","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55485","27.179414","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55486","27.179423","172.30.1.205","172.30.1.104","TCP","54","40786 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55487","27.181340","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55488","27.181718","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55489","27.181724","172.30.1.205","172.30.1.104","TCP","54","40786 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55490","27.183071","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55491","27.187166","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55492","27.187177","172.30.1.205","172.30.1.104","TCP","54","40786 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55493","27.188155","172.30.1.205","172.30.1.104","TCP","74","48152 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930414 TSecr=0 WS=128" "55494","27.188468","172.30.1.104","172.30.1.205","TCP","66","135 > 48152 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55495","27.188478","172.30.1.205","172.30.1.104","TCP","54","48152 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55496","27.188849","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55497","27.189137","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55498","27.189146","172.30.1.205","172.30.1.104","TCP","54","48152 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55499","27.191332","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55500","27.191743","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55501","27.191749","172.30.1.205","172.30.1.104","TCP","54","48152 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55502","27.193583","172.30.1.205","172.30.1.104","TCP","54","48152 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55503","27.193698","172.30.1.205","172.30.1.104","TCP","74","40790 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930420 TSecr=0 WS=128" "55504","27.193867","172.30.1.104","172.30.1.205","TCP","54","135 > 48152 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55505","27.193923","172.30.1.104","172.30.1.205","TCP","54","135 > 48152 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55506","27.193930","172.30.1.205","172.30.1.104","TCP","54","48152 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55507","27.194000","172.30.1.104","172.30.1.205","TCP","66","49671 > 40790 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55508","27.194008","172.30.1.205","172.30.1.104","TCP","54","40790 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55509","27.194351","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55510","27.194638","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55511","27.194648","172.30.1.205","172.30.1.104","TCP","54","40790 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55512","27.196533","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55513","27.196890","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55514","27.196896","172.30.1.205","172.30.1.104","TCP","54","40790 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55515","27.198258","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55516","27.202323","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55517","27.202332","172.30.1.205","172.30.1.104","TCP","54","40790 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55518","27.203292","172.30.1.205","172.30.1.104","TCP","74","48156 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930429 TSecr=0 WS=128" "55519","27.203582","172.30.1.104","172.30.1.205","TCP","66","135 > 48156 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55520","27.203593","172.30.1.205","172.30.1.104","TCP","54","48156 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55521","27.203944","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55522","27.204244","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55523","27.204252","172.30.1.205","172.30.1.104","TCP","54","48156 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55524","27.206469","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55525","27.206890","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55526","27.206903","172.30.1.205","172.30.1.104","TCP","54","48156 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55527","27.208857","172.30.1.205","172.30.1.104","TCP","54","48156 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55528","27.208967","172.30.1.205","172.30.1.104","TCP","74","40794 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930435 TSecr=0 WS=128" "55529","27.209140","172.30.1.104","172.30.1.205","TCP","54","135 > 48156 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55530","27.209176","172.30.1.104","172.30.1.205","TCP","54","135 > 48156 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55531","27.209183","172.30.1.205","172.30.1.104","TCP","54","48156 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55532","27.209279","172.30.1.104","172.30.1.205","TCP","66","49671 > 40794 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55533","27.209295","172.30.1.205","172.30.1.104","TCP","54","40794 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55534","27.209715","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55535","27.210043","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55536","27.210053","172.30.1.205","172.30.1.104","TCP","54","40794 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55537","27.211962","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55538","27.213535","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55539","27.213550","172.30.1.205","172.30.1.104","TCP","54","40794 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55540","27.215109","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55541","27.219283","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55542","27.219295","172.30.1.205","172.30.1.104","TCP","54","40794 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55543","27.220267","172.30.1.205","172.30.1.104","TCP","74","48160 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930446 TSecr=0 WS=128" "55544","27.220576","172.30.1.104","172.30.1.205","TCP","66","135 > 48160 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55545","27.220587","172.30.1.205","172.30.1.104","TCP","54","48160 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55546","27.220969","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55547","27.222966","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55548","27.222977","172.30.1.205","172.30.1.104","TCP","54","48160 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55549","27.225224","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55550","27.225638","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55551","27.225645","172.30.1.205","172.30.1.104","TCP","54","48160 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55552","27.227492","172.30.1.205","172.30.1.104","TCP","54","48160 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55553","27.227605","172.30.1.205","172.30.1.104","TCP","74","40798 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930454 TSecr=0 WS=128" "55554","27.227758","172.30.1.104","172.30.1.205","TCP","54","135 > 48160 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55555","27.227784","172.30.1.104","172.30.1.205","TCP","54","135 > 48160 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55556","27.227790","172.30.1.205","172.30.1.104","TCP","54","48160 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55557","27.227901","172.30.1.104","172.30.1.205","TCP","66","49671 > 40798 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55558","27.227909","172.30.1.205","172.30.1.104","TCP","54","40798 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55559","27.228256","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55560","27.228536","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55561","27.228545","172.30.1.205","172.30.1.104","TCP","54","40798 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55562","27.230438","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55563","27.230791","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55564","27.230798","172.30.1.205","172.30.1.104","TCP","54","40798 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55565","27.232175","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55566","27.236193","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55567","27.236204","172.30.1.205","172.30.1.104","TCP","54","40798 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55568","27.237186","172.30.1.205","172.30.1.104","TCP","74","48164 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930463 TSecr=0 WS=128" "55569","27.237480","172.30.1.104","172.30.1.205","TCP","66","135 > 48164 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55570","27.237491","172.30.1.205","172.30.1.104","TCP","54","48164 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55571","27.237844","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55572","27.238129","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55573","27.238139","172.30.1.205","172.30.1.104","TCP","54","48164 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55574","27.240360","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55575","27.240783","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55576","27.240790","172.30.1.205","172.30.1.104","TCP","54","48164 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55577","27.242617","172.30.1.205","172.30.1.104","TCP","54","48164 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55578","27.242730","172.30.1.205","172.30.1.104","TCP","74","40802 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930469 TSecr=0 WS=128" "55579","27.242931","172.30.1.104","172.30.1.205","TCP","54","135 > 48164 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55580","27.242940","172.30.1.104","172.30.1.205","TCP","54","135 > 48164 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55581","27.242945","172.30.1.205","172.30.1.104","TCP","54","48164 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55582","27.243039","172.30.1.104","172.30.1.205","TCP","66","49671 > 40802 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55583","27.243048","172.30.1.205","172.30.1.104","TCP","54","40802 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55584","27.243395","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55585","27.243702","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55586","27.243711","172.30.1.205","172.30.1.104","TCP","54","40802 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55587","27.245646","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55588","27.246018","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55589","27.246024","172.30.1.205","172.30.1.104","TCP","54","40802 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55590","27.247406","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55591","27.251473","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55592","27.251484","172.30.1.205","172.30.1.104","TCP","54","40802 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55593","27.252455","172.30.1.205","172.30.1.104","TCP","74","48168 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930478 TSecr=0 WS=128" "55594","27.252754","172.30.1.104","172.30.1.205","TCP","66","135 > 48168 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55595","27.252765","172.30.1.205","172.30.1.104","TCP","54","48168 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55596","27.253131","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55597","27.253431","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55598","27.253440","172.30.1.205","172.30.1.104","TCP","54","48168 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55599","27.255651","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55600","27.256094","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55601","27.256107","172.30.1.205","172.30.1.104","TCP","54","48168 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55602","27.258136","172.30.1.205","172.30.1.104","TCP","54","48168 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55603","27.258247","172.30.1.205","172.30.1.104","TCP","74","40806 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930484 TSecr=0 WS=128" "55604","27.258408","172.30.1.104","172.30.1.205","TCP","54","135 > 48168 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55605","27.258486","172.30.1.104","172.30.1.205","TCP","54","135 > 48168 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55606","27.258491","172.30.1.205","172.30.1.104","TCP","54","48168 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55607","27.258526","172.30.1.104","172.30.1.205","TCP","66","49671 > 40806 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55608","27.258534","172.30.1.205","172.30.1.104","TCP","54","40806 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55609","27.258882","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55610","27.261197","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55611","27.261206","172.30.1.205","172.30.1.104","TCP","54","40806 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55612","27.263104","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55613","27.263480","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55614","27.263486","172.30.1.205","172.30.1.104","TCP","54","40806 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55615","27.264871","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55616","27.268898","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55617","27.268908","172.30.1.205","172.30.1.104","TCP","54","40806 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55618","27.269872","172.30.1.205","172.30.1.104","TCP","74","48172 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930496 TSecr=0 WS=128" "55619","27.270191","172.30.1.104","172.30.1.205","TCP","66","135 > 48172 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55620","27.270202","172.30.1.205","172.30.1.104","TCP","54","48172 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55621","27.270559","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55622","27.270868","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55623","27.270877","172.30.1.205","172.30.1.104","TCP","54","48172 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55624","27.273110","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55625","27.273520","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55626","27.273527","172.30.1.205","172.30.1.104","TCP","54","48172 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55627","27.275382","172.30.1.205","172.30.1.104","TCP","54","48172 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55628","27.275494","172.30.1.205","172.30.1.104","TCP","74","40810 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930501 TSecr=0 WS=128" "55629","27.275665","172.30.1.104","172.30.1.205","TCP","54","135 > 48172 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55630","27.275697","172.30.1.104","172.30.1.205","TCP","54","135 > 48172 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55631","27.275703","172.30.1.205","172.30.1.104","TCP","54","48172 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55632","27.275780","172.30.1.104","172.30.1.205","TCP","66","49671 > 40810 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55633","27.275788","172.30.1.205","172.30.1.104","TCP","54","40810 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55634","27.276136","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55635","27.276450","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55636","27.276459","172.30.1.205","172.30.1.104","TCP","54","40810 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55637","27.278385","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55638","27.278777","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55639","27.278784","172.30.1.205","172.30.1.104","TCP","54","40810 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55640","27.280154","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55641","27.284147","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55642","27.284159","172.30.1.205","172.30.1.104","TCP","54","40810 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55643","27.285216","172.30.1.205","172.30.1.104","TCP","74","48176 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930511 TSecr=0 WS=128" "55644","27.285521","172.30.1.104","172.30.1.205","TCP","66","135 > 48176 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55645","27.285534","172.30.1.205","172.30.1.104","TCP","54","48176 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55646","27.285896","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55647","27.286180","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55648","27.286190","172.30.1.205","172.30.1.104","TCP","54","48176 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55649","27.288433","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55650","27.288844","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55651","27.288851","172.30.1.205","172.30.1.104","TCP","54","48176 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55652","27.290689","172.30.1.205","172.30.1.104","TCP","54","48176 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55653","27.290805","172.30.1.205","172.30.1.104","TCP","74","40814 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930517 TSecr=0 WS=128" "55654","27.291011","172.30.1.104","172.30.1.205","TCP","54","135 > 48176 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55655","27.291071","172.30.1.104","172.30.1.205","TCP","66","49671 > 40814 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55656","27.291081","172.30.1.205","172.30.1.104","TCP","54","40814 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55657","27.291099","172.30.1.104","172.30.1.205","TCP","54","135 > 48176 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55658","27.291111","172.30.1.205","172.30.1.104","TCP","54","48176 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55659","27.291472","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55660","27.291781","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55661","27.291791","172.30.1.205","172.30.1.104","TCP","54","40814 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55662","27.293706","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55663","27.294134","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55664","27.294141","172.30.1.205","172.30.1.104","TCP","54","40814 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55665","27.295497","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55666","27.300168","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55667","27.300181","172.30.1.205","172.30.1.104","TCP","54","40814 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55668","27.301197","172.30.1.205","172.30.1.104","TCP","74","48180 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930527 TSecr=0 WS=128" "55669","27.301489","172.30.1.104","172.30.1.205","TCP","66","135 > 48180 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55670","27.301500","172.30.1.205","172.30.1.104","TCP","54","48180 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55671","27.301864","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55672","27.302172","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55673","27.302181","172.30.1.205","172.30.1.104","TCP","54","48180 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55674","27.304376","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55675","27.304807","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55676","27.304813","172.30.1.205","172.30.1.104","TCP","54","48180 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55677","27.306669","172.30.1.205","172.30.1.104","TCP","54","48180 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55678","27.306796","172.30.1.205","172.30.1.104","TCP","74","40818 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930533 TSecr=0 WS=128" "55679","27.307003","172.30.1.104","172.30.1.205","TCP","54","135 > 48180 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55680","27.307011","172.30.1.104","172.30.1.205","TCP","54","135 > 48180 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55681","27.307016","172.30.1.205","172.30.1.104","TCP","54","48180 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55682","27.307094","172.30.1.104","172.30.1.205","TCP","66","49671 > 40818 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55683","27.307102","172.30.1.205","172.30.1.104","TCP","54","40818 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55684","27.307449","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55685","27.307775","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55686","27.307784","172.30.1.205","172.30.1.104","TCP","54","40818 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55687","27.309707","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55688","27.310171","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55689","27.310177","172.30.1.205","172.30.1.104","TCP","54","40818 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55690","27.311522","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55691","27.315539","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55692","27.315550","172.30.1.205","172.30.1.104","TCP","54","40818 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55693","27.316532","172.30.1.205","172.30.1.104","TCP","74","48184 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930542 TSecr=0 WS=128" "55694","27.316836","172.30.1.104","172.30.1.205","TCP","66","135 > 48184 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55695","27.316848","172.30.1.205","172.30.1.104","TCP","54","48184 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55696","27.317224","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55697","27.317559","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55698","27.317568","172.30.1.205","172.30.1.104","TCP","54","48184 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55699","27.319751","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55700","27.320155","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55701","27.320162","172.30.1.205","172.30.1.104","TCP","54","48184 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55702","27.321028","172.30.1.205","172.30.1.104","TCP","54","40778 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55703","27.321083","172.30.1.205","172.30.1.104","TCP","54","40782 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55704","27.321120","172.30.1.205","172.30.1.104","TCP","54","40786 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55705","27.321155","172.30.1.205","172.30.1.104","TCP","54","40790 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55706","27.321187","172.30.1.205","172.30.1.104","TCP","54","40794 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55707","27.321216","172.30.1.205","172.30.1.104","TCP","54","40798 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55708","27.321243","172.30.1.205","172.30.1.104","TCP","54","40802 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55709","27.321270","172.30.1.205","172.30.1.104","TCP","54","40806 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55710","27.321298","172.30.1.205","172.30.1.104","TCP","54","40810 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55711","27.321326","172.30.1.205","172.30.1.104","TCP","54","40814 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55712","27.321353","172.30.1.205","172.30.1.104","TCP","54","40818 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55713","27.321424","172.30.1.205","172.30.1.104","TCP","54","40774 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "55714","27.321610","172.30.1.104","172.30.1.205","TCP","54","49671 > 40778 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55715","27.321619","172.30.1.104","172.30.1.205","TCP","54","49671 > 40782 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55716","27.321622","172.30.1.104","172.30.1.205","TCP","54","49671 > 40786 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55717","27.321785","172.30.1.104","172.30.1.205","TCP","54","49671 > 40778 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55718","27.321793","172.30.1.205","172.30.1.104","TCP","54","40778 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55719","27.321799","172.30.1.104","172.30.1.205","TCP","54","49671 > 40790 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55720","27.321805","172.30.1.104","172.30.1.205","TCP","54","49671 > 40794 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55721","27.321808","172.30.1.104","172.30.1.205","TCP","54","49671 > 40794 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55722","27.321810","172.30.1.205","172.30.1.104","TCP","54","40794 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55723","27.321811","172.30.1.104","172.30.1.205","TCP","54","49671 > 40798 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55724","27.321814","172.30.1.104","172.30.1.205","TCP","54","49671 > 40802 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55725","27.321817","172.30.1.104","172.30.1.205","TCP","54","49671 > 40790 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55726","27.321819","172.30.1.205","172.30.1.104","TCP","54","40790 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55727","27.322118","172.30.1.104","172.30.1.205","TCP","54","49671 > 40806 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55728","27.322124","172.30.1.104","172.30.1.205","TCP","54","49671 > 40802 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55729","27.322128","172.30.1.205","172.30.1.104","TCP","54","40802 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55730","27.322135","172.30.1.104","172.30.1.205","TCP","54","49671 > 40810 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55731","27.322138","172.30.1.104","172.30.1.205","TCP","54","49671 > 40798 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55732","27.322140","172.30.1.205","172.30.1.104","TCP","54","40798 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55733","27.322142","172.30.1.104","172.30.1.205","TCP","54","49671 > 40814 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55734","27.322148","172.30.1.104","172.30.1.205","TCP","54","49671 > 40814 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55735","27.322150","172.30.1.205","172.30.1.104","TCP","54","40814 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55736","27.322159","172.30.1.104","172.30.1.205","TCP","54","49671 > 40810 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55737","27.322160","172.30.1.205","172.30.1.104","TCP","54","40810 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55738","27.322162","172.30.1.104","172.30.1.205","TCP","54","49671 > 40806 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55739","27.322163","172.30.1.205","172.30.1.104","TCP","54","40806 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55740","27.322165","172.30.1.104","172.30.1.205","TCP","54","49671 > 40782 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55741","27.322166","172.30.1.205","172.30.1.104","TCP","54","40782 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55742","27.322168","172.30.1.104","172.30.1.205","TCP","54","49671 > 40786 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55743","27.322169","172.30.1.205","172.30.1.104","TCP","54","40786 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55744","27.322440","172.30.1.104","172.30.1.205","TCP","54","49671 > 40818 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55745","27.322452","172.30.1.104","172.30.1.205","TCP","54","49671 > 40774 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55746","27.322458","172.30.1.104","172.30.1.205","TCP","54","49671 > 40818 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55747","27.322462","172.30.1.205","172.30.1.104","TCP","54","40818 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55748","27.322469","172.30.1.104","172.30.1.205","TCP","54","49671 > 40774 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "55749","27.322471","172.30.1.205","172.30.1.104","TCP","54","40774 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "55750","27.322904","172.30.1.205","172.30.1.104","TCP","54","48184 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55751","27.323016","172.30.1.205","172.30.1.104","TCP","74","40822 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930549 TSecr=0 WS=128" "55752","27.323336","172.30.1.104","172.30.1.205","TCP","54","135 > 48184 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55753","27.323344","172.30.1.104","172.30.1.205","TCP","54","135 > 48184 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55754","27.323348","172.30.1.205","172.30.1.104","TCP","54","48184 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55755","27.323354","172.30.1.104","172.30.1.205","TCP","66","49671 > 40822 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55756","27.323361","172.30.1.205","172.30.1.104","TCP","54","40822 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55757","27.323731","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55758","27.324029","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55759","27.324037","172.30.1.205","172.30.1.104","TCP","54","40822 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55760","27.325952","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55761","27.326322","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55762","27.326328","172.30.1.205","172.30.1.104","TCP","54","40822 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55763","27.327681","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55764","27.331569","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55765","27.331579","172.30.1.205","172.30.1.104","TCP","54","40822 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55766","27.332539","172.30.1.205","172.30.1.104","TCP","74","48188 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930558 TSecr=0 WS=128" "55767","27.332851","172.30.1.104","172.30.1.205","TCP","66","135 > 48188 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55768","27.332862","172.30.1.205","172.30.1.104","TCP","54","48188 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55769","27.333222","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55770","27.333537","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55771","27.333546","172.30.1.205","172.30.1.104","TCP","54","48188 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55772","27.335721","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55773","27.336136","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55774","27.336143","172.30.1.205","172.30.1.104","TCP","54","48188 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55775","27.337987","172.30.1.205","172.30.1.104","TCP","54","48188 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55776","27.338100","172.30.1.205","172.30.1.104","TCP","74","40826 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930564 TSecr=0 WS=128" "55777","27.338283","172.30.1.104","172.30.1.205","TCP","54","135 > 48188 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55778","27.338307","172.30.1.104","172.30.1.205","TCP","54","135 > 48188 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55779","27.338313","172.30.1.205","172.30.1.104","TCP","54","48188 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55780","27.338394","172.30.1.104","172.30.1.205","TCP","66","49671 > 40826 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55781","27.338402","172.30.1.205","172.30.1.104","TCP","54","40826 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55782","27.338749","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55783","27.339039","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55784","27.339048","172.30.1.205","172.30.1.104","TCP","54","40826 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55785","27.340960","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55786","27.341324","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55787","27.341330","172.30.1.205","172.30.1.104","TCP","54","40826 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55788","27.342683","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55789","27.346629","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55790","27.346640","172.30.1.205","172.30.1.104","TCP","54","40826 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55791","27.347612","172.30.1.205","172.30.1.104","TCP","74","48192 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930574 TSecr=0 WS=128" "55792","27.347922","172.30.1.104","172.30.1.205","TCP","66","135 > 48192 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55793","27.347932","172.30.1.205","172.30.1.104","TCP","54","48192 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55794","27.348287","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55795","27.348569","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55796","27.348578","172.30.1.205","172.30.1.104","TCP","54","48192 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55797","27.350820","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55798","27.351215","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55799","27.351223","172.30.1.205","172.30.1.104","TCP","54","48192 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55800","27.353094","172.30.1.205","172.30.1.104","TCP","54","48192 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55801","27.353210","172.30.1.205","172.30.1.104","TCP","74","40830 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930579 TSecr=0 WS=128" "55802","27.353361","172.30.1.104","172.30.1.205","TCP","54","135 > 48192 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55803","27.353408","172.30.1.104","172.30.1.205","TCP","54","135 > 48192 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55804","27.353414","172.30.1.205","172.30.1.104","TCP","54","48192 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55805","27.353488","172.30.1.104","172.30.1.205","TCP","66","49671 > 40830 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55806","27.353496","172.30.1.205","172.30.1.104","TCP","54","40830 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55807","27.353844","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55808","27.354114","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55809","27.354123","172.30.1.205","172.30.1.104","TCP","54","40830 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55810","27.356013","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55811","27.356412","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55812","27.356418","172.30.1.205","172.30.1.104","TCP","54","40830 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55813","27.357800","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55814","27.361772","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55815","27.361783","172.30.1.205","172.30.1.104","TCP","54","40830 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55816","27.362756","172.30.1.205","172.30.1.104","TCP","74","48196 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930589 TSecr=0 WS=128" "55817","27.363071","172.30.1.104","172.30.1.205","TCP","66","135 > 48196 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55818","27.363082","172.30.1.205","172.30.1.104","TCP","54","48196 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55819","27.363433","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55820","27.363699","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55821","27.363708","172.30.1.205","172.30.1.104","TCP","54","48196 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55822","27.365936","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55823","27.366307","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55824","27.366313","172.30.1.205","172.30.1.104","TCP","54","48196 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55825","27.368132","172.30.1.205","172.30.1.104","TCP","54","48196 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55826","27.368248","172.30.1.205","172.30.1.104","TCP","74","40834 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930594 TSecr=0 WS=128" "55827","27.368400","172.30.1.104","172.30.1.205","TCP","54","135 > 48196 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55828","27.368448","172.30.1.104","172.30.1.205","TCP","54","135 > 48196 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55829","27.368454","172.30.1.205","172.30.1.104","TCP","54","48196 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55830","27.368528","172.30.1.104","172.30.1.205","TCP","66","49671 > 40834 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55831","27.368536","172.30.1.205","172.30.1.104","TCP","54","40834 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55832","27.368908","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55833","27.369198","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55834","27.369207","172.30.1.205","172.30.1.104","TCP","54","40834 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55835","27.371098","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55836","27.371506","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55837","27.371512","172.30.1.205","172.30.1.104","TCP","54","40834 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55838","27.372921","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55839","27.376900","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55840","27.376911","172.30.1.205","172.30.1.104","TCP","54","40834 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55841","27.377879","172.30.1.205","172.30.1.104","TCP","74","48200 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930604 TSecr=0 WS=128" "55842","27.378190","172.30.1.104","172.30.1.205","TCP","66","135 > 48200 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55843","27.378201","172.30.1.205","172.30.1.104","TCP","54","48200 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55844","27.378561","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55845","27.378854","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55846","27.378863","172.30.1.205","172.30.1.104","TCP","54","48200 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55847","27.381072","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55848","27.381472","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55849","27.381479","172.30.1.205","172.30.1.104","TCP","54","48200 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55850","27.383295","172.30.1.205","172.30.1.104","TCP","54","48200 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55851","27.383407","172.30.1.205","172.30.1.104","TCP","74","40838 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930609 TSecr=0 WS=128" "55852","27.383587","172.30.1.104","172.30.1.205","TCP","54","135 > 48200 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55853","27.383610","172.30.1.104","172.30.1.205","TCP","54","135 > 48200 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55854","27.383616","172.30.1.205","172.30.1.104","TCP","54","48200 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55855","27.383689","172.30.1.104","172.30.1.205","TCP","66","49671 > 40838 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55856","27.383697","172.30.1.205","172.30.1.104","TCP","54","40838 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55857","27.384044","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55858","27.384323","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55859","27.384332","172.30.1.205","172.30.1.104","TCP","54","40838 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55860","27.386242","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55861","27.386635","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55862","27.386642","172.30.1.205","172.30.1.104","TCP","54","40838 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55863","27.387992","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55864","27.392408","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55865","27.392419","172.30.1.205","172.30.1.104","TCP","54","40838 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55866","27.393403","172.30.1.205","172.30.1.104","TCP","74","48204 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930619 TSecr=0 WS=128" "55867","27.393746","172.30.1.104","172.30.1.205","TCP","66","135 > 48204 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55868","27.393758","172.30.1.205","172.30.1.104","TCP","54","48204 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55869","27.394111","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55870","27.394403","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55871","27.394413","172.30.1.205","172.30.1.104","TCP","54","48204 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55872","27.396596","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55873","27.396967","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55874","27.396974","172.30.1.205","172.30.1.104","TCP","54","48204 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55875","27.398795","172.30.1.205","172.30.1.104","TCP","54","48204 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55876","27.398908","172.30.1.205","172.30.1.104","TCP","74","40842 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930625 TSecr=0 WS=128" "55877","27.399055","172.30.1.104","172.30.1.205","TCP","54","135 > 48204 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55878","27.399100","172.30.1.104","172.30.1.205","TCP","54","135 > 48204 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55879","27.399105","172.30.1.205","172.30.1.104","TCP","54","48204 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55880","27.399172","172.30.1.104","172.30.1.205","TCP","66","49671 > 40842 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55881","27.399189","172.30.1.205","172.30.1.104","TCP","54","40842 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55882","27.399539","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55883","27.399825","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55884","27.399834","172.30.1.205","172.30.1.104","TCP","54","40842 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55885","27.401756","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55886","27.402079","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55887","27.402085","172.30.1.205","172.30.1.104","TCP","54","40842 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55888","27.403526","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55889","27.407478","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55890","27.407488","172.30.1.205","172.30.1.104","TCP","54","40842 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55891","27.408491","172.30.1.205","172.30.1.104","TCP","74","48208 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930634 TSecr=0 WS=128" "55892","27.408793","172.30.1.104","172.30.1.205","TCP","66","135 > 48208 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55893","27.408806","172.30.1.205","172.30.1.104","TCP","54","48208 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55894","27.409176","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55895","27.409452","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55896","27.409461","172.30.1.205","172.30.1.104","TCP","54","48208 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55897","27.411650","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55898","27.412015","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55899","27.412022","172.30.1.205","172.30.1.104","TCP","54","48208 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55900","27.413850","172.30.1.205","172.30.1.104","TCP","54","48208 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55901","27.413964","172.30.1.205","172.30.1.104","TCP","74","40846 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930640 TSecr=0 WS=128" "55902","27.414117","172.30.1.104","172.30.1.205","TCP","54","135 > 48208 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55903","27.414132","172.30.1.104","172.30.1.205","TCP","54","135 > 48208 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55904","27.414138","172.30.1.205","172.30.1.104","TCP","54","48208 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55905","27.414214","172.30.1.104","172.30.1.205","TCP","66","49671 > 40846 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55906","27.414223","172.30.1.205","172.30.1.104","TCP","54","40846 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55907","27.414575","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55908","27.414846","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55909","27.414855","172.30.1.205","172.30.1.104","TCP","54","40846 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55910","27.416745","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55911","27.417142","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55912","27.417149","172.30.1.205","172.30.1.104","TCP","54","40846 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55913","27.418514","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55914","27.422448","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55915","27.422458","172.30.1.205","172.30.1.104","TCP","54","40846 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55916","27.423412","172.30.1.205","172.30.1.104","TCP","74","48212 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930649 TSecr=0 WS=128" "55917","27.423718","172.30.1.104","172.30.1.205","TCP","66","135 > 48212 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55918","27.423729","172.30.1.205","172.30.1.104","TCP","54","48212 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55919","27.424078","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55920","27.424367","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55921","27.424375","172.30.1.205","172.30.1.104","TCP","54","48212 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55922","27.426593","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55923","27.426990","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55924","27.426997","172.30.1.205","172.30.1.104","TCP","54","48212 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55925","27.428814","172.30.1.205","172.30.1.104","TCP","54","48212 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55926","27.428922","172.30.1.205","172.30.1.104","TCP","74","40850 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930655 TSecr=0 WS=128" "55927","27.429148","172.30.1.104","172.30.1.205","TCP","54","135 > 48212 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55928","27.429178","172.30.1.104","172.30.1.205","TCP","54","135 > 48212 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55929","27.429182","172.30.1.205","172.30.1.104","TCP","54","48212 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55930","27.429208","172.30.1.104","172.30.1.205","TCP","66","49671 > 40850 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55931","27.429217","172.30.1.205","172.30.1.104","TCP","54","40850 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55932","27.429559","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55933","27.429851","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55934","27.429860","172.30.1.205","172.30.1.104","TCP","54","40850 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55935","27.431714","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55936","27.432096","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55937","27.432103","172.30.1.205","172.30.1.104","TCP","54","40850 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55938","27.433492","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55939","27.437467","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55940","27.437476","172.30.1.205","172.30.1.104","TCP","54","40850 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55941","27.438430","172.30.1.205","172.30.1.104","TCP","74","48216 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930664 TSecr=0 WS=128" "55942","27.438737","172.30.1.104","172.30.1.205","TCP","66","135 > 48216 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55943","27.438748","172.30.1.205","172.30.1.104","TCP","54","48216 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55944","27.439093","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55945","27.439389","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55946","27.439398","172.30.1.205","172.30.1.104","TCP","54","48216 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55947","27.441610","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55948","27.441995","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55949","27.442002","172.30.1.205","172.30.1.104","TCP","54","48216 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55950","27.443801","172.30.1.205","172.30.1.104","TCP","54","48216 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55951","27.443911","172.30.1.205","172.30.1.104","TCP","74","40854 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930670 TSecr=0 WS=128" "55952","27.444065","172.30.1.104","172.30.1.205","TCP","54","135 > 48216 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55953","27.444137","172.30.1.104","172.30.1.205","TCP","54","135 > 48216 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55954","27.444143","172.30.1.205","172.30.1.104","TCP","54","48216 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55955","27.444181","172.30.1.104","172.30.1.205","TCP","66","49671 > 40854 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55956","27.444189","172.30.1.205","172.30.1.104","TCP","54","40854 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55957","27.444549","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55958","27.444857","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55959","27.444867","172.30.1.205","172.30.1.104","TCP","54","40854 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55960","27.446741","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55961","27.447080","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55962","27.447087","172.30.1.205","172.30.1.104","TCP","54","40854 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55963","27.448452","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55964","27.452563","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55965","27.452581","172.30.1.205","172.30.1.104","TCP","54","40854 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55966","27.453562","172.30.1.205","172.30.1.104","TCP","74","48220 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930679 TSecr=0 WS=128" "55967","27.453877","172.30.1.104","172.30.1.205","TCP","66","135 > 48220 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55968","27.453888","172.30.1.205","172.30.1.104","TCP","54","48220 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55969","27.454244","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55970","27.454548","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55971","27.454557","172.30.1.205","172.30.1.104","TCP","54","48220 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55972","27.456731","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55973","27.457097","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55974","27.457103","172.30.1.205","172.30.1.104","TCP","54","48220 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "55975","27.458916","172.30.1.205","172.30.1.104","TCP","54","48220 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "55976","27.459027","172.30.1.205","172.30.1.104","TCP","74","40858 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930685 TSecr=0 WS=128" "55977","27.459174","172.30.1.104","172.30.1.205","TCP","54","135 > 48220 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55978","27.459185","172.30.1.104","172.30.1.205","TCP","54","135 > 48220 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "55979","27.459190","172.30.1.205","172.30.1.104","TCP","54","48220 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "55980","27.459292","172.30.1.104","172.30.1.205","TCP","66","49671 > 40858 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55981","27.459300","172.30.1.205","172.30.1.104","TCP","54","40858 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55982","27.459646","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "55983","27.459913","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55984","27.459921","172.30.1.205","172.30.1.104","TCP","54","40858 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55985","27.461831","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "55986","27.462181","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "55987","27.462187","172.30.1.205","172.30.1.104","TCP","54","40858 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "55988","27.463530","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "55989","27.467475","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "55990","27.467484","172.30.1.205","172.30.1.104","TCP","54","40858 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "55991","27.468428","172.30.1.205","172.30.1.104","TCP","74","48224 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930694 TSecr=0 WS=128" "55992","27.468772","172.30.1.104","172.30.1.205","TCP","66","135 > 48224 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "55993","27.468792","172.30.1.205","172.30.1.104","TCP","54","48224 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "55994","27.469172","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "55995","27.469471","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "55996","27.469480","172.30.1.205","172.30.1.104","TCP","54","48224 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "55997","27.471700","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "55998","27.472070","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "55999","27.472077","172.30.1.205","172.30.1.104","TCP","54","48224 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56000","27.473905","172.30.1.205","172.30.1.104","TCP","54","48224 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56001","27.474018","172.30.1.205","172.30.1.104","TCP","74","40862 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930700 TSecr=0 WS=128" "56002","27.474193","172.30.1.104","172.30.1.205","TCP","54","135 > 48224 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56003","27.474221","172.30.1.104","172.30.1.205","TCP","54","135 > 48224 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56004","27.474227","172.30.1.205","172.30.1.104","TCP","54","48224 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56005","27.474307","172.30.1.104","172.30.1.205","TCP","66","49671 > 40862 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56006","27.474315","172.30.1.205","172.30.1.104","TCP","54","40862 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56007","27.474669","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56008","27.474964","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56009","27.474973","172.30.1.205","172.30.1.104","TCP","54","40862 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56010","27.476865","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56011","27.477227","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56012","27.477233","172.30.1.205","172.30.1.104","TCP","54","40862 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56013","27.478605","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56014","27.483903","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56015","27.483912","172.30.1.205","172.30.1.104","TCP","54","40862 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56016","27.484875","172.30.1.205","172.30.1.104","TCP","74","48228 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930711 TSecr=0 WS=128" "56017","27.485259","172.30.1.104","172.30.1.205","TCP","66","135 > 48228 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56018","27.485271","172.30.1.205","172.30.1.104","TCP","54","48228 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56019","27.485632","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56020","27.485927","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56021","27.485936","172.30.1.205","172.30.1.104","TCP","54","48228 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56022","27.488125","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56023","27.488504","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56024","27.488511","172.30.1.205","172.30.1.104","TCP","54","48228 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56025","27.490334","172.30.1.205","172.30.1.104","TCP","54","48228 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56026","27.490450","172.30.1.205","172.30.1.104","TCP","74","40866 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930716 TSecr=0 WS=128" "56027","27.490611","172.30.1.104","172.30.1.205","TCP","54","135 > 48228 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56028","27.490655","172.30.1.104","172.30.1.205","TCP","54","135 > 48228 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56029","27.490661","172.30.1.205","172.30.1.104","TCP","54","48228 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56030","27.490781","172.30.1.104","172.30.1.205","TCP","66","49671 > 40866 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56031","27.490789","172.30.1.205","172.30.1.104","TCP","54","40866 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56032","27.491136","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56033","27.491430","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56034","27.491442","172.30.1.205","172.30.1.104","TCP","54","40866 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56035","27.493375","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56036","27.494945","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56037","27.494953","172.30.1.205","172.30.1.104","TCP","54","40866 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56038","27.496344","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56039","27.500402","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56040","27.500412","172.30.1.205","172.30.1.104","TCP","54","40866 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56041","27.501377","172.30.1.205","172.30.1.104","TCP","74","48232 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930727 TSecr=0 WS=128" "56042","27.501672","172.30.1.104","172.30.1.205","TCP","66","135 > 48232 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56043","27.501684","172.30.1.205","172.30.1.104","TCP","54","48232 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56044","27.502052","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56045","27.502346","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56046","27.502355","172.30.1.205","172.30.1.104","TCP","54","48232 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56047","27.504524","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56048","27.504915","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56049","27.504922","172.30.1.205","172.30.1.104","TCP","54","48232 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56050","27.505774","172.30.1.205","172.30.1.104","TCP","54","40826 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56051","27.505822","172.30.1.205","172.30.1.104","TCP","54","40830 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56052","27.505859","172.30.1.205","172.30.1.104","TCP","54","40834 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56053","27.505889","172.30.1.205","172.30.1.104","TCP","54","40838 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56054","27.505916","172.30.1.205","172.30.1.104","TCP","54","40842 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56055","27.505945","172.30.1.205","172.30.1.104","TCP","54","40846 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56056","27.505973","172.30.1.205","172.30.1.104","TCP","54","40850 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56057","27.506006","172.30.1.205","172.30.1.104","TCP","54","40854 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56058","27.506033","172.30.1.205","172.30.1.104","TCP","54","40858 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56059","27.506060","172.30.1.205","172.30.1.104","TCP","54","40862 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56060","27.506083","172.30.1.205","172.30.1.104","TCP","54","40866 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56061","27.506108","172.30.1.104","172.30.1.205","TCP","54","49671 > 40826 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56062","27.506130","172.30.1.104","172.30.1.205","TCP","54","49671 > 40830 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56063","27.506157","172.30.1.104","172.30.1.205","TCP","54","49671 > 40834 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56064","27.506184","172.30.1.104","172.30.1.205","TCP","54","49671 > 40838 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56065","27.506203","172.30.1.205","172.30.1.104","TCP","54","40822 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56066","27.506285","172.30.1.104","172.30.1.205","TCP","54","49671 > 40826 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56067","27.506293","172.30.1.205","172.30.1.104","TCP","54","40826 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56068","27.506309","172.30.1.104","172.30.1.205","TCP","54","49671 > 40842 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56069","27.506339","172.30.1.104","172.30.1.205","TCP","54","49671 > 40842 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56070","27.506344","172.30.1.205","172.30.1.104","TCP","54","40842 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56071","27.506364","172.30.1.104","172.30.1.205","TCP","54","49671 > 40838 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56072","27.506367","172.30.1.205","172.30.1.104","TCP","54","40838 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56073","27.506393","172.30.1.104","172.30.1.205","TCP","54","49671 > 40830 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56074","27.506395","172.30.1.205","172.30.1.104","TCP","54","40830 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56075","27.506418","172.30.1.104","172.30.1.205","TCP","54","49671 > 40834 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56076","27.506421","172.30.1.205","172.30.1.104","TCP","54","40834 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56077","27.506446","172.30.1.104","172.30.1.205","TCP","54","49671 > 40846 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56078","27.506472","172.30.1.104","172.30.1.205","TCP","54","49671 > 40850 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56079","27.506498","172.30.1.104","172.30.1.205","TCP","54","49671 > 40854 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56080","27.506524","172.30.1.104","172.30.1.205","TCP","54","49671 > 40846 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56081","27.506529","172.30.1.205","172.30.1.104","TCP","54","40846 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56082","27.506551","172.30.1.104","172.30.1.205","TCP","54","49671 > 40858 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56083","27.506577","172.30.1.104","172.30.1.205","TCP","54","49671 > 40858 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56084","27.506581","172.30.1.205","172.30.1.104","TCP","54","40858 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56085","27.506603","172.30.1.104","172.30.1.205","TCP","54","49671 > 40850 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56086","27.506606","172.30.1.205","172.30.1.104","TCP","54","40850 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56087","27.506629","172.30.1.104","172.30.1.205","TCP","54","49671 > 40854 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56088","27.506633","172.30.1.205","172.30.1.104","TCP","54","40854 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56089","27.506667","172.30.1.104","172.30.1.205","TCP","54","49671 > 40862 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56090","27.506684","172.30.1.104","172.30.1.205","TCP","54","49671 > 40866 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56091","27.506705","172.30.1.104","172.30.1.205","TCP","54","49671 > 40822 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56092","27.506726","172.30.1.104","172.30.1.205","TCP","54","49671 > 40862 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56093","27.506730","172.30.1.205","172.30.1.104","TCP","54","40862 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56094","27.506747","172.30.1.104","172.30.1.205","TCP","54","49671 > 40866 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56095","27.506750","172.30.1.205","172.30.1.104","TCP","54","40866 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56096","27.506767","172.30.1.104","172.30.1.205","TCP","54","49671 > 40822 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56097","27.506769","172.30.1.205","172.30.1.104","TCP","54","40822 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56098","27.507741","172.30.1.205","172.30.1.104","TCP","54","48232 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56099","27.507857","172.30.1.205","172.30.1.104","TCP","74","40870 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930734 TSecr=0 WS=128" "56100","27.508009","172.30.1.104","172.30.1.205","TCP","54","135 > 48232 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56101","27.508043","172.30.1.104","172.30.1.205","TCP","54","135 > 48232 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56102","27.508048","172.30.1.205","172.30.1.104","TCP","54","48232 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56103","27.508142","172.30.1.104","172.30.1.205","TCP","66","49671 > 40870 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56104","27.508150","172.30.1.205","172.30.1.104","TCP","54","40870 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56105","27.508504","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56106","27.508792","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56107","27.508802","172.30.1.205","172.30.1.104","TCP","54","40870 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56108","27.510714","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56109","27.511074","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56110","27.511080","172.30.1.205","172.30.1.104","TCP","54","40870 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56111","27.512428","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56112","27.516450","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56113","27.516468","172.30.1.205","172.30.1.104","TCP","54","40870 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56114","27.517542","172.30.1.205","172.30.1.104","TCP","74","48236 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930743 TSecr=0 WS=128" "56115","27.518392","172.30.1.104","172.30.1.205","TCP","66","135 > 48236 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56116","27.518404","172.30.1.205","172.30.1.104","TCP","54","48236 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56117","27.518760","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56118","27.519055","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56119","27.519063","172.30.1.205","172.30.1.104","TCP","54","48236 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56120","27.521258","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56121","27.521645","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56122","27.521653","172.30.1.205","172.30.1.104","TCP","54","48236 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56123","27.523475","172.30.1.205","172.30.1.104","TCP","54","48236 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56124","27.523586","172.30.1.205","172.30.1.104","TCP","74","40874 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930750 TSecr=0 WS=128" "56125","27.523732","172.30.1.104","172.30.1.205","TCP","54","135 > 48236 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56126","27.523753","172.30.1.104","172.30.1.205","TCP","54","135 > 48236 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56127","27.523759","172.30.1.205","172.30.1.104","TCP","54","48236 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56128","27.523889","172.30.1.104","172.30.1.205","TCP","66","49671 > 40874 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56129","27.523898","172.30.1.205","172.30.1.104","TCP","54","40874 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56130","27.524241","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56131","27.524537","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56132","27.524554","172.30.1.205","172.30.1.104","TCP","54","40874 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56133","27.526668","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56134","27.527037","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56135","27.527044","172.30.1.205","172.30.1.104","TCP","54","40874 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56136","27.528420","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56137","27.532367","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56138","27.532376","172.30.1.205","172.30.1.104","TCP","54","40874 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56139","27.533358","172.30.1.205","172.30.1.104","TCP","74","48240 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930759 TSecr=0 WS=128" "56140","27.533673","172.30.1.104","172.30.1.205","TCP","66","135 > 48240 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56141","27.533685","172.30.1.205","172.30.1.104","TCP","54","48240 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56142","27.534045","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56143","27.534344","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56144","27.534358","172.30.1.205","172.30.1.104","TCP","54","48240 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56145","27.536632","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56146","27.537010","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56147","27.537016","172.30.1.205","172.30.1.104","TCP","54","48240 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56148","27.538840","172.30.1.205","172.30.1.104","TCP","54","48240 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56149","27.538960","172.30.1.205","172.30.1.104","TCP","74","40878 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930765 TSecr=0 WS=128" "56150","27.539129","172.30.1.104","172.30.1.205","TCP","54","135 > 48240 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56151","27.539145","172.30.1.104","172.30.1.205","TCP","54","135 > 48240 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56152","27.539150","172.30.1.205","172.30.1.104","TCP","54","48240 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56153","27.539252","172.30.1.104","172.30.1.205","TCP","66","49671 > 40878 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56154","27.539260","172.30.1.205","172.30.1.104","TCP","54","40878 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56155","27.539605","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56156","27.539906","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56157","27.539923","172.30.1.205","172.30.1.104","TCP","54","40878 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56158","27.542081","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56159","27.542443","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56160","27.542449","172.30.1.205","172.30.1.104","TCP","54","40878 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56161","27.543871","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56162","27.547941","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56163","27.547961","172.30.1.205","172.30.1.104","TCP","54","40878 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56164","27.549178","172.30.1.205","172.30.1.104","TCP","74","48244 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930775 TSecr=0 WS=128" "56165","27.549472","172.30.1.104","172.30.1.205","TCP","66","135 > 48244 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56166","27.549483","172.30.1.205","172.30.1.104","TCP","54","48244 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56167","27.549834","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56168","27.550106","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56169","27.550115","172.30.1.205","172.30.1.104","TCP","54","48244 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56170","27.552308","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56171","27.552696","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56172","27.552703","172.30.1.205","172.30.1.104","TCP","54","48244 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56173","27.554538","172.30.1.205","172.30.1.104","TCP","54","48244 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56174","27.554647","172.30.1.205","172.30.1.104","TCP","74","40882 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930781 TSecr=0 WS=128" "56175","27.554792","172.30.1.104","172.30.1.205","TCP","54","135 > 48244 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56176","27.554806","172.30.1.104","172.30.1.205","TCP","54","135 > 48244 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56177","27.554811","172.30.1.205","172.30.1.104","TCP","54","48244 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56178","27.554964","172.30.1.104","172.30.1.205","TCP","66","49671 > 40882 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56179","27.554972","172.30.1.205","172.30.1.104","TCP","54","40882 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56180","27.555315","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56181","27.555602","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56182","27.555614","172.30.1.205","172.30.1.104","TCP","54","40882 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56183","27.557815","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56184","27.558172","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56185","27.558178","172.30.1.205","172.30.1.104","TCP","54","40882 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56186","27.559518","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56187","27.563511","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56188","27.563522","172.30.1.205","172.30.1.104","TCP","54","40882 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56189","27.564474","172.30.1.205","172.30.1.104","TCP","74","48248 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930790 TSecr=0 WS=128" "56190","27.564769","172.30.1.104","172.30.1.205","TCP","66","135 > 48248 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56191","27.564789","172.30.1.205","172.30.1.104","TCP","54","48248 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56192","27.565150","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56193","27.565987","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56194","27.565998","172.30.1.205","172.30.1.104","TCP","54","48248 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56195","27.568188","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56196","27.568571","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56197","27.568578","172.30.1.205","172.30.1.104","TCP","54","48248 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56198","27.570422","172.30.1.205","172.30.1.104","TCP","54","48248 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56199","27.570530","172.30.1.205","172.30.1.104","TCP","74","40886 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930796 TSecr=0 WS=128" "56200","27.570695","172.30.1.104","172.30.1.205","TCP","54","135 > 48248 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56201","27.570733","172.30.1.104","172.30.1.205","TCP","54","135 > 48248 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56202","27.570738","172.30.1.205","172.30.1.104","TCP","54","48248 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56203","27.570814","172.30.1.104","172.30.1.205","TCP","66","49671 > 40886 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56204","27.570822","172.30.1.205","172.30.1.104","TCP","54","40886 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56205","27.571164","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56206","27.571445","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56207","27.571454","172.30.1.205","172.30.1.104","TCP","54","40886 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56208","27.573406","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56209","27.574868","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56210","27.574872","172.30.1.205","172.30.1.104","TCP","54","40886 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56211","27.576208","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56212","27.580191","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56213","27.580208","172.30.1.205","172.30.1.104","TCP","54","40886 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56214","27.581236","172.30.1.205","172.30.1.104","TCP","74","48252 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930807 TSecr=0 WS=128" "56215","27.581560","172.30.1.104","172.30.1.205","TCP","66","135 > 48252 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56216","27.581571","172.30.1.205","172.30.1.104","TCP","54","48252 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56217","27.581926","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56218","27.582228","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56219","27.582237","172.30.1.205","172.30.1.104","TCP","54","48252 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56220","27.584427","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56221","27.584827","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56222","27.584833","172.30.1.205","172.30.1.104","TCP","54","48252 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56223","27.586654","172.30.1.205","172.30.1.104","TCP","54","48252 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56224","27.586764","172.30.1.205","172.30.1.104","TCP","74","40890 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930813 TSecr=0 WS=128" "56225","27.586960","172.30.1.104","172.30.1.205","TCP","54","135 > 48252 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56226","27.586971","172.30.1.104","172.30.1.205","TCP","54","135 > 48252 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56227","27.586976","172.30.1.205","172.30.1.104","TCP","54","48252 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56228","27.587055","172.30.1.104","172.30.1.205","TCP","66","49671 > 40890 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56229","27.587063","172.30.1.205","172.30.1.104","TCP","54","40890 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56230","27.587406","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56231","27.588691","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56232","27.588700","172.30.1.205","172.30.1.104","TCP","54","40890 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56233","27.590606","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56234","27.590989","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56235","27.591001","172.30.1.205","172.30.1.104","TCP","54","40890 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56236","27.592351","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56237","27.596374","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56238","27.596384","172.30.1.205","172.30.1.104","TCP","54","40890 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56239","27.597352","172.30.1.205","172.30.1.104","TCP","74","48256 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930823 TSecr=0 WS=128" "56240","27.597705","172.30.1.104","172.30.1.205","TCP","66","135 > 48256 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56241","27.597716","172.30.1.205","172.30.1.104","TCP","54","48256 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56242","27.598065","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56243","27.598340","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56244","27.598349","172.30.1.205","172.30.1.104","TCP","54","48256 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56245","27.600532","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56246","27.600920","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56247","27.600927","172.30.1.205","172.30.1.104","TCP","54","48256 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56248","27.602739","172.30.1.205","172.30.1.104","TCP","54","48256 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56249","27.602850","172.30.1.205","172.30.1.104","TCP","74","40894 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930829 TSecr=0 WS=128" "56250","27.603036","172.30.1.104","172.30.1.205","TCP","54","135 > 48256 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56251","27.603045","172.30.1.104","172.30.1.205","TCP","54","135 > 48256 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56252","27.603050","172.30.1.205","172.30.1.104","TCP","54","48256 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56253","27.603134","172.30.1.104","172.30.1.205","TCP","66","49671 > 40894 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56254","27.603142","172.30.1.205","172.30.1.104","TCP","54","40894 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56255","27.603499","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56256","27.603802","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56257","27.603812","172.30.1.205","172.30.1.104","TCP","54","40894 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56258","27.605727","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56259","27.606618","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56260","27.606622","172.30.1.205","172.30.1.104","TCP","54","40894 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56261","27.607972","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56262","27.611975","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56263","27.611985","172.30.1.205","172.30.1.104","TCP","54","40894 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56264","27.612950","172.30.1.205","172.30.1.104","TCP","74","48260 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930839 TSecr=0 WS=128" "56265","27.613235","172.30.1.104","172.30.1.205","TCP","66","135 > 48260 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56266","27.613246","172.30.1.205","172.30.1.104","TCP","54","48260 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56267","27.613602","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56268","27.613921","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56269","27.613936","172.30.1.205","172.30.1.104","TCP","54","48260 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56270","27.616230","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56271","27.616634","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56272","27.616642","172.30.1.205","172.30.1.104","TCP","54","48260 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56273","27.618488","172.30.1.205","172.30.1.104","TCP","54","48260 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56274","27.618609","172.30.1.205","172.30.1.104","TCP","74","40898 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930845 TSecr=0 WS=128" "56275","27.618767","172.30.1.104","172.30.1.205","TCP","54","135 > 48260 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56276","27.618812","172.30.1.104","172.30.1.205","TCP","54","135 > 48260 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56277","27.618818","172.30.1.205","172.30.1.104","TCP","54","48260 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56278","27.618920","172.30.1.104","172.30.1.205","TCP","66","49671 > 40898 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56279","27.618929","172.30.1.205","172.30.1.104","TCP","54","40898 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56280","27.619275","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56281","27.619629","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56282","27.619644","172.30.1.205","172.30.1.104","TCP","54","40898 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56283","27.621668","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56284","27.622035","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56285","27.622042","172.30.1.205","172.30.1.104","TCP","54","40898 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56286","27.623452","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56287","27.627452","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56288","27.627462","172.30.1.205","172.30.1.104","TCP","54","40898 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56289","27.628422","172.30.1.205","172.30.1.104","TCP","74","48264 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930854 TSecr=0 WS=128" "56290","27.628745","172.30.1.104","172.30.1.205","TCP","66","135 > 48264 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56291","27.628757","172.30.1.205","172.30.1.104","TCP","54","48264 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56292","27.629135","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56293","27.629431","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56294","27.629441","172.30.1.205","172.30.1.104","TCP","54","48264 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56295","27.631654","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56296","27.632046","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56297","27.632053","172.30.1.205","172.30.1.104","TCP","54","48264 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56298","27.633895","172.30.1.205","172.30.1.104","TCP","54","48264 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56299","27.634007","172.30.1.205","172.30.1.104","TCP","74","40902 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930860 TSecr=0 WS=128" "56300","27.634172","172.30.1.104","172.30.1.205","TCP","54","135 > 48264 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56301","27.634202","172.30.1.104","172.30.1.205","TCP","54","135 > 48264 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56302","27.634209","172.30.1.205","172.30.1.104","TCP","54","48264 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56303","27.634290","172.30.1.104","172.30.1.205","TCP","66","49671 > 40902 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56304","27.634298","172.30.1.205","172.30.1.104","TCP","54","40902 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56305","27.634646","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56306","27.636209","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56307","27.636216","172.30.1.205","172.30.1.104","TCP","54","40902 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56308","27.638116","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56309","27.638493","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56310","27.638500","172.30.1.205","172.30.1.104","TCP","54","40902 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56311","27.639860","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56312","27.643982","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56313","27.643994","172.30.1.205","172.30.1.104","TCP","54","40902 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56314","27.644974","172.30.1.205","172.30.1.104","TCP","74","48268 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930871 TSecr=0 WS=128" "56315","27.645306","172.30.1.104","172.30.1.205","TCP","66","135 > 48268 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56316","27.645317","172.30.1.205","172.30.1.104","TCP","54","48268 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56317","27.645675","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56318","27.645991","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56319","27.645999","172.30.1.205","172.30.1.104","TCP","54","48268 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56320","27.648205","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56321","27.648606","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56322","27.648612","172.30.1.205","172.30.1.104","TCP","54","48268 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56323","27.650495","172.30.1.205","172.30.1.104","TCP","54","48268 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56324","27.650609","172.30.1.205","172.30.1.104","TCP","74","40906 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930877 TSecr=0 WS=128" "56325","27.650771","172.30.1.104","172.30.1.205","TCP","54","135 > 48268 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56326","27.650793","172.30.1.104","172.30.1.205","TCP","54","135 > 48268 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56327","27.650799","172.30.1.205","172.30.1.104","TCP","54","48268 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56328","27.650881","172.30.1.104","172.30.1.205","TCP","66","49671 > 40906 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56329","27.650889","172.30.1.205","172.30.1.104","TCP","54","40906 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56330","27.651237","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56331","27.651558","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56332","27.651567","172.30.1.205","172.30.1.104","TCP","54","40906 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56333","27.653501","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56334","27.653871","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56335","27.653877","172.30.1.205","172.30.1.104","TCP","54","40906 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56336","27.655261","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56337","27.659514","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56338","27.659525","172.30.1.205","172.30.1.104","TCP","54","40906 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56339","27.660496","172.30.1.205","172.30.1.104","TCP","74","48272 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930886 TSecr=0 WS=128" "56340","27.660820","172.30.1.104","172.30.1.205","TCP","66","135 > 48272 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56341","27.660831","172.30.1.205","172.30.1.104","TCP","54","48272 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56342","27.661221","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56343","27.661507","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56344","27.661516","172.30.1.205","172.30.1.104","TCP","54","48272 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56345","27.663746","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56346","27.664142","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56347","27.664149","172.30.1.205","172.30.1.104","TCP","54","48272 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56348","27.665971","172.30.1.205","172.30.1.104","TCP","54","48272 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56349","27.666086","172.30.1.205","172.30.1.104","TCP","74","40910 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930892 TSecr=0 WS=128" "56350","27.666242","172.30.1.104","172.30.1.205","TCP","54","135 > 48272 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56351","27.666274","172.30.1.104","172.30.1.205","TCP","54","135 > 48272 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56352","27.666280","172.30.1.205","172.30.1.104","TCP","54","48272 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56353","27.666372","172.30.1.104","172.30.1.205","TCP","66","49671 > 40910 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56354","27.666381","172.30.1.205","172.30.1.104","TCP","54","40910 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56355","27.666739","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56356","27.667027","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56357","27.667035","172.30.1.205","172.30.1.104","TCP","54","40910 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56358","27.668982","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56359","27.669354","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56360","27.669360","172.30.1.205","172.30.1.104","TCP","54","40910 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56361","27.670711","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56362","27.674776","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56363","27.674787","172.30.1.205","172.30.1.104","TCP","54","40910 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56364","27.675755","172.30.1.205","172.30.1.104","TCP","74","48276 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930902 TSecr=0 WS=128" "56365","27.676072","172.30.1.104","172.30.1.205","TCP","66","135 > 48276 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56366","27.676083","172.30.1.205","172.30.1.104","TCP","54","48276 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56367","27.676432","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56368","27.676734","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56369","27.676744","172.30.1.205","172.30.1.104","TCP","54","48276 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56370","27.678949","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56371","27.679341","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56372","27.679347","172.30.1.205","172.30.1.104","TCP","54","48276 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56373","27.681205","172.30.1.205","172.30.1.104","TCP","54","48276 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56374","27.681315","172.30.1.205","172.30.1.104","TCP","74","40914 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930907 TSecr=0 WS=128" "56375","27.681494","172.30.1.104","172.30.1.205","TCP","54","135 > 48276 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56376","27.681546","172.30.1.104","172.30.1.205","TCP","54","135 > 48276 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56377","27.681551","172.30.1.205","172.30.1.104","TCP","54","48276 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56378","27.681697","172.30.1.104","172.30.1.205","TCP","66","49671 > 40914 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56379","27.681705","172.30.1.205","172.30.1.104","TCP","54","40914 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56380","27.682055","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56381","27.682405","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56382","27.682413","172.30.1.205","172.30.1.104","TCP","54","40914 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56383","27.684271","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56384","27.684652","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56385","27.684658","172.30.1.205","172.30.1.104","TCP","54","40914 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56386","27.686022","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56387","27.690202","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56388","27.690212","172.30.1.205","172.30.1.104","TCP","54","40914 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56389","27.691151","172.30.1.205","172.30.1.104","TCP","74","48280 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930917 TSecr=0 WS=128" "56390","27.691464","172.30.1.104","172.30.1.205","TCP","66","135 > 48280 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56391","27.691475","172.30.1.205","172.30.1.104","TCP","54","48280 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56392","27.691828","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56393","27.692136","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56394","27.692145","172.30.1.205","172.30.1.104","TCP","54","48280 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56395","27.694350","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56396","27.694814","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56397","27.694821","172.30.1.205","172.30.1.104","TCP","54","48280 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56398","27.695673","172.30.1.205","172.30.1.104","TCP","54","40874 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56399","27.695721","172.30.1.205","172.30.1.104","TCP","54","40878 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56400","27.695759","172.30.1.205","172.30.1.104","TCP","54","40882 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56401","27.695792","172.30.1.205","172.30.1.104","TCP","54","40886 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56402","27.695824","172.30.1.205","172.30.1.104","TCP","54","40890 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56403","27.695852","172.30.1.205","172.30.1.104","TCP","54","40894 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56404","27.695879","172.30.1.205","172.30.1.104","TCP","54","40898 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56405","27.695909","172.30.1.205","172.30.1.104","TCP","54","40902 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56406","27.695937","172.30.1.205","172.30.1.104","TCP","54","40906 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56407","27.695963","172.30.1.205","172.30.1.104","TCP","54","40910 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56408","27.695993","172.30.1.205","172.30.1.104","TCP","54","40914 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56409","27.696062","172.30.1.205","172.30.1.104","TCP","54","40870 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56410","27.696299","172.30.1.104","172.30.1.205","TCP","54","49671 > 40874 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56411","27.696316","172.30.1.104","172.30.1.205","TCP","54","49671 > 40874 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56412","27.696322","172.30.1.205","172.30.1.104","TCP","54","40874 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56413","27.696346","172.30.1.104","172.30.1.205","TCP","54","49671 > 40878 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56414","27.696371","172.30.1.104","172.30.1.205","TCP","54","49671 > 40882 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56415","27.696391","172.30.1.104","172.30.1.205","TCP","54","49671 > 40886 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56416","27.696441","172.30.1.104","172.30.1.205","TCP","54","49671 > 40878 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56417","27.696447","172.30.1.205","172.30.1.104","TCP","54","40878 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56418","27.696459","172.30.1.104","172.30.1.205","TCP","54","49671 > 40890 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56419","27.696483","172.30.1.104","172.30.1.205","TCP","54","49671 > 40890 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56420","27.696488","172.30.1.205","172.30.1.104","TCP","54","40890 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56421","27.696502","172.30.1.104","172.30.1.205","TCP","54","49671 > 40894 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56422","27.696522","172.30.1.104","172.30.1.205","TCP","54","49671 > 40894 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56423","27.696527","172.30.1.205","172.30.1.104","TCP","54","40894 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56424","27.696543","172.30.1.104","172.30.1.205","TCP","54","49671 > 40898 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56425","27.696563","172.30.1.104","172.30.1.205","TCP","54","49671 > 40902 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56426","27.696583","172.30.1.104","172.30.1.205","TCP","54","49671 > 40882 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56427","27.696587","172.30.1.205","172.30.1.104","TCP","54","40882 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56428","27.696611","172.30.1.104","172.30.1.205","TCP","54","49671 > 40906 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56429","27.696632","172.30.1.104","172.30.1.205","TCP","54","49671 > 40902 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56430","27.696635","172.30.1.205","172.30.1.104","TCP","54","40902 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56431","27.696743","172.30.1.104","172.30.1.205","TCP","54","49671 > 40910 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56432","27.696762","172.30.1.104","172.30.1.205","TCP","54","49671 > 40898 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56433","27.696766","172.30.1.205","172.30.1.104","TCP","54","40898 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56434","27.696788","172.30.1.104","172.30.1.205","TCP","54","49671 > 40910 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56435","27.696791","172.30.1.205","172.30.1.104","TCP","54","40910 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56436","27.696811","172.30.1.104","172.30.1.205","TCP","54","49671 > 40914 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56437","27.697079","172.30.1.104","172.30.1.205","TCP","54","49671 > 40870 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56438","27.697098","172.30.1.104","172.30.1.205","TCP","54","49671 > 40906 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56439","27.697102","172.30.1.205","172.30.1.104","TCP","54","40906 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56440","27.697126","172.30.1.104","172.30.1.205","TCP","54","49671 > 40870 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56441","27.697129","172.30.1.205","172.30.1.104","TCP","54","40870 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56442","27.697152","172.30.1.104","172.30.1.205","TCP","54","49671 > 40914 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56443","27.697155","172.30.1.205","172.30.1.104","TCP","54","40914 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56444","27.697172","172.30.1.104","172.30.1.205","TCP","54","49671 > 40886 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56445","27.697174","172.30.1.205","172.30.1.104","TCP","54","40886 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56446","27.697702","172.30.1.205","172.30.1.104","TCP","54","48280 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56447","27.697813","172.30.1.205","172.30.1.104","TCP","74","40918 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930924 TSecr=0 WS=128" "56448","27.697964","172.30.1.104","172.30.1.205","TCP","54","135 > 48280 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56449","27.697999","172.30.1.104","172.30.1.205","TCP","54","135 > 48280 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56450","27.698005","172.30.1.205","172.30.1.104","TCP","54","48280 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56451","27.698117","172.30.1.104","172.30.1.205","TCP","66","49671 > 40918 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56452","27.698131","172.30.1.205","172.30.1.104","TCP","54","40918 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56453","27.698489","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56454","27.698828","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56455","27.698837","172.30.1.205","172.30.1.104","TCP","54","40918 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56456","27.700724","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56457","27.701125","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56458","27.701131","172.30.1.205","172.30.1.104","TCP","54","40918 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56459","27.702491","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56460","27.706553","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56461","27.706562","172.30.1.205","172.30.1.104","TCP","54","40918 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56462","27.707526","172.30.1.205","172.30.1.104","TCP","74","48284 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930933 TSecr=0 WS=128" "56463","27.707810","172.30.1.104","172.30.1.205","TCP","66","135 > 48284 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56464","27.707820","172.30.1.205","172.30.1.104","TCP","54","48284 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56465","27.708173","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56466","27.708462","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56467","27.708471","172.30.1.205","172.30.1.104","TCP","54","48284 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56468","27.710684","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56469","27.711098","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56470","27.711105","172.30.1.205","172.30.1.104","TCP","54","48284 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56471","27.712941","172.30.1.205","172.30.1.104","TCP","54","48284 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56472","27.713058","172.30.1.205","172.30.1.104","TCP","74","40922 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930939 TSecr=0 WS=128" "56473","27.713219","172.30.1.104","172.30.1.205","TCP","54","135 > 48284 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56474","27.713291","172.30.1.104","172.30.1.205","TCP","54","135 > 48284 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56475","27.713298","172.30.1.205","172.30.1.104","TCP","54","48284 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56476","27.713371","172.30.1.104","172.30.1.205","TCP","66","49671 > 40922 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56477","27.713380","172.30.1.205","172.30.1.104","TCP","54","40922 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56478","27.713725","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56479","27.715071","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56480","27.715080","172.30.1.205","172.30.1.104","TCP","54","40922 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56481","27.717000","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56482","27.717374","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56483","27.717381","172.30.1.205","172.30.1.104","TCP","54","40922 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56484","27.718736","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56485","27.722764","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56486","27.722774","172.30.1.205","172.30.1.104","TCP","54","40922 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56487","27.723759","172.30.1.205","172.30.1.104","TCP","74","48288 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930950 TSecr=0 WS=128" "56488","27.724098","172.30.1.104","172.30.1.205","TCP","66","135 > 48288 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56489","27.724116","172.30.1.205","172.30.1.104","TCP","54","48288 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56490","27.724525","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56491","27.724837","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56492","27.724848","172.30.1.205","172.30.1.104","TCP","54","48288 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56493","27.727115","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56494","27.727487","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56495","27.727494","172.30.1.205","172.30.1.104","TCP","54","48288 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56496","27.729353","172.30.1.205","172.30.1.104","TCP","54","48288 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56497","27.729469","172.30.1.205","172.30.1.104","TCP","74","40926 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930955 TSecr=0 WS=128" "56498","27.729608","172.30.1.104","172.30.1.205","TCP","54","135 > 48288 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56499","27.729634","172.30.1.104","172.30.1.205","TCP","54","135 > 48288 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56500","27.729641","172.30.1.205","172.30.1.104","TCP","54","48288 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56501","27.729752","172.30.1.104","172.30.1.205","TCP","66","49671 > 40926 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56502","27.729761","172.30.1.205","172.30.1.104","TCP","54","40926 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56503","27.730109","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56504","27.730399","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56505","27.730408","172.30.1.205","172.30.1.104","TCP","54","40926 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56506","27.732309","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56507","27.732737","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56508","27.732743","172.30.1.205","172.30.1.104","TCP","54","40926 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56509","27.734139","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56510","27.738140","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56511","27.738151","172.30.1.205","172.30.1.104","TCP","54","40926 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56512","27.739154","172.30.1.205","172.30.1.104","TCP","74","48292 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930965 TSecr=0 WS=128" "56513","27.739447","172.30.1.104","172.30.1.205","TCP","66","135 > 48292 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56514","27.739459","172.30.1.205","172.30.1.104","TCP","54","48292 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56515","27.739819","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56516","27.740110","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56517","27.740119","172.30.1.205","172.30.1.104","TCP","54","48292 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56518","27.742378","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56519","27.742784","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56520","27.742791","172.30.1.205","172.30.1.104","TCP","54","48292 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56521","27.751434","172.30.1.205","172.30.1.104","TCP","54","48292 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56522","27.751619","172.30.1.205","172.30.1.104","TCP","74","40930 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930978 TSecr=0 WS=128" "56523","27.751781","172.30.1.104","172.30.1.205","TCP","54","135 > 48292 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56524","27.751795","172.30.1.104","172.30.1.205","TCP","54","135 > 48292 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56525","27.751803","172.30.1.205","172.30.1.104","TCP","54","48292 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56526","27.751914","172.30.1.104","172.30.1.205","TCP","66","49671 > 40930 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56527","27.751926","172.30.1.205","172.30.1.104","TCP","54","40930 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56528","27.752339","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56529","27.752625","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56530","27.752637","172.30.1.205","172.30.1.104","TCP","54","40930 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56531","27.754638","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56532","27.755066","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56533","27.755073","172.30.1.205","172.30.1.104","TCP","54","40930 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56534","27.757679","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56535","27.761778","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56536","27.761790","172.30.1.205","172.30.1.104","TCP","54","40930 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56537","27.762764","172.30.1.205","172.30.1.104","TCP","74","48296 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930989 TSecr=0 WS=128" "56538","27.763152","172.30.1.104","172.30.1.205","TCP","66","135 > 48296 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56539","27.763166","172.30.1.205","172.30.1.104","TCP","54","48296 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56540","27.763543","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56541","27.763834","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56542","27.763845","172.30.1.205","172.30.1.104","TCP","54","48296 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56543","27.766156","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56544","27.766564","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56545","27.766572","172.30.1.205","172.30.1.104","TCP","54","48296 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56546","27.770865","172.30.1.205","172.30.1.104","TCP","54","48296 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56547","27.771000","172.30.1.205","172.30.1.104","TCP","74","40934 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499930997 TSecr=0 WS=128" "56548","27.771174","172.30.1.104","172.30.1.205","TCP","54","135 > 48296 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56549","27.771206","172.30.1.104","172.30.1.205","TCP","54","135 > 48296 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56550","27.771214","172.30.1.205","172.30.1.104","TCP","54","48296 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56551","27.771281","172.30.1.104","172.30.1.205","TCP","66","49671 > 40934 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56552","27.771293","172.30.1.205","172.30.1.104","TCP","54","40934 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56553","27.771942","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56554","27.772266","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56555","27.772277","172.30.1.205","172.30.1.104","TCP","54","40934 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56556","27.774446","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56557","27.774825","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56558","27.774832","172.30.1.205","172.30.1.104","TCP","54","40934 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56559","27.777799","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56560","27.782204","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56561","27.782214","172.30.1.205","172.30.1.104","TCP","54","40934 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56562","27.783161","172.30.1.205","172.30.1.104","TCP","74","48300 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931009 TSecr=0 WS=128" "56563","27.783474","172.30.1.104","172.30.1.205","TCP","66","135 > 48300 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56564","27.783487","172.30.1.205","172.30.1.104","TCP","54","48300 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56565","27.783879","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56566","27.784182","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56567","27.784191","172.30.1.205","172.30.1.104","TCP","54","48300 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56568","27.786543","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56569","27.786935","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56570","27.786943","172.30.1.205","172.30.1.104","TCP","54","48300 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56571","27.790719","172.30.1.205","172.30.1.104","TCP","54","48300 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56572","27.790848","172.30.1.205","172.30.1.104","TCP","74","40938 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931017 TSecr=0 WS=128" "56573","27.791013","172.30.1.104","172.30.1.205","TCP","54","135 > 48300 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56574","27.791044","172.30.1.104","172.30.1.205","TCP","54","135 > 48300 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56575","27.791052","172.30.1.205","172.30.1.104","TCP","54","48300 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56576","27.791121","172.30.1.104","172.30.1.205","TCP","66","49671 > 40938 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56577","27.791132","172.30.1.205","172.30.1.104","TCP","54","40938 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56578","27.792254","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56579","27.792574","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56580","27.792593","172.30.1.205","172.30.1.104","TCP","54","40938 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56581","27.794818","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56582","27.795263","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56583","27.795270","172.30.1.205","172.30.1.104","TCP","54","40938 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56584","27.797770","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56585","27.801782","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56586","27.801793","172.30.1.205","172.30.1.104","TCP","54","40938 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56587","27.802799","172.30.1.205","172.30.1.104","TCP","74","48304 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931029 TSecr=0 WS=128" "56588","27.803127","172.30.1.104","172.30.1.205","TCP","66","135 > 48304 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56589","27.803139","172.30.1.205","172.30.1.104","TCP","54","48304 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56590","27.803510","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56591","27.803817","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56592","27.803828","172.30.1.205","172.30.1.104","TCP","54","48304 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56593","27.806563","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56594","27.806957","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56595","27.806965","172.30.1.205","172.30.1.104","TCP","54","48304 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56596","27.809329","172.30.1.205","172.30.1.104","TCP","54","48304 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56597","27.809452","172.30.1.205","172.30.1.104","TCP","74","40942 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931035 TSecr=0 WS=128" "56598","27.809625","172.30.1.104","172.30.1.205","TCP","54","135 > 48304 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56599","27.809657","172.30.1.104","172.30.1.205","TCP","54","135 > 48304 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56600","27.809663","172.30.1.205","172.30.1.104","TCP","54","48304 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56601","27.809744","172.30.1.104","172.30.1.205","TCP","66","49671 > 40942 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56602","27.809755","172.30.1.205","172.30.1.104","TCP","54","40942 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56603","27.810236","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56604","27.810527","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56605","27.810536","172.30.1.205","172.30.1.104","TCP","54","40942 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56606","27.813043","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56607","27.813474","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56608","27.813481","172.30.1.205","172.30.1.104","TCP","54","40942 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56609","27.815088","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56610","27.819142","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56611","27.819153","172.30.1.205","172.30.1.104","TCP","54","40942 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56612","27.824699","172.30.1.205","172.30.1.104","TCP","74","48308 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931051 TSecr=0 WS=128" "56613","27.824995","172.30.1.104","172.30.1.205","TCP","66","135 > 48308 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56614","27.825008","172.30.1.205","172.30.1.104","TCP","54","48308 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56615","27.825385","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56616","27.825752","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56617","27.825761","172.30.1.205","172.30.1.104","TCP","54","48308 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56618","27.827981","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56619","27.828465","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56620","27.828472","172.30.1.205","172.30.1.104","TCP","54","48308 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56621","27.830543","172.30.1.205","172.30.1.104","TCP","54","48308 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56622","27.830661","172.30.1.205","172.30.1.104","TCP","74","40946 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931057 TSecr=0 WS=128" "56623","27.830820","172.30.1.104","172.30.1.205","TCP","54","135 > 48308 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56624","27.830837","172.30.1.104","172.30.1.205","TCP","54","135 > 48308 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56625","27.830843","172.30.1.205","172.30.1.104","TCP","54","48308 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56626","27.830912","172.30.1.104","172.30.1.205","TCP","66","49671 > 40946 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56627","27.830921","172.30.1.205","172.30.1.104","TCP","54","40946 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56628","27.831266","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56629","27.831532","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56630","27.831541","172.30.1.205","172.30.1.104","TCP","54","40946 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56631","27.833450","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56632","27.833815","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56633","27.833821","172.30.1.205","172.30.1.104","TCP","54","40946 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56634","27.835190","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56635","27.839225","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56636","27.839236","172.30.1.205","172.30.1.104","TCP","54","40946 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56637","27.841806","172.30.1.205","172.30.1.104","TCP","74","48312 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931068 TSecr=0 WS=128" "56638","27.842134","172.30.1.104","172.30.1.205","TCP","66","135 > 48312 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56639","27.842147","172.30.1.205","172.30.1.104","TCP","54","48312 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56640","27.843314","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56641","27.843701","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56642","27.843711","172.30.1.205","172.30.1.104","TCP","54","48312 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56643","27.846244","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56644","27.846624","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56645","27.846633","172.30.1.205","172.30.1.104","TCP","54","48312 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56646","27.851779","172.30.1.205","172.30.1.104","TCP","54","48312 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56647","27.851906","172.30.1.205","172.30.1.104","TCP","74","40950 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931078 TSecr=0 WS=128" "56648","27.852058","172.30.1.104","172.30.1.205","TCP","54","135 > 48312 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56649","27.852106","172.30.1.104","172.30.1.205","TCP","54","135 > 48312 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56650","27.852114","172.30.1.205","172.30.1.104","TCP","54","48312 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56651","27.852180","172.30.1.104","172.30.1.205","TCP","66","49671 > 40950 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56652","27.852189","172.30.1.205","172.30.1.104","TCP","54","40950 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56653","27.853125","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56654","27.853414","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56655","27.853425","172.30.1.205","172.30.1.104","TCP","54","40950 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56656","27.855577","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56657","27.855931","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56658","27.855939","172.30.1.205","172.30.1.104","TCP","54","40950 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56659","27.858687","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56660","27.862785","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56661","27.862797","172.30.1.205","172.30.1.104","TCP","54","40950 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56662","27.863757","172.30.1.205","172.30.1.104","TCP","74","48316 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931090 TSecr=0 WS=128" "56663","27.864071","172.30.1.104","172.30.1.205","TCP","66","135 > 48316 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56664","27.864084","172.30.1.205","172.30.1.104","TCP","54","48316 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56665","27.864456","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56666","27.864766","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56667","27.864789","172.30.1.205","172.30.1.104","TCP","54","48316 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56668","27.867046","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56669","27.867444","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56670","27.867452","172.30.1.205","172.30.1.104","TCP","54","48316 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56671","27.870265","172.30.1.205","172.30.1.104","TCP","54","48316 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56672","27.870388","172.30.1.205","172.30.1.104","TCP","74","40954 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931096 TSecr=0 WS=128" "56673","27.870579","172.30.1.104","172.30.1.205","TCP","54","135 > 48316 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56674","27.870593","172.30.1.104","172.30.1.205","TCP","54","135 > 48316 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56675","27.870601","172.30.1.205","172.30.1.104","TCP","54","48316 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56676","27.870676","172.30.1.104","172.30.1.205","TCP","66","49671 > 40954 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56677","27.870688","172.30.1.205","172.30.1.104","TCP","54","40954 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56678","27.871099","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56679","27.871480","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56680","27.871490","172.30.1.205","172.30.1.104","TCP","54","40954 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56681","27.873476","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56682","27.873865","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56683","27.873872","172.30.1.205","172.30.1.104","TCP","54","40954 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56684","27.875247","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56685","27.879240","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56686","27.879251","172.30.1.205","172.30.1.104","TCP","54","40954 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56687","27.880249","172.30.1.205","172.30.1.104","TCP","74","48320 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931106 TSecr=0 WS=128" "56688","27.880570","172.30.1.104","172.30.1.205","TCP","66","135 > 48320 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56689","27.880581","172.30.1.205","172.30.1.104","TCP","54","48320 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56690","27.880970","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56691","27.881279","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56692","27.881288","172.30.1.205","172.30.1.104","TCP","54","48320 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56693","27.883500","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56694","27.883903","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56695","27.883910","172.30.1.205","172.30.1.104","TCP","54","48320 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56696","27.885763","172.30.1.205","172.30.1.104","TCP","54","48320 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56697","27.885878","172.30.1.205","172.30.1.104","TCP","74","40958 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931112 TSecr=0 WS=128" "56698","27.886023","172.30.1.104","172.30.1.205","TCP","54","135 > 48320 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56699","27.886035","172.30.1.104","172.30.1.205","TCP","54","135 > 48320 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56700","27.886041","172.30.1.205","172.30.1.104","TCP","54","48320 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56701","27.886169","172.30.1.104","172.30.1.205","TCP","66","49671 > 40958 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56702","27.886178","172.30.1.205","172.30.1.104","TCP","54","40958 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56703","27.886553","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56704","27.886846","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56705","27.886855","172.30.1.205","172.30.1.104","TCP","54","40958 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56706","27.888763","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56707","27.889132","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56708","27.889139","172.30.1.205","172.30.1.104","TCP","54","40958 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56709","27.890495","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56710","27.894642","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56711","27.894654","172.30.1.205","172.30.1.104","TCP","54","40958 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56712","27.895681","172.30.1.205","172.30.1.104","TCP","74","48324 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931122 TSecr=0 WS=128" "56713","27.896000","172.30.1.104","172.30.1.205","TCP","66","135 > 48324 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56714","27.896011","172.30.1.205","172.30.1.104","TCP","54","48324 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56715","27.896364","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56716","27.896662","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56717","27.896671","172.30.1.205","172.30.1.104","TCP","54","48324 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56718","27.898954","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56719","27.899386","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56720","27.899393","172.30.1.205","172.30.1.104","TCP","54","48324 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56721","27.901249","172.30.1.205","172.30.1.104","TCP","54","48324 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56722","27.901364","172.30.1.205","172.30.1.104","TCP","74","40962 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931127 TSecr=0 WS=128" "56723","27.901539","172.30.1.104","172.30.1.205","TCP","54","135 > 48324 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56724","27.901562","172.30.1.104","172.30.1.205","TCP","54","135 > 48324 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56725","27.901569","172.30.1.205","172.30.1.104","TCP","54","48324 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56726","27.901661","172.30.1.104","172.30.1.205","TCP","66","49671 > 40962 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56727","27.901669","172.30.1.205","172.30.1.104","TCP","54","40962 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56728","27.902013","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56729","27.902287","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56730","27.902295","172.30.1.205","172.30.1.104","TCP","54","40962 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56731","27.904188","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56732","27.904591","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56733","27.904598","172.30.1.205","172.30.1.104","TCP","54","40962 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56734","27.905987","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56735","27.910096","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56736","27.910106","172.30.1.205","172.30.1.104","TCP","54","40962 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56737","27.911099","172.30.1.205","172.30.1.104","TCP","74","48328 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931137 TSecr=0 WS=128" "56738","27.911397","172.30.1.104","172.30.1.205","TCP","66","135 > 48328 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56739","27.911413","172.30.1.205","172.30.1.104","TCP","54","48328 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56740","27.911783","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56741","27.912076","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56742","27.912084","172.30.1.205","172.30.1.104","TCP","54","48328 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56743","27.914325","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56744","27.914712","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56745","27.914718","172.30.1.205","172.30.1.104","TCP","54","48328 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56746","27.915580","172.30.1.205","172.30.1.104","TCP","54","40922 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56747","27.915643","172.30.1.205","172.30.1.104","TCP","54","40926 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56748","27.915677","172.30.1.205","172.30.1.104","TCP","54","40930 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56749","27.915706","172.30.1.205","172.30.1.104","TCP","54","40934 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56750","27.915738","172.30.1.205","172.30.1.104","TCP","54","40938 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56751","27.915766","172.30.1.205","172.30.1.104","TCP","54","40942 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56752","27.915800","172.30.1.205","172.30.1.104","TCP","54","40946 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56753","27.915829","172.30.1.205","172.30.1.104","TCP","54","40950 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56754","27.915860","172.30.1.205","172.30.1.104","TCP","54","40954 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56755","27.915887","172.30.1.205","172.30.1.104","TCP","54","40958 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56756","27.915909","172.30.1.205","172.30.1.104","TCP","54","40962 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56757","27.915985","172.30.1.205","172.30.1.104","TCP","54","40918 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "56758","27.916073","172.30.1.104","172.30.1.205","TCP","54","49671 > 40922 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56759","27.916134","172.30.1.104","172.30.1.205","TCP","54","49671 > 40926 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56760","27.916146","172.30.1.104","172.30.1.205","TCP","54","49671 > 40922 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56761","27.916154","172.30.1.205","172.30.1.104","TCP","54","40922 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56762","27.916162","172.30.1.104","172.30.1.205","TCP","54","49671 > 40930 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56763","27.916192","172.30.1.104","172.30.1.205","TCP","54","49671 > 40934 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56764","27.916219","172.30.1.104","172.30.1.205","TCP","54","49671 > 40938 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56765","27.916245","172.30.1.104","172.30.1.205","TCP","54","49671 > 40942 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56766","27.916272","172.30.1.104","172.30.1.205","TCP","54","49671 > 40938 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56767","27.916276","172.30.1.205","172.30.1.104","TCP","54","40938 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56768","27.916299","172.30.1.104","172.30.1.205","TCP","54","49671 > 40946 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56769","27.916327","172.30.1.104","172.30.1.205","TCP","54","49671 > 40950 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56770","27.916427","172.30.1.104","172.30.1.205","TCP","54","49671 > 40954 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56771","27.916445","172.30.1.104","172.30.1.205","TCP","54","49671 > 40934 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56772","27.916450","172.30.1.205","172.30.1.104","TCP","54","40934 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56773","27.916478","172.30.1.104","172.30.1.205","TCP","54","49671 > 40954 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56774","27.916482","172.30.1.205","172.30.1.104","TCP","54","40954 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56775","27.916513","172.30.1.104","172.30.1.205","TCP","54","49671 > 40950 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56776","27.916517","172.30.1.205","172.30.1.104","TCP","54","40950 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56777","27.916532","172.30.1.104","172.30.1.205","TCP","54","49671 > 40946 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56778","27.916535","172.30.1.205","172.30.1.104","TCP","54","40946 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56779","27.916550","172.30.1.104","172.30.1.205","TCP","54","49671 > 40942 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56780","27.916552","172.30.1.205","172.30.1.104","TCP","54","40942 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56781","27.916569","172.30.1.104","172.30.1.205","TCP","54","49671 > 40926 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56782","27.916571","172.30.1.205","172.30.1.104","TCP","54","40926 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56783","27.916587","172.30.1.104","172.30.1.205","TCP","54","49671 > 40930 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56784","27.916589","172.30.1.205","172.30.1.104","TCP","54","40930 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56785","27.916606","172.30.1.104","172.30.1.205","TCP","54","49671 > 40958 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56786","27.916799","172.30.1.104","172.30.1.205","TCP","54","49671 > 40962 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56787","27.916829","172.30.1.104","172.30.1.205","TCP","54","49671 > 40918 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56788","27.916850","172.30.1.104","172.30.1.205","TCP","54","49671 > 40958 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56789","27.916855","172.30.1.205","172.30.1.104","TCP","54","40958 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56790","27.916873","172.30.1.104","172.30.1.205","TCP","54","49671 > 40962 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56791","27.916876","172.30.1.205","172.30.1.104","TCP","54","40962 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56792","27.916897","172.30.1.104","172.30.1.205","TCP","54","49671 > 40918 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "56793","27.916900","172.30.1.205","172.30.1.104","TCP","54","40918 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "56794","27.917634","172.30.1.205","172.30.1.104","TCP","54","48328 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56795","27.917757","172.30.1.205","172.30.1.104","TCP","74","40966 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931144 TSecr=0 WS=128" "56796","27.917919","172.30.1.104","172.30.1.205","TCP","54","135 > 48328 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56797","27.917945","172.30.1.104","172.30.1.205","TCP","54","135 > 48328 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56798","27.917950","172.30.1.205","172.30.1.104","TCP","54","48328 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56799","27.918073","172.30.1.104","172.30.1.205","TCP","66","49671 > 40966 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56800","27.918081","172.30.1.205","172.30.1.104","TCP","54","40966 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56801","27.918442","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56802","27.918775","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56803","27.918783","172.30.1.205","172.30.1.104","TCP","54","40966 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56804","27.920669","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56805","27.921084","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56806","27.921094","172.30.1.205","172.30.1.104","TCP","54","40966 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56807","27.922552","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56808","27.926694","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56809","27.926706","172.30.1.205","172.30.1.104","TCP","54","40966 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56810","27.927734","172.30.1.205","172.30.1.104","TCP","74","48332 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931154 TSecr=0 WS=128" "56811","27.928083","172.30.1.104","172.30.1.205","TCP","66","135 > 48332 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56812","27.928096","172.30.1.205","172.30.1.104","TCP","54","48332 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56813","27.928459","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56814","27.928749","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56815","27.928759","172.30.1.205","172.30.1.104","TCP","54","48332 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56816","27.930974","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56817","27.931412","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56818","27.931419","172.30.1.205","172.30.1.104","TCP","54","48332 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56819","27.933277","172.30.1.205","172.30.1.104","TCP","54","48332 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56820","27.933410","172.30.1.205","172.30.1.104","TCP","74","40970 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931159 TSecr=0 WS=128" "56821","27.933548","172.30.1.104","172.30.1.205","TCP","54","135 > 48332 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56822","27.933601","172.30.1.104","172.30.1.205","TCP","54","135 > 48332 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56823","27.933609","172.30.1.205","172.30.1.104","TCP","54","48332 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56824","27.933698","172.30.1.104","172.30.1.205","TCP","66","49671 > 40970 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56825","27.933713","172.30.1.205","172.30.1.104","TCP","54","40970 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56826","27.934111","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56827","27.934452","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56828","27.934461","172.30.1.205","172.30.1.104","TCP","54","40970 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56829","27.936371","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56830","27.936749","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56831","27.936756","172.30.1.205","172.30.1.104","TCP","54","40970 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56832","27.938147","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56833","27.942195","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56834","27.942205","172.30.1.205","172.30.1.104","TCP","54","40970 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56835","27.943215","172.30.1.205","172.30.1.104","TCP","74","48336 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931169 TSecr=0 WS=128" "56836","27.943523","172.30.1.104","172.30.1.205","TCP","66","135 > 48336 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56837","27.943535","172.30.1.205","172.30.1.104","TCP","54","48336 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56838","27.943893","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56839","27.944215","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56840","27.944224","172.30.1.205","172.30.1.104","TCP","54","48336 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56841","27.946493","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56842","27.946902","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56843","27.946909","172.30.1.205","172.30.1.104","TCP","54","48336 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56844","27.948834","172.30.1.205","172.30.1.104","TCP","54","48336 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56845","27.948959","172.30.1.205","172.30.1.104","TCP","74","40974 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931175 TSecr=0 WS=128" "56846","27.949129","172.30.1.104","172.30.1.205","TCP","54","135 > 48336 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56847","27.949155","172.30.1.104","172.30.1.205","TCP","54","135 > 48336 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56848","27.949162","172.30.1.205","172.30.1.104","TCP","54","48336 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56849","27.949238","172.30.1.104","172.30.1.205","TCP","66","49671 > 40974 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56850","27.949253","172.30.1.205","172.30.1.104","TCP","54","40974 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56851","27.949649","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56852","27.949954","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56853","27.949966","172.30.1.205","172.30.1.104","TCP","54","40974 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56854","27.951866","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56855","27.952287","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56856","27.952293","172.30.1.205","172.30.1.104","TCP","54","40974 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56857","27.953681","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56858","27.957761","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56859","27.957772","172.30.1.205","172.30.1.104","TCP","54","40974 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56860","27.958771","172.30.1.205","172.30.1.104","TCP","74","48340 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931185 TSecr=0 WS=128" "56861","27.959063","172.30.1.104","172.30.1.205","TCP","66","135 > 48340 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56862","27.959076","172.30.1.205","172.30.1.104","TCP","54","48340 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56863","27.959435","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56864","27.959708","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56865","27.959717","172.30.1.205","172.30.1.104","TCP","54","48340 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56866","27.961938","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56867","27.962327","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56868","27.962333","172.30.1.205","172.30.1.104","TCP","54","48340 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56869","27.964179","172.30.1.205","172.30.1.104","TCP","54","48340 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56870","27.964291","172.30.1.205","172.30.1.104","TCP","74","40978 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931190 TSecr=0 WS=128" "56871","27.964472","172.30.1.104","172.30.1.205","TCP","54","135 > 48340 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56872","27.964507","172.30.1.104","172.30.1.205","TCP","54","135 > 48340 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56873","27.964514","172.30.1.205","172.30.1.104","TCP","54","48340 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56874","27.964590","172.30.1.104","172.30.1.205","TCP","66","49671 > 40978 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56875","27.964598","172.30.1.205","172.30.1.104","TCP","54","40978 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56876","27.964978","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56877","27.965359","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56878","27.965366","172.30.1.205","172.30.1.104","TCP","54","40978 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56879","27.967272","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56880","27.967674","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56881","27.967680","172.30.1.205","172.30.1.104","TCP","54","40978 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56882","27.969085","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56883","27.973241","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56884","27.973256","172.30.1.205","172.30.1.104","TCP","54","40978 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56885","27.974228","172.30.1.205","172.30.1.104","TCP","74","48344 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931200 TSecr=0 WS=128" "56886","27.974555","172.30.1.104","172.30.1.205","TCP","66","135 > 48344 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56887","27.974567","172.30.1.205","172.30.1.104","TCP","54","48344 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56888","27.974919","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56889","27.975608","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56890","27.975617","172.30.1.205","172.30.1.104","TCP","54","48344 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56891","27.977830","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56892","27.978321","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56893","27.978327","172.30.1.205","172.30.1.104","TCP","54","48344 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56894","27.980153","172.30.1.205","172.30.1.104","TCP","54","48344 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56895","27.980265","172.30.1.205","172.30.1.104","TCP","74","40982 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931206 TSecr=0 WS=128" "56896","27.980416","172.30.1.104","172.30.1.205","TCP","54","135 > 48344 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56897","27.980444","172.30.1.104","172.30.1.205","TCP","54","135 > 48344 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56898","27.980450","172.30.1.205","172.30.1.104","TCP","54","48344 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56899","27.980511","172.30.1.104","172.30.1.205","TCP","66","49671 > 40982 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56900","27.980518","172.30.1.205","172.30.1.104","TCP","54","40982 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56901","27.980889","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56902","27.981193","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56903","27.981202","172.30.1.205","172.30.1.104","TCP","54","40982 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56904","27.983061","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56905","27.983419","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56906","27.983425","172.30.1.205","172.30.1.104","TCP","54","40982 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56907","27.984764","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56908","27.989179","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56909","27.989188","172.30.1.205","172.30.1.104","TCP","54","40982 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56910","27.990142","172.30.1.205","172.30.1.104","TCP","74","48348 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931216 TSecr=0 WS=128" "56911","27.990433","172.30.1.104","172.30.1.205","TCP","66","135 > 48348 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56912","27.990444","172.30.1.205","172.30.1.104","TCP","54","48348 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56913","27.990794","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56914","27.991118","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56915","27.991128","172.30.1.205","172.30.1.104","TCP","54","48348 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56916","27.993344","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56917","27.993724","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56918","27.993731","172.30.1.205","172.30.1.104","TCP","54","48348 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56919","27.995556","172.30.1.205","172.30.1.104","TCP","54","48348 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56920","27.995671","172.30.1.205","172.30.1.104","TCP","74","40986 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931222 TSecr=0 WS=128" "56921","27.995859","172.30.1.104","172.30.1.205","TCP","54","135 > 48348 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56922","27.995868","172.30.1.104","172.30.1.205","TCP","54","135 > 48348 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56923","27.995874","172.30.1.205","172.30.1.104","TCP","54","48348 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56924","27.995975","172.30.1.104","172.30.1.205","TCP","66","49671 > 40986 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56925","27.995990","172.30.1.205","172.30.1.104","TCP","54","40986 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56926","27.996381","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56927","27.996740","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56928","27.996759","172.30.1.205","172.30.1.104","TCP","54","40986 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56929","27.998755","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56930","27.999122","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56931","27.999129","172.30.1.205","172.30.1.104","TCP","54","40986 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56932","28.000511","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56933","28.004599","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56934","28.004609","172.30.1.205","172.30.1.104","TCP","54","40986 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56935","28.005625","172.30.1.205","172.30.1.104","TCP","74","48352 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931232 TSecr=0 WS=128" "56936","28.005939","172.30.1.104","172.30.1.205","TCP","66","135 > 48352 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56937","28.005951","172.30.1.205","172.30.1.104","TCP","54","48352 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56938","28.006315","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56939","28.006604","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56940","28.006614","172.30.1.205","172.30.1.104","TCP","54","48352 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56941","28.008850","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56942","28.009239","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56943","28.009246","172.30.1.205","172.30.1.104","TCP","54","48352 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56944","28.011098","172.30.1.205","172.30.1.104","TCP","54","48352 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56945","28.011235","172.30.1.205","172.30.1.104","TCP","74","40990 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931237 TSecr=0 WS=128" "56946","28.011393","172.30.1.104","172.30.1.205","TCP","54","135 > 48352 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56947","28.011404","172.30.1.104","172.30.1.205","TCP","54","135 > 48352 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56948","28.011412","172.30.1.205","172.30.1.104","TCP","54","48352 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56949","28.011509","172.30.1.104","172.30.1.205","TCP","66","49671 > 40990 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56950","28.011518","172.30.1.205","172.30.1.104","TCP","54","40990 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56951","28.011876","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56952","28.012220","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56953","28.012233","172.30.1.205","172.30.1.104","TCP","54","40990 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56954","28.014236","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56955","28.014603","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56956","28.014608","172.30.1.205","172.30.1.104","TCP","54","40990 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56957","28.015986","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56958","28.020119","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56959","28.020129","172.30.1.205","172.30.1.104","TCP","54","40990 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56960","28.021172","172.30.1.205","172.30.1.104","TCP","74","48356 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931247 TSecr=0 WS=128" "56961","28.021500","172.30.1.104","172.30.1.205","TCP","66","135 > 48356 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56962","28.021514","172.30.1.205","172.30.1.104","TCP","54","48356 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56963","28.021878","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56964","28.022189","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56965","28.022198","172.30.1.205","172.30.1.104","TCP","54","48356 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56966","28.024413","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56967","28.024827","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56968","28.024834","172.30.1.205","172.30.1.104","TCP","54","48356 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56969","28.026667","172.30.1.205","172.30.1.104","TCP","54","48356 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56970","28.026784","172.30.1.205","172.30.1.104","TCP","74","40994 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931253 TSecr=0 WS=128" "56971","28.026945","172.30.1.104","172.30.1.205","TCP","54","135 > 48356 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56972","28.027006","172.30.1.104","172.30.1.205","TCP","54","135 > 48356 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56973","28.027013","172.30.1.205","172.30.1.104","TCP","54","48356 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56974","28.027111","172.30.1.104","172.30.1.205","TCP","66","49671 > 40994 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56975","28.027119","172.30.1.205","172.30.1.104","TCP","54","40994 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56976","28.027465","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "56977","28.028074","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56978","28.028085","172.30.1.205","172.30.1.104","TCP","54","40994 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56979","28.030012","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "56980","28.031368","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "56981","28.031374","172.30.1.205","172.30.1.104","TCP","54","40994 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "56982","28.032734","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "56983","28.036766","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "56984","28.036788","172.30.1.205","172.30.1.104","TCP","54","40994 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "56985","28.037800","172.30.1.205","172.30.1.104","TCP","74","48360 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931264 TSecr=0 WS=128" "56986","28.038106","172.30.1.104","172.30.1.205","TCP","66","135 > 48360 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "56987","28.038117","172.30.1.205","172.30.1.104","TCP","54","48360 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "56988","28.038475","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "56989","28.038775","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "56990","28.038785","172.30.1.205","172.30.1.104","TCP","54","48360 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "56991","28.041042","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "56992","28.041432","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "56993","28.041439","172.30.1.205","172.30.1.104","TCP","54","48360 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "56994","28.043266","172.30.1.205","172.30.1.104","TCP","54","48360 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "56995","28.043378","172.30.1.205","172.30.1.104","TCP","74","40998 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931269 TSecr=0 WS=128" "56996","28.043587","172.30.1.104","172.30.1.205","TCP","54","135 > 48360 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56997","28.043597","172.30.1.104","172.30.1.205","TCP","54","135 > 48360 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "56998","28.043604","172.30.1.205","172.30.1.104","TCP","54","48360 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "56999","28.043686","172.30.1.104","172.30.1.205","TCP","66","49671 > 40998 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57000","28.043695","172.30.1.205","172.30.1.104","TCP","54","40998 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57001","28.044037","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57002","28.044310","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57003","28.044319","172.30.1.205","172.30.1.104","TCP","54","40998 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57004","28.046215","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57005","28.046558","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57006","28.046562","172.30.1.205","172.30.1.104","TCP","54","40998 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57007","28.047909","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57008","28.051905","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57009","28.051917","172.30.1.205","172.30.1.104","TCP","54","40998 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57010","28.052912","172.30.1.205","172.30.1.104","TCP","74","48364 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931279 TSecr=0 WS=128" "57011","28.053235","172.30.1.104","172.30.1.205","TCP","66","135 > 48364 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57012","28.053245","172.30.1.205","172.30.1.104","TCP","54","48364 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57013","28.053599","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57014","28.053898","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57015","28.053907","172.30.1.205","172.30.1.104","TCP","54","48364 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57016","28.056111","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57017","28.056491","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57018","28.056498","172.30.1.205","172.30.1.104","TCP","54","48364 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57019","28.058330","172.30.1.205","172.30.1.104","TCP","54","48364 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57020","28.058441","172.30.1.205","172.30.1.104","TCP","74","41002 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931284 TSecr=0 WS=128" "57021","28.058584","172.30.1.104","172.30.1.205","TCP","54","135 > 48364 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57022","28.058596","172.30.1.104","172.30.1.205","TCP","54","135 > 48364 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57023","28.058601","172.30.1.205","172.30.1.104","TCP","54","48364 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57024","28.058712","172.30.1.104","172.30.1.205","TCP","66","49671 > 41002 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57025","28.058720","172.30.1.205","172.30.1.104","TCP","54","41002 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57026","28.059064","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57027","28.059342","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57028","28.059351","172.30.1.205","172.30.1.104","TCP","54","41002 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57029","28.061250","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57030","28.061755","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57031","28.061761","172.30.1.205","172.30.1.104","TCP","54","41002 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57032","28.063106","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57033","28.067119","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57034","28.067131","172.30.1.205","172.30.1.104","TCP","54","41002 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57035","28.068117","172.30.1.205","172.30.1.104","TCP","74","48368 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931294 TSecr=0 WS=128" "57036","28.068498","172.30.1.104","172.30.1.205","TCP","66","135 > 48368 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57037","28.068509","172.30.1.205","172.30.1.104","TCP","54","48368 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57038","28.068901","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57039","28.069234","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57040","28.069243","172.30.1.205","172.30.1.104","TCP","54","48368 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57041","28.071451","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57042","28.071836","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57043","28.071849","172.30.1.205","172.30.1.104","TCP","54","48368 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57044","28.073681","172.30.1.205","172.30.1.104","TCP","54","48368 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57045","28.073792","172.30.1.205","172.30.1.104","TCP","74","41006 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931300 TSecr=0 WS=128" "57046","28.073940","172.30.1.104","172.30.1.205","TCP","54","135 > 48368 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57047","28.073974","172.30.1.104","172.30.1.205","TCP","54","135 > 48368 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57048","28.073980","172.30.1.205","172.30.1.104","TCP","54","48368 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57049","28.074060","172.30.1.104","172.30.1.205","TCP","66","49671 > 41006 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57050","28.074068","172.30.1.205","172.30.1.104","TCP","54","41006 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57051","28.074422","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57052","28.075617","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57053","28.075626","172.30.1.205","172.30.1.104","TCP","54","41006 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57054","28.077550","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57055","28.078920","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57056","28.078929","172.30.1.205","172.30.1.104","TCP","54","41006 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57057","28.080453","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57058","28.084523","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57059","28.084535","172.30.1.205","172.30.1.104","TCP","54","41006 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57060","28.085562","172.30.1.205","172.30.1.104","TCP","74","48372 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931311 TSecr=0 WS=128" "57061","28.085901","172.30.1.104","172.30.1.205","TCP","66","135 > 48372 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57062","28.085913","172.30.1.205","172.30.1.104","TCP","54","48372 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57063","28.086285","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57064","28.086573","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57065","28.086584","172.30.1.205","172.30.1.104","TCP","54","48372 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57066","28.088817","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57067","28.089294","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57068","28.089300","172.30.1.205","172.30.1.104","TCP","54","48372 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57069","28.091127","172.30.1.205","172.30.1.104","TCP","54","48372 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57070","28.091242","172.30.1.205","172.30.1.104","TCP","74","41010 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931317 TSecr=0 WS=128" "57071","28.091431","172.30.1.104","172.30.1.205","TCP","54","135 > 48372 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57072","28.091461","172.30.1.104","172.30.1.205","TCP","54","135 > 48372 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57073","28.091467","172.30.1.205","172.30.1.104","TCP","54","48372 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57074","28.091563","172.30.1.104","172.30.1.205","TCP","66","49671 > 41010 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57075","28.091572","172.30.1.205","172.30.1.104","TCP","54","41010 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57076","28.091920","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57077","28.092207","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57078","28.092214","172.30.1.205","172.30.1.104","TCP","54","41010 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57079","28.094119","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57080","28.094486","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57081","28.094492","172.30.1.205","172.30.1.104","TCP","54","41010 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57082","28.095848","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57083","28.099995","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57084","28.100006","172.30.1.205","172.30.1.104","TCP","54","41010 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57085","28.100992","172.30.1.205","172.30.1.104","TCP","74","48376 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931327 TSecr=0 WS=128" "57086","28.101323","172.30.1.104","172.30.1.205","TCP","66","135 > 48376 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57087","28.101334","172.30.1.205","172.30.1.104","TCP","54","48376 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57088","28.101699","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57089","28.102005","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57090","28.102014","172.30.1.205","172.30.1.104","TCP","54","48376 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57091","28.104206","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57092","28.104648","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57093","28.104655","172.30.1.205","172.30.1.104","TCP","54","48376 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57094","28.105528","172.30.1.205","172.30.1.104","TCP","54","40970 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57095","28.105577","172.30.1.205","172.30.1.104","TCP","54","40974 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57096","28.105614","172.30.1.205","172.30.1.104","TCP","54","40978 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57097","28.105647","172.30.1.205","172.30.1.104","TCP","54","40982 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57098","28.105681","172.30.1.205","172.30.1.104","TCP","54","40986 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57099","28.105709","172.30.1.205","172.30.1.104","TCP","54","40990 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57100","28.105742","172.30.1.205","172.30.1.104","TCP","54","40994 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57101","28.105775","172.30.1.205","172.30.1.104","TCP","54","40998 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57102","28.105797","172.30.1.205","172.30.1.104","TCP","54","41002 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57103","28.105813","172.30.1.104","172.30.1.205","TCP","54","49671 > 40970 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57104","28.105828","172.30.1.104","172.30.1.205","TCP","54","49671 > 40974 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57105","28.105852","172.30.1.205","172.30.1.104","TCP","54","41006 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57106","28.105881","172.30.1.205","172.30.1.104","TCP","54","41010 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57107","28.105945","172.30.1.104","172.30.1.205","TCP","54","49671 > 40978 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57108","28.105964","172.30.1.104","172.30.1.205","TCP","54","49671 > 40970 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57109","28.105970","172.30.1.205","172.30.1.104","TCP","54","40970 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57110","28.105984","172.30.1.104","172.30.1.205","TCP","54","49671 > 40974 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57111","28.105987","172.30.1.205","172.30.1.104","TCP","54","40974 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57112","28.105993","172.30.1.205","172.30.1.104","TCP","54","40966 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57113","28.106006","172.30.1.104","172.30.1.205","TCP","54","49671 > 40982 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57114","28.106025","172.30.1.104","172.30.1.205","TCP","54","49671 > 40986 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57115","28.106044","172.30.1.104","172.30.1.205","TCP","54","49671 > 40990 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57116","28.106160","172.30.1.104","172.30.1.205","TCP","54","49671 > 40994 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57117","28.106179","172.30.1.104","172.30.1.205","TCP","54","49671 > 40990 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57118","28.106184","172.30.1.205","172.30.1.104","TCP","54","40990 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57119","28.106199","172.30.1.104","172.30.1.205","TCP","54","49671 > 40986 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57120","28.106202","172.30.1.205","172.30.1.104","TCP","54","40986 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57121","28.106248","172.30.1.104","172.30.1.205","TCP","54","49671 > 40994 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57122","28.106251","172.30.1.205","172.30.1.104","TCP","54","40994 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57123","28.106266","172.30.1.104","172.30.1.205","TCP","54","49671 > 40978 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57124","28.106269","172.30.1.205","172.30.1.104","TCP","54","40978 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57125","28.106287","172.30.1.104","172.30.1.205","TCP","54","49671 > 40998 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57126","28.106307","172.30.1.104","172.30.1.205","TCP","54","49671 > 41002 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57127","28.106326","172.30.1.104","172.30.1.205","TCP","54","49671 > 41006 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57128","28.106412","172.30.1.104","172.30.1.205","TCP","54","49671 > 41002 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57129","28.106417","172.30.1.205","172.30.1.104","TCP","54","41002 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57130","28.106446","172.30.1.104","172.30.1.205","TCP","54","49671 > 41010 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57131","28.106467","172.30.1.104","172.30.1.205","TCP","54","49671 > 41010 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57132","28.106471","172.30.1.205","172.30.1.104","TCP","54","41010 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57133","28.106486","172.30.1.104","172.30.1.205","TCP","54","49671 > 41006 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57134","28.106489","172.30.1.205","172.30.1.104","TCP","54","41006 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57135","28.106506","172.30.1.104","172.30.1.205","TCP","54","49671 > 40982 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57136","28.106509","172.30.1.205","172.30.1.104","TCP","54","40982 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57137","28.106525","172.30.1.104","172.30.1.205","TCP","54","49671 > 40998 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57138","28.106528","172.30.1.205","172.30.1.104","TCP","54","40998 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57139","28.106547","172.30.1.104","172.30.1.205","TCP","54","49671 > 40966 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57140","28.106671","172.30.1.104","172.30.1.205","TCP","54","49671 > 40966 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57141","28.106675","172.30.1.205","172.30.1.104","TCP","54","40966 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57142","28.107510","172.30.1.205","172.30.1.104","TCP","54","48376 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57143","28.107642","172.30.1.205","172.30.1.104","TCP","74","41014 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931334 TSecr=0 WS=128" "57144","28.107798","172.30.1.104","172.30.1.205","TCP","54","135 > 48376 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57145","28.107839","172.30.1.104","172.30.1.205","TCP","54","135 > 48376 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57146","28.107845","172.30.1.205","172.30.1.104","TCP","54","48376 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57147","28.107969","172.30.1.104","172.30.1.205","TCP","66","49671 > 41014 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57148","28.107977","172.30.1.205","172.30.1.104","TCP","54","41014 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57149","28.108332","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57150","28.108617","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57151","28.108626","172.30.1.205","172.30.1.104","TCP","54","41014 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57152","28.110539","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57153","28.110923","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57154","28.110929","172.30.1.205","172.30.1.104","TCP","54","41014 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57155","28.112291","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57156","28.117208","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57157","28.117218","172.30.1.205","172.30.1.104","TCP","54","41014 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57158","28.118203","172.30.1.205","172.30.1.104","TCP","74","48380 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931344 TSecr=0 WS=128" "57159","28.118542","172.30.1.104","172.30.1.205","TCP","66","135 > 48380 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57160","28.118554","172.30.1.205","172.30.1.104","TCP","54","48380 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57161","28.118915","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57162","28.119225","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57163","28.119234","172.30.1.205","172.30.1.104","TCP","54","48380 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57164","28.121453","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57165","28.121851","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57166","28.121858","172.30.1.205","172.30.1.104","TCP","54","48380 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57167","28.123685","172.30.1.205","172.30.1.104","TCP","54","48380 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57168","28.123798","172.30.1.205","172.30.1.104","TCP","74","41018 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931350 TSecr=0 WS=128" "57169","28.123966","172.30.1.104","172.30.1.205","TCP","54","135 > 48380 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57170","28.123975","172.30.1.104","172.30.1.205","TCP","54","135 > 48380 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57171","28.123982","172.30.1.205","172.30.1.104","TCP","54","48380 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57172","28.124083","172.30.1.104","172.30.1.205","TCP","66","49671 > 41018 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57173","28.124092","172.30.1.205","172.30.1.104","TCP","54","41018 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57174","28.124438","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57175","28.124754","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57176","28.124762","172.30.1.205","172.30.1.104","TCP","54","41018 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57177","28.126669","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57178","28.127067","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57179","28.127074","172.30.1.205","172.30.1.104","TCP","54","41018 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57180","28.128429","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57181","28.132592","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57182","28.132604","172.30.1.205","172.30.1.104","TCP","54","41018 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57183","28.133609","172.30.1.205","172.30.1.104","TCP","74","48384 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931360 TSecr=0 WS=128" "57184","28.133922","172.30.1.104","172.30.1.205","TCP","66","135 > 48384 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57185","28.133933","172.30.1.205","172.30.1.104","TCP","54","48384 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57186","28.134291","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57187","28.134570","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57188","28.134579","172.30.1.205","172.30.1.104","TCP","54","48384 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57189","28.136826","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57190","28.137245","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57191","28.137252","172.30.1.205","172.30.1.104","TCP","54","48384 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57192","28.139068","172.30.1.205","172.30.1.104","TCP","54","48384 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57193","28.139182","172.30.1.205","172.30.1.104","TCP","74","41022 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931365 TSecr=0 WS=128" "57194","28.139392","172.30.1.104","172.30.1.205","TCP","54","135 > 48384 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57195","28.139423","172.30.1.104","172.30.1.205","TCP","54","135 > 48384 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57196","28.139429","172.30.1.205","172.30.1.104","TCP","54","48384 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57197","28.139456","172.30.1.104","172.30.1.205","TCP","66","49671 > 41022 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57198","28.139465","172.30.1.205","172.30.1.104","TCP","54","41022 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57199","28.139816","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57200","28.140146","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57201","28.140155","172.30.1.205","172.30.1.104","TCP","54","41022 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57202","28.142078","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57203","28.142481","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57204","28.142488","172.30.1.205","172.30.1.104","TCP","54","41022 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57205","28.143849","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57206","28.148785","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57207","28.148798","172.30.1.205","172.30.1.104","TCP","54","41022 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57208","28.149778","172.30.1.205","172.30.1.104","TCP","74","48388 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931376 TSecr=0 WS=128" "57209","28.150109","172.30.1.104","172.30.1.205","TCP","66","135 > 48388 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57210","28.150120","172.30.1.205","172.30.1.104","TCP","54","48388 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57211","28.150478","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57212","28.150790","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57213","28.150799","172.30.1.205","172.30.1.104","TCP","54","48388 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57214","28.153026","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57215","28.153482","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57216","28.153489","172.30.1.205","172.30.1.104","TCP","54","48388 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57217","28.155326","172.30.1.205","172.30.1.104","TCP","54","48388 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57218","28.155438","172.30.1.205","172.30.1.104","TCP","74","41026 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931381 TSecr=0 WS=128" "57219","28.155643","172.30.1.104","172.30.1.205","TCP","54","135 > 48388 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57220","28.155650","172.30.1.104","172.30.1.205","TCP","54","135 > 48388 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57221","28.155655","172.30.1.205","172.30.1.104","TCP","54","48388 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57222","28.155774","172.30.1.104","172.30.1.205","TCP","66","49671 > 41026 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57223","28.155783","172.30.1.205","172.30.1.104","TCP","54","41026 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57224","28.156131","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57225","28.156434","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57226","28.156443","172.30.1.205","172.30.1.104","TCP","54","41026 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57227","28.158352","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57228","28.158745","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57229","28.158751","172.30.1.205","172.30.1.104","TCP","54","41026 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57230","28.160111","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57231","28.164345","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57232","28.164355","172.30.1.205","172.30.1.104","TCP","54","41026 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57233","28.165340","172.30.1.205","172.30.1.104","TCP","74","48392 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931391 TSecr=0 WS=128" "57234","28.165668","172.30.1.104","172.30.1.205","TCP","66","135 > 48392 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57235","28.165683","172.30.1.205","172.30.1.104","TCP","54","48392 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57236","28.166042","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57237","28.166359","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57238","28.166369","172.30.1.205","172.30.1.104","TCP","54","48392 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57239","28.168567","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57240","28.168991","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57241","28.168998","172.30.1.205","172.30.1.104","TCP","54","48392 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57242","28.170810","172.30.1.205","172.30.1.104","TCP","54","48392 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57243","28.170922","172.30.1.205","172.30.1.104","TCP","74","41030 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931397 TSecr=0 WS=128" "57244","28.171113","172.30.1.104","172.30.1.205","TCP","54","135 > 48392 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57245","28.171144","172.30.1.104","172.30.1.205","TCP","54","135 > 48392 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57246","28.171150","172.30.1.205","172.30.1.104","TCP","54","48392 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57247","28.171178","172.30.1.104","172.30.1.205","TCP","66","49671 > 41030 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57248","28.171186","172.30.1.205","172.30.1.104","TCP","54","41030 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57249","28.171535","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57250","28.171877","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57251","28.171884","172.30.1.205","172.30.1.104","TCP","54","41030 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57252","28.173796","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57253","28.174214","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57254","28.174221","172.30.1.205","172.30.1.104","TCP","54","41030 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57255","28.175572","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57256","28.179661","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57257","28.179672","172.30.1.205","172.30.1.104","TCP","54","41030 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57258","28.180633","172.30.1.205","172.30.1.104","TCP","74","48396 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931407 TSecr=0 WS=128" "57259","28.180940","172.30.1.104","172.30.1.205","TCP","66","135 > 48396 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57260","28.180951","172.30.1.205","172.30.1.104","TCP","54","48396 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57261","28.181310","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57262","28.181596","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57263","28.181605","172.30.1.205","172.30.1.104","TCP","54","48396 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57264","28.183809","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57265","28.184266","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57266","28.184273","172.30.1.205","172.30.1.104","TCP","54","48396 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57267","28.186136","172.30.1.205","172.30.1.104","TCP","54","48396 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57268","28.186252","172.30.1.205","172.30.1.104","TCP","74","41034 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931412 TSecr=0 WS=128" "57269","28.186394","172.30.1.104","172.30.1.205","TCP","54","135 > 48396 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57270","28.186409","172.30.1.104","172.30.1.205","TCP","54","135 > 48396 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57271","28.186415","172.30.1.205","172.30.1.104","TCP","54","48396 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57272","28.186499","172.30.1.104","172.30.1.205","TCP","66","49671 > 41034 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57273","28.186507","172.30.1.205","172.30.1.104","TCP","54","41034 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57274","28.186855","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57275","28.187174","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57276","28.187189","172.30.1.205","172.30.1.104","TCP","54","41034 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57277","28.189182","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57278","28.189546","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57279","28.189559","172.30.1.205","172.30.1.104","TCP","54","41034 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57280","28.191091","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57281","28.195191","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57282","28.195201","172.30.1.205","172.30.1.104","TCP","54","41034 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57283","28.196170","172.30.1.205","172.30.1.104","TCP","74","48400 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931422 TSecr=0 WS=128" "57284","28.196481","172.30.1.104","172.30.1.205","TCP","66","135 > 48400 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57285","28.196492","172.30.1.205","172.30.1.104","TCP","54","48400 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57286","28.196866","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57287","28.197152","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57288","28.197163","172.30.1.205","172.30.1.104","TCP","54","48400 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57289","28.199360","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57290","28.199743","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57291","28.199749","172.30.1.205","172.30.1.104","TCP","54","48400 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57292","28.201573","172.30.1.205","172.30.1.104","TCP","54","48400 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57293","28.201685","172.30.1.205","172.30.1.104","TCP","74","41038 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931428 TSecr=0 WS=128" "57294","28.201841","172.30.1.104","172.30.1.205","TCP","54","135 > 48400 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57295","28.201871","172.30.1.104","172.30.1.205","TCP","54","135 > 48400 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57296","28.201876","172.30.1.205","172.30.1.104","TCP","54","48400 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57297","28.201972","172.30.1.104","172.30.1.205","TCP","66","49671 > 41038 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57298","28.201980","172.30.1.205","172.30.1.104","TCP","54","41038 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57299","28.202330","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57300","28.202593","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57301","28.202600","172.30.1.205","172.30.1.104","TCP","54","41038 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57302","28.204459","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57303","28.204808","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57304","28.204815","172.30.1.205","172.30.1.104","TCP","54","41038 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57305","28.206192","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57306","28.210293","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57307","28.210303","172.30.1.205","172.30.1.104","TCP","54","41038 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57308","28.211239","172.30.1.205","172.30.1.104","TCP","74","48404 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931437 TSecr=0 WS=128" "57309","28.211548","172.30.1.104","172.30.1.205","TCP","66","135 > 48404 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57310","28.211558","172.30.1.205","172.30.1.104","TCP","54","48404 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57311","28.211902","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57312","28.212200","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57313","28.212209","172.30.1.205","172.30.1.104","TCP","54","48404 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57314","28.214424","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57315","28.214784","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57316","28.214791","172.30.1.205","172.30.1.104","TCP","54","48404 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57317","28.216594","172.30.1.205","172.30.1.104","TCP","54","48404 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57318","28.216709","172.30.1.205","172.30.1.104","TCP","74","41042 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931443 TSecr=0 WS=128" "57319","28.216863","172.30.1.104","172.30.1.205","TCP","54","135 > 48404 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57320","28.216899","172.30.1.104","172.30.1.205","TCP","54","135 > 48404 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57321","28.216905","172.30.1.205","172.30.1.104","TCP","54","48404 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57322","28.216987","172.30.1.104","172.30.1.205","TCP","66","49671 > 41042 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57323","28.216995","172.30.1.205","172.30.1.104","TCP","54","41042 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57324","28.217362","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57325","28.217693","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57326","28.217702","172.30.1.205","172.30.1.104","TCP","54","41042 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57327","28.219561","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57328","28.219908","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57329","28.219914","172.30.1.205","172.30.1.104","TCP","54","41042 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57330","28.221305","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57331","28.225361","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57332","28.225371","172.30.1.205","172.30.1.104","TCP","54","41042 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57333","28.226321","172.30.1.205","172.30.1.104","TCP","74","48408 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931452 TSecr=0 WS=128" "57334","28.226643","172.30.1.104","172.30.1.205","TCP","66","135 > 48408 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57335","28.226654","172.30.1.205","172.30.1.104","TCP","54","48408 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57336","28.227003","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57337","28.227271","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57338","28.227280","172.30.1.205","172.30.1.104","TCP","54","48408 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57339","28.229472","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57340","28.229869","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57341","28.229875","172.30.1.205","172.30.1.104","TCP","54","48408 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57342","28.231677","172.30.1.205","172.30.1.104","TCP","54","48408 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57343","28.231786","172.30.1.205","172.30.1.104","TCP","74","41046 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931458 TSecr=0 WS=128" "57344","28.231954","172.30.1.104","172.30.1.205","TCP","54","135 > 48408 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57345","28.231962","172.30.1.104","172.30.1.205","TCP","54","135 > 48408 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57346","28.231968","172.30.1.205","172.30.1.104","TCP","54","48408 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57347","28.232054","172.30.1.104","172.30.1.205","TCP","66","49671 > 41046 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57348","28.232062","172.30.1.205","172.30.1.104","TCP","54","41046 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57349","28.232405","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57350","28.233178","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57351","28.233186","172.30.1.205","172.30.1.104","TCP","54","41046 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57352","28.235046","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57353","28.235412","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57354","28.235418","172.30.1.205","172.30.1.104","TCP","54","41046 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57355","28.236751","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57356","28.240883","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57357","28.240893","172.30.1.205","172.30.1.104","TCP","54","41046 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57358","28.241827","172.30.1.205","172.30.1.104","TCP","74","48412 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931468 TSecr=0 WS=128" "57359","28.242146","172.30.1.104","172.30.1.205","TCP","66","135 > 48412 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57360","28.242157","172.30.1.205","172.30.1.104","TCP","54","48412 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57361","28.242510","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57362","28.242808","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57363","28.242817","172.30.1.205","172.30.1.104","TCP","54","48412 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57364","28.245120","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57365","28.245531","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57366","28.245538","172.30.1.205","172.30.1.104","TCP","54","48412 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57367","28.247372","172.30.1.205","172.30.1.104","TCP","54","48412 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57368","28.247482","172.30.1.205","172.30.1.104","TCP","74","41050 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931473 TSecr=0 WS=128" "57369","28.247664","172.30.1.104","172.30.1.205","TCP","54","135 > 48412 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57370","28.247688","172.30.1.104","172.30.1.205","TCP","54","135 > 48412 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57371","28.247693","172.30.1.205","172.30.1.104","TCP","54","48412 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57372","28.247825","172.30.1.104","172.30.1.205","TCP","66","49671 > 41050 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57373","28.247833","172.30.1.205","172.30.1.104","TCP","54","41050 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57374","28.248177","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57375","28.248475","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57376","28.248483","172.30.1.205","172.30.1.104","TCP","54","41050 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57377","28.250363","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57378","28.250722","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57379","28.250729","172.30.1.205","172.30.1.104","TCP","54","41050 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57380","28.252056","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57381","28.256521","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57382","28.256530","172.30.1.205","172.30.1.104","TCP","54","41050 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57383","28.257486","172.30.1.205","172.30.1.104","TCP","74","48416 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931483 TSecr=0 WS=128" "57384","28.257806","172.30.1.104","172.30.1.205","TCP","66","135 > 48416 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57385","28.257818","172.30.1.205","172.30.1.104","TCP","54","48416 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57386","28.258184","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57387","28.258489","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57388","28.258498","172.30.1.205","172.30.1.104","TCP","54","48416 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57389","28.260681","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57390","28.261051","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57391","28.261057","172.30.1.205","172.30.1.104","TCP","54","48416 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57392","28.262851","172.30.1.205","172.30.1.104","TCP","54","48416 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57393","28.262961","172.30.1.205","172.30.1.104","TCP","74","41054 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931489 TSecr=0 WS=128" "57394","28.263129","172.30.1.104","172.30.1.205","TCP","54","135 > 48416 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57395","28.263158","172.30.1.104","172.30.1.205","TCP","54","135 > 48416 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57396","28.263163","172.30.1.205","172.30.1.104","TCP","54","48416 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57397","28.263240","172.30.1.104","172.30.1.205","TCP","66","49671 > 41054 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57398","28.263250","172.30.1.205","172.30.1.104","TCP","54","41054 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57399","28.263602","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57400","28.263862","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57401","28.263871","172.30.1.205","172.30.1.104","TCP","54","41054 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57402","28.265770","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57403","28.266141","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57404","28.266147","172.30.1.205","172.30.1.104","TCP","54","41054 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57405","28.267491","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57406","28.271564","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57407","28.271574","172.30.1.205","172.30.1.104","TCP","54","41054 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57408","28.272509","172.30.1.205","172.30.1.104","TCP","74","48420 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931498 TSecr=0 WS=128" "57409","28.272841","172.30.1.104","172.30.1.205","TCP","66","135 > 48420 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57410","28.272852","172.30.1.205","172.30.1.104","TCP","54","48420 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57411","28.273206","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57412","28.273479","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57413","28.273488","172.30.1.205","172.30.1.104","TCP","54","48420 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57414","28.275681","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57415","28.276060","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57416","28.276067","172.30.1.205","172.30.1.104","TCP","54","48420 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57417","28.277893","172.30.1.205","172.30.1.104","TCP","54","48420 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57418","28.278002","172.30.1.205","172.30.1.104","TCP","74","41058 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931504 TSecr=0 WS=128" "57419","28.278159","172.30.1.104","172.30.1.205","TCP","54","135 > 48420 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57420","28.278173","172.30.1.104","172.30.1.205","TCP","54","135 > 48420 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57421","28.278178","172.30.1.205","172.30.1.104","TCP","54","48420 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57422","28.278340","172.30.1.104","172.30.1.205","TCP","66","49671 > 41058 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57423","28.278348","172.30.1.205","172.30.1.104","TCP","54","41058 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57424","28.278692","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57425","28.279002","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57426","28.279010","172.30.1.205","172.30.1.104","TCP","54","41058 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57427","28.280907","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57428","28.281275","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57429","28.281281","172.30.1.205","172.30.1.104","TCP","54","41058 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57430","28.282617","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57431","28.286637","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57432","28.286646","172.30.1.205","172.30.1.104","TCP","54","41058 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57433","28.287601","172.30.1.205","172.30.1.104","TCP","74","48424 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931514 TSecr=0 WS=128" "57434","28.287905","172.30.1.104","172.30.1.205","TCP","66","135 > 48424 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57435","28.287916","172.30.1.205","172.30.1.104","TCP","54","48424 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57436","28.288273","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57437","28.288660","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57438","28.288668","172.30.1.205","172.30.1.104","TCP","54","48424 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57439","28.290865","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57440","28.291302","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57441","28.291309","172.30.1.205","172.30.1.104","TCP","54","48424 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57442","28.292157","172.30.1.205","172.30.1.104","TCP","54","41014 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57443","28.292207","172.30.1.205","172.30.1.104","TCP","54","41018 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57444","28.292239","172.30.1.205","172.30.1.104","TCP","54","41022 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57445","28.292263","172.30.1.205","172.30.1.104","TCP","54","41026 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57446","28.292289","172.30.1.205","172.30.1.104","TCP","54","41030 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57447","28.292311","172.30.1.205","172.30.1.104","TCP","54","41034 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57448","28.292339","172.30.1.205","172.30.1.104","TCP","54","41038 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57449","28.292361","172.30.1.205","172.30.1.104","TCP","54","41042 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57450","28.292383","172.30.1.205","172.30.1.104","TCP","54","41046 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57451","28.292409","172.30.1.205","172.30.1.104","TCP","54","41050 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57452","28.292434","172.30.1.205","172.30.1.104","TCP","54","41054 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57453","28.292456","172.30.1.205","172.30.1.104","TCP","54","41058 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57454","28.292596","172.30.1.104","172.30.1.205","TCP","54","49671 > 41014 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57455","28.292621","172.30.1.104","172.30.1.205","TCP","54","49671 > 41018 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57456","28.292764","172.30.1.104","172.30.1.205","TCP","54","49671 > 41022 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57457","28.292802","172.30.1.104","172.30.1.205","TCP","54","49671 > 41026 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57458","28.292836","172.30.1.104","172.30.1.205","TCP","54","49671 > 41030 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57459","28.292863","172.30.1.104","172.30.1.205","TCP","54","49671 > 41034 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57460","28.292891","172.30.1.104","172.30.1.205","TCP","54","49671 > 41038 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57461","28.292927","172.30.1.104","172.30.1.205","TCP","54","49671 > 41014 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57462","28.292935","172.30.1.205","172.30.1.104","TCP","54","41014 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57463","28.292972","172.30.1.104","172.30.1.205","TCP","54","49671 > 41042 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57464","28.293009","172.30.1.104","172.30.1.205","TCP","54","49671 > 41046 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57465","28.293045","172.30.1.104","172.30.1.205","TCP","54","49671 > 41046 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57466","28.293049","172.30.1.205","172.30.1.104","TCP","54","41046 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57467","28.293080","172.30.1.104","172.30.1.205","TCP","54","49671 > 41042 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57468","28.293083","172.30.1.205","172.30.1.104","TCP","54","41042 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57469","28.293110","172.30.1.104","172.30.1.205","TCP","54","49671 > 41038 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57470","28.293113","172.30.1.205","172.30.1.104","TCP","54","41038 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57471","28.293151","172.30.1.104","172.30.1.205","TCP","54","49671 > 41034 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57472","28.293154","172.30.1.205","172.30.1.104","TCP","54","41034 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57473","28.293176","172.30.1.104","172.30.1.205","TCP","54","49671 > 41030 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57474","28.293179","172.30.1.205","172.30.1.104","TCP","54","41030 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57475","28.293200","172.30.1.104","172.30.1.205","TCP","54","49671 > 41018 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57476","28.293204","172.30.1.205","172.30.1.104","TCP","54","41018 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57477","28.293227","172.30.1.104","172.30.1.205","TCP","54","49671 > 41026 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57478","28.293230","172.30.1.205","172.30.1.104","TCP","54","41026 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57479","28.293261","172.30.1.104","172.30.1.205","TCP","54","49671 > 41022 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57480","28.293264","172.30.1.205","172.30.1.104","TCP","54","41022 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57481","28.293287","172.30.1.104","172.30.1.205","TCP","54","49671 > 41050 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57482","28.293317","172.30.1.104","172.30.1.205","TCP","54","49671 > 41054 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57483","28.293342","172.30.1.104","172.30.1.205","TCP","54","49671 > 41050 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57484","28.293346","172.30.1.205","172.30.1.104","TCP","54","41050 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57485","28.293369","172.30.1.104","172.30.1.205","TCP","54","49671 > 41058 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57486","28.293397","172.30.1.104","172.30.1.205","TCP","54","49671 > 41054 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57487","28.293401","172.30.1.205","172.30.1.104","TCP","54","41054 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57488","28.293425","172.30.1.104","172.30.1.205","TCP","54","49671 > 41058 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57489","28.293428","172.30.1.205","172.30.1.104","TCP","54","41058 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57490","28.294116","172.30.1.205","172.30.1.104","TCP","54","48424 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57491","28.294226","172.30.1.205","172.30.1.104","TCP","74","41062 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931520 TSecr=0 WS=128" "57492","28.294468","172.30.1.104","172.30.1.205","TCP","54","135 > 48424 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57493","28.294491","172.30.1.104","172.30.1.205","TCP","54","135 > 48424 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57494","28.294496","172.30.1.205","172.30.1.104","TCP","54","48424 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57495","28.294521","172.30.1.104","172.30.1.205","TCP","66","49671 > 41062 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57496","28.294528","172.30.1.205","172.30.1.104","TCP","54","41062 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57497","28.294895","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57498","28.295234","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57499","28.295243","172.30.1.205","172.30.1.104","TCP","54","41062 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57500","28.297143","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57501","28.297529","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57502","28.297535","172.30.1.205","172.30.1.104","TCP","54","41062 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57503","28.298882","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57504","28.303054","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57505","28.303064","172.30.1.205","172.30.1.104","TCP","54","41062 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57506","28.304007","172.30.1.205","172.30.1.104","TCP","74","48428 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931530 TSecr=0 WS=128" "57507","28.304403","172.30.1.104","172.30.1.205","TCP","66","135 > 48428 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57508","28.304414","172.30.1.205","172.30.1.104","TCP","54","48428 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57509","28.304765","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57510","28.305066","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57511","28.305075","172.30.1.205","172.30.1.104","TCP","54","48428 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57512","28.307247","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57513","28.307714","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57514","28.307720","172.30.1.205","172.30.1.104","TCP","54","48428 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57515","28.309540","172.30.1.205","172.30.1.104","TCP","54","48428 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57516","28.309649","172.30.1.205","172.30.1.104","TCP","74","41066 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931536 TSecr=0 WS=128" "57517","28.309866","172.30.1.104","172.30.1.205","TCP","54","135 > 48428 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57518","28.309905","172.30.1.104","172.30.1.205","TCP","54","135 > 48428 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57519","28.309910","172.30.1.205","172.30.1.104","TCP","54","48428 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57520","28.309963","172.30.1.104","172.30.1.205","TCP","66","49671 > 41066 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57521","28.309971","172.30.1.205","172.30.1.104","TCP","54","41066 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57522","28.310328","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57523","28.310643","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57524","28.310650","172.30.1.205","172.30.1.104","TCP","54","41066 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57525","28.312494","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57526","28.313365","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57527","28.313371","172.30.1.205","172.30.1.104","TCP","54","41066 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57528","28.314734","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57529","28.318713","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57530","28.318728","172.30.1.205","172.30.1.104","TCP","54","41066 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57531","28.319669","172.30.1.205","172.30.1.104","TCP","74","48432 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931546 TSecr=0 WS=128" "57532","28.320043","172.30.1.104","172.30.1.205","TCP","66","135 > 48432 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57533","28.320054","172.30.1.205","172.30.1.104","TCP","54","48432 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57534","28.320405","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57535","28.320861","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57536","28.320870","172.30.1.205","172.30.1.104","TCP","54","48432 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57537","28.323071","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57538","28.323518","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57539","28.323525","172.30.1.205","172.30.1.104","TCP","54","48432 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57540","28.325347","172.30.1.205","172.30.1.104","TCP","54","48432 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57541","28.325459","172.30.1.205","172.30.1.104","TCP","74","41070 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931551 TSecr=0 WS=128" "57542","28.325632","172.30.1.104","172.30.1.205","TCP","54","135 > 48432 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57543","28.325659","172.30.1.104","172.30.1.205","TCP","54","135 > 48432 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57544","28.325665","172.30.1.205","172.30.1.104","TCP","54","48432 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57545","28.325769","172.30.1.104","172.30.1.205","TCP","66","49671 > 41070 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57546","28.325778","172.30.1.205","172.30.1.104","TCP","54","41070 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57547","28.326151","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57548","28.326467","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57549","28.326479","172.30.1.205","172.30.1.104","TCP","54","41070 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57550","28.328335","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57551","28.328729","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57552","28.328736","172.30.1.205","172.30.1.104","TCP","54","41070 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57553","28.330105","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57554","28.334292","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57555","28.334301","172.30.1.205","172.30.1.104","TCP","54","41070 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57556","28.335251","172.30.1.205","172.30.1.104","TCP","74","48436 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931561 TSecr=0 WS=128" "57557","28.335616","172.30.1.104","172.30.1.205","TCP","66","135 > 48436 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57558","28.335626","172.30.1.205","172.30.1.104","TCP","54","48436 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57559","28.335976","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57560","28.336294","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57561","28.336302","172.30.1.205","172.30.1.104","TCP","54","48436 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57562","28.338525","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57563","28.338946","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57564","28.338952","172.30.1.205","172.30.1.104","TCP","54","48436 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57565","28.340764","172.30.1.205","172.30.1.104","TCP","54","48436 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57566","28.340891","172.30.1.205","172.30.1.104","TCP","74","41074 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931567 TSecr=0 WS=128" "57567","28.341057","172.30.1.104","172.30.1.205","TCP","54","135 > 48436 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57568","28.341112","172.30.1.104","172.30.1.205","TCP","54","135 > 48436 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57569","28.341118","172.30.1.205","172.30.1.104","TCP","54","48436 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57570","28.341216","172.30.1.104","172.30.1.205","TCP","66","49671 > 41074 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57571","28.341223","172.30.1.205","172.30.1.104","TCP","54","41074 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57572","28.341570","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57573","28.343023","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57574","28.343031","172.30.1.205","172.30.1.104","TCP","54","41074 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57575","28.344951","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57576","28.345382","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57577","28.345388","172.30.1.205","172.30.1.104","TCP","54","41074 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57578","28.346742","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57579","28.350879","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57580","28.350891","172.30.1.205","172.30.1.104","TCP","54","41074 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57581","28.351908","172.30.1.205","172.30.1.104","TCP","74","48440 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931578 TSecr=0 WS=128" "57582","28.352280","172.30.1.104","172.30.1.205","TCP","66","135 > 48440 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57583","28.352292","172.30.1.205","172.30.1.104","TCP","54","48440 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57584","28.352640","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57585","28.352961","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57586","28.352970","172.30.1.205","172.30.1.104","TCP","54","48440 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57587","28.355175","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57588","28.355590","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57589","28.355597","172.30.1.205","172.30.1.104","TCP","54","48440 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57590","28.357434","172.30.1.205","172.30.1.104","TCP","54","48440 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57591","28.357548","172.30.1.205","172.30.1.104","TCP","74","41078 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931583 TSecr=0 WS=128" "57592","28.357873","172.30.1.104","172.30.1.205","TCP","54","135 > 48440 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57593","28.357883","172.30.1.104","172.30.1.205","TCP","66","49671 > 41078 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57594","28.357892","172.30.1.205","172.30.1.104","TCP","54","41078 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57595","28.357898","172.30.1.104","172.30.1.205","TCP","54","135 > 48440 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57596","28.357904","172.30.1.205","172.30.1.104","TCP","54","48440 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57597","28.358261","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57598","28.358586","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57599","28.358594","172.30.1.205","172.30.1.104","TCP","54","41078 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57600","28.360456","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57601","28.360825","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57602","28.360830","172.30.1.205","172.30.1.104","TCP","54","41078 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57603","28.362188","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57604","28.366133","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57605","28.366144","172.30.1.205","172.30.1.104","TCP","54","41078 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57606","28.367125","172.30.1.205","172.30.1.104","TCP","74","48444 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931593 TSecr=0 WS=128" "57607","28.367489","172.30.1.104","172.30.1.205","TCP","66","135 > 48444 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57608","28.367501","172.30.1.205","172.30.1.104","TCP","54","48444 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57609","28.367861","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57610","28.368181","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57611","28.368190","172.30.1.205","172.30.1.104","TCP","54","48444 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57612","28.370423","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57613","28.370873","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57614","28.370879","172.30.1.205","172.30.1.104","TCP","54","48444 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57615","28.372697","172.30.1.205","172.30.1.104","TCP","54","48444 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57616","28.372831","172.30.1.205","172.30.1.104","TCP","74","41082 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931599 TSecr=0 WS=128" "57617","28.372996","172.30.1.104","172.30.1.205","TCP","54","135 > 48444 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57618","28.373024","172.30.1.104","172.30.1.205","TCP","54","135 > 48444 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57619","28.373029","172.30.1.205","172.30.1.104","TCP","54","48444 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57620","28.373129","172.30.1.104","172.30.1.205","TCP","66","49671 > 41082 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57621","28.373137","172.30.1.205","172.30.1.104","TCP","54","41082 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57622","28.373483","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57623","28.373809","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57624","28.373818","172.30.1.205","172.30.1.104","TCP","54","41082 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57625","28.375705","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57626","28.376048","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57627","28.376054","172.30.1.205","172.30.1.104","TCP","54","41082 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57628","28.377442","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57629","28.381547","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57630","28.381556","172.30.1.205","172.30.1.104","TCP","54","41082 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57631","28.382517","172.30.1.205","172.30.1.104","TCP","74","48448 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931608 TSecr=0 WS=128" "57632","28.382824","172.30.1.104","172.30.1.205","TCP","66","135 > 48448 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57633","28.382834","172.30.1.205","172.30.1.104","TCP","54","48448 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57634","28.383186","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57635","28.383460","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57636","28.383469","172.30.1.205","172.30.1.104","TCP","54","48448 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57637","28.385684","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57638","28.386085","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57639","28.386092","172.30.1.205","172.30.1.104","TCP","54","48448 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57640","28.387906","172.30.1.205","172.30.1.104","TCP","54","48448 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57641","28.388016","172.30.1.205","172.30.1.104","TCP","74","41086 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931614 TSecr=0 WS=128" "57642","28.388214","172.30.1.104","172.30.1.205","TCP","54","135 > 48448 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57643","28.388222","172.30.1.104","172.30.1.205","TCP","54","135 > 48448 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57644","28.388227","172.30.1.205","172.30.1.104","TCP","54","48448 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57645","28.388303","172.30.1.104","172.30.1.205","TCP","66","49671 > 41086 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57646","28.388311","172.30.1.205","172.30.1.104","TCP","54","41086 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57647","28.388653","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57648","28.388941","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57649","28.388950","172.30.1.205","172.30.1.104","TCP","54","41086 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57650","28.390843","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57651","28.391186","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57652","28.391196","172.30.1.205","172.30.1.104","TCP","54","41086 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57653","28.392894","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57654","28.397000","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57655","28.397009","172.30.1.205","172.30.1.104","TCP","54","41086 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57656","28.397993","172.30.1.205","172.30.1.104","TCP","74","48452 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931624 TSecr=0 WS=128" "57657","28.398355","172.30.1.104","172.30.1.205","TCP","66","135 > 48452 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57658","28.398367","172.30.1.205","172.30.1.104","TCP","54","48452 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57659","28.398730","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57660","28.399040","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57661","28.399049","172.30.1.205","172.30.1.104","TCP","54","48452 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57662","28.401285","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57663","28.401687","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57664","28.401694","172.30.1.205","172.30.1.104","TCP","54","48452 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57665","28.403515","172.30.1.205","172.30.1.104","TCP","54","48452 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57666","28.403640","172.30.1.205","172.30.1.104","TCP","74","41090 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931630 TSecr=0 WS=128" "57667","28.403804","172.30.1.104","172.30.1.205","TCP","54","135 > 48452 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57668","28.403883","172.30.1.104","172.30.1.205","TCP","54","135 > 48452 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57669","28.403890","172.30.1.205","172.30.1.104","TCP","54","48452 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57670","28.403936","172.30.1.104","172.30.1.205","TCP","66","49671 > 41090 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57671","28.403947","172.30.1.205","172.30.1.104","TCP","54","41090 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57672","28.404296","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57673","28.404629","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57674","28.404637","172.30.1.205","172.30.1.104","TCP","54","41090 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57675","28.406547","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57676","28.406906","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57677","28.406912","172.30.1.205","172.30.1.104","TCP","54","41090 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57678","28.408264","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57679","28.412486","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57680","28.412495","172.30.1.205","172.30.1.104","TCP","54","41090 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57681","28.413503","172.30.1.205","172.30.1.104","TCP","74","48456 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931639 TSecr=0 WS=128" "57682","28.413909","172.30.1.104","172.30.1.205","TCP","66","135 > 48456 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57683","28.413922","172.30.1.205","172.30.1.104","TCP","54","48456 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57684","28.414286","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57685","28.414572","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57686","28.414581","172.30.1.205","172.30.1.104","TCP","54","48456 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57687","28.416791","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57688","28.417219","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57689","28.417225","172.30.1.205","172.30.1.104","TCP","54","48456 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57690","28.419037","172.30.1.205","172.30.1.104","TCP","54","48456 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57691","28.419153","172.30.1.205","172.30.1.104","TCP","74","41094 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931645 TSecr=0 WS=128" "57692","28.419337","172.30.1.104","172.30.1.205","TCP","54","135 > 48456 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57693","28.419395","172.30.1.104","172.30.1.205","TCP","54","135 > 48456 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57694","28.419402","172.30.1.205","172.30.1.104","TCP","54","48456 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57695","28.419452","172.30.1.104","172.30.1.205","TCP","66","49671 > 41094 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57696","28.419460","172.30.1.205","172.30.1.104","TCP","54","41094 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57697","28.419801","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57698","28.420124","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57699","28.420133","172.30.1.205","172.30.1.104","TCP","54","41094 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57700","28.422040","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57701","28.422436","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57702","28.422442","172.30.1.205","172.30.1.104","TCP","54","41094 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57703","28.423790","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57704","28.427769","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57705","28.427779","172.30.1.205","172.30.1.104","TCP","54","41094 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57706","28.428747","172.30.1.205","172.30.1.104","TCP","74","48460 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931655 TSecr=0 WS=128" "57707","28.429045","172.30.1.104","172.30.1.205","TCP","66","135 > 48460 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57708","28.429057","172.30.1.205","172.30.1.104","TCP","54","48460 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57709","28.429418","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57710","28.429707","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57711","28.429715","172.30.1.205","172.30.1.104","TCP","54","48460 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57712","28.431906","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57713","28.432324","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57714","28.432331","172.30.1.205","172.30.1.104","TCP","54","48460 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57715","28.434174","172.30.1.205","172.30.1.104","TCP","54","48460 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57716","28.434292","172.30.1.205","172.30.1.104","TCP","74","41098 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931660 TSecr=0 WS=128" "57717","28.434514","172.30.1.104","172.30.1.205","TCP","54","135 > 48460 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57718","28.434539","172.30.1.104","172.30.1.205","TCP","54","135 > 48460 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57719","28.434545","172.30.1.205","172.30.1.104","TCP","54","48460 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57720","28.434628","172.30.1.104","172.30.1.205","TCP","66","49671 > 41098 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57721","28.434637","172.30.1.205","172.30.1.104","TCP","54","41098 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57722","28.434979","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57723","28.435278","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57724","28.435287","172.30.1.205","172.30.1.104","TCP","54","41098 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57725","28.437209","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57726","28.437569","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57727","28.437575","172.30.1.205","172.30.1.104","TCP","54","41098 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57728","28.438940","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57729","28.443066","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57730","28.443075","172.30.1.205","172.30.1.104","TCP","54","41098 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57731","28.444043","172.30.1.205","172.30.1.104","TCP","74","48464 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931670 TSecr=0 WS=128" "57732","28.444332","172.30.1.104","172.30.1.205","TCP","66","135 > 48464 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57733","28.444343","172.30.1.205","172.30.1.104","TCP","54","48464 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57734","28.444692","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57735","28.445008","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57736","28.445017","172.30.1.205","172.30.1.104","TCP","54","48464 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57737","28.447237","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57738","28.447625","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57739","28.447632","172.30.1.205","172.30.1.104","TCP","54","48464 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57740","28.449460","172.30.1.205","172.30.1.104","TCP","54","48464 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57741","28.449580","172.30.1.205","172.30.1.104","TCP","74","41102 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931676 TSecr=0 WS=128" "57742","28.449727","172.30.1.104","172.30.1.205","TCP","54","135 > 48464 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57743","28.449864","172.30.1.104","172.30.1.205","TCP","66","49671 > 41102 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57744","28.449873","172.30.1.205","172.30.1.104","TCP","54","41102 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57745","28.449887","172.30.1.104","172.30.1.205","TCP","54","135 > 48464 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57746","28.449896","172.30.1.205","172.30.1.104","TCP","54","48464 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57747","28.450251","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57748","28.450576","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57749","28.450585","172.30.1.205","172.30.1.104","TCP","54","41102 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57750","28.452479","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57751","28.452850","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57752","28.452857","172.30.1.205","172.30.1.104","TCP","54","41102 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57753","28.454223","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57754","28.458450","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57755","28.458459","172.30.1.205","172.30.1.104","TCP","54","41102 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57756","28.459475","172.30.1.205","172.30.1.104","TCP","74","48468 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931685 TSecr=0 WS=128" "57757","28.459874","172.30.1.104","172.30.1.205","TCP","66","135 > 48468 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57758","28.459891","172.30.1.205","172.30.1.104","TCP","54","48468 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57759","28.460240","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57760","28.460590","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57761","28.460599","172.30.1.205","172.30.1.104","TCP","54","48468 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57762","28.462852","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57763","28.463252","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57764","28.463258","172.30.1.205","172.30.1.104","TCP","54","48468 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57765","28.465104","172.30.1.205","172.30.1.104","TCP","54","48468 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57766","28.465222","172.30.1.205","172.30.1.104","TCP","74","41106 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931691 TSecr=0 WS=128" "57767","28.465450","172.30.1.104","172.30.1.205","TCP","54","135 > 48468 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57768","28.465480","172.30.1.104","172.30.1.205","TCP","54","135 > 48468 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57769","28.465487","172.30.1.205","172.30.1.104","TCP","54","48468 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57770","28.465583","172.30.1.104","172.30.1.205","TCP","66","49671 > 41106 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57771","28.465591","172.30.1.205","172.30.1.104","TCP","54","41106 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57772","28.465945","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57773","28.466251","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57774","28.466260","172.30.1.205","172.30.1.104","TCP","54","41106 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57775","28.468154","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57776","28.468534","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57777","28.468540","172.30.1.205","172.30.1.104","TCP","54","41106 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57778","28.469915","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57779","28.474042","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57780","28.474052","172.30.1.205","172.30.1.104","TCP","54","41106 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57781","28.475034","172.30.1.205","172.30.1.104","TCP","74","48472 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931701 TSecr=0 WS=128" "57782","28.475351","172.30.1.104","172.30.1.205","TCP","66","135 > 48472 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57783","28.475362","172.30.1.205","172.30.1.104","TCP","54","48472 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57784","28.475714","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57785","28.476035","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57786","28.476044","172.30.1.205","172.30.1.104","TCP","54","48472 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57787","28.478288","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57788","28.478687","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57789","28.478693","172.30.1.205","172.30.1.104","TCP","54","48472 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57790","28.479552","172.30.1.205","172.30.1.104","TCP","54","41066 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57791","28.479603","172.30.1.205","172.30.1.104","TCP","54","41070 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57792","28.479635","172.30.1.205","172.30.1.104","TCP","54","41074 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57793","28.479663","172.30.1.205","172.30.1.104","TCP","54","41078 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57794","28.479690","172.30.1.205","172.30.1.104","TCP","54","41082 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57795","28.479713","172.30.1.205","172.30.1.104","TCP","54","41086 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57796","28.479735","172.30.1.205","172.30.1.104","TCP","54","41090 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57797","28.479761","172.30.1.205","172.30.1.104","TCP","54","41094 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57798","28.479783","172.30.1.205","172.30.1.104","TCP","54","41098 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57799","28.479810","172.30.1.205","172.30.1.104","TCP","54","41102 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57800","28.479838","172.30.1.205","172.30.1.104","TCP","54","41106 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57801","28.479902","172.30.1.205","172.30.1.104","TCP","54","41062 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57802","28.479950","172.30.1.104","172.30.1.205","TCP","54","49671 > 41066 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57803","28.479981","172.30.1.104","172.30.1.205","TCP","54","49671 > 41070 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57804","28.480013","172.30.1.104","172.30.1.205","TCP","54","49671 > 41066 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57805","28.480022","172.30.1.205","172.30.1.104","TCP","54","41066 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57806","28.480044","172.30.1.104","172.30.1.205","TCP","54","49671 > 41070 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57807","28.480048","172.30.1.205","172.30.1.104","TCP","54","41070 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57808","28.480075","172.30.1.104","172.30.1.205","TCP","54","49671 > 41074 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57809","28.480120","172.30.1.104","172.30.1.205","TCP","54","49671 > 41078 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57810","28.480149","172.30.1.104","172.30.1.205","TCP","54","49671 > 41074 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57811","28.480153","172.30.1.205","172.30.1.104","TCP","54","41074 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57812","28.480182","172.30.1.104","172.30.1.205","TCP","54","49671 > 41078 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57813","28.480185","172.30.1.205","172.30.1.104","TCP","54","41078 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57814","28.480268","172.30.1.104","172.30.1.205","TCP","54","49671 > 41082 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57815","28.480273","172.30.1.104","172.30.1.205","TCP","54","49671 > 41086 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57816","28.480285","172.30.1.104","172.30.1.205","TCP","54","49671 > 41090 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57817","28.480329","172.30.1.104","172.30.1.205","TCP","54","49671 > 41082 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57818","28.480333","172.30.1.205","172.30.1.104","TCP","54","41082 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57819","28.480374","172.30.1.104","172.30.1.205","TCP","54","49671 > 41086 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57820","28.480377","172.30.1.205","172.30.1.104","TCP","54","41086 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57821","28.480405","172.30.1.104","172.30.1.205","TCP","54","49671 > 41090 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57822","28.480408","172.30.1.205","172.30.1.104","TCP","54","41090 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57823","28.480896","172.30.1.104","172.30.1.205","TCP","54","49671 > 41094 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57824","28.480936","172.30.1.104","172.30.1.205","TCP","54","49671 > 41098 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57825","28.480968","172.30.1.104","172.30.1.205","TCP","54","49671 > 41094 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57826","28.480974","172.30.1.205","172.30.1.104","TCP","54","41094 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57827","28.480998","172.30.1.104","172.30.1.205","TCP","54","49671 > 41102 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57828","28.481042","172.30.1.104","172.30.1.205","TCP","54","49671 > 41106 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57829","28.481078","172.30.1.104","172.30.1.205","TCP","54","49671 > 41062 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57830","28.481136","172.30.1.104","172.30.1.205","TCP","54","49671 > 41062 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57831","28.481140","172.30.1.205","172.30.1.104","TCP","54","41062 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57832","28.481168","172.30.1.104","172.30.1.205","TCP","54","49671 > 41106 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57833","28.481171","172.30.1.205","172.30.1.104","TCP","54","41106 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57834","28.481201","172.30.1.104","172.30.1.205","TCP","54","49671 > 41098 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57835","28.481204","172.30.1.205","172.30.1.104","TCP","54","41098 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57836","28.481243","172.30.1.104","172.30.1.205","TCP","54","49671 > 41102 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57837","28.481246","172.30.1.205","172.30.1.104","TCP","54","41102 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57838","28.481593","172.30.1.205","172.30.1.104","TCP","54","48472 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57839","28.481714","172.30.1.205","172.30.1.104","TCP","74","41110 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931708 TSecr=0 WS=128" "57840","28.481888","172.30.1.104","172.30.1.205","TCP","54","135 > 48472 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57841","28.481972","172.30.1.104","172.30.1.205","TCP","54","135 > 48472 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57842","28.481982","172.30.1.205","172.30.1.104","TCP","54","48472 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57843","28.482075","172.30.1.104","172.30.1.205","TCP","66","49671 > 41110 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57844","28.482089","172.30.1.205","172.30.1.104","TCP","54","41110 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57845","28.482496","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57846","28.482809","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57847","28.482818","172.30.1.205","172.30.1.104","TCP","54","41110 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57848","28.484764","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57849","28.485165","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57850","28.485173","172.30.1.205","172.30.1.104","TCP","54","41110 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57851","28.486578","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57852","28.490645","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57853","28.490658","172.30.1.205","172.30.1.104","TCP","54","41110 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57854","28.491715","172.30.1.205","172.30.1.104","TCP","74","48476 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931718 TSecr=0 WS=128" "57855","28.492035","172.30.1.104","172.30.1.205","TCP","66","135 > 48476 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57856","28.492047","172.30.1.205","172.30.1.104","TCP","54","48476 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57857","28.492417","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57858","28.492718","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57859","28.492727","172.30.1.205","172.30.1.104","TCP","54","48476 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57860","28.494964","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57861","28.495422","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57862","28.495429","172.30.1.205","172.30.1.104","TCP","54","48476 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57863","28.497279","172.30.1.205","172.30.1.104","TCP","54","48476 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57864","28.497418","172.30.1.205","172.30.1.104","TCP","74","41114 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931723 TSecr=0 WS=128" "57865","28.497565","172.30.1.104","172.30.1.205","TCP","54","135 > 48476 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57866","28.497602","172.30.1.104","172.30.1.205","TCP","54","135 > 48476 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57867","28.497610","172.30.1.205","172.30.1.104","TCP","54","48476 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57868","28.497756","172.30.1.104","172.30.1.205","TCP","66","49671 > 41114 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57869","28.497765","172.30.1.205","172.30.1.104","TCP","54","41114 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57870","28.498121","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57871","28.498430","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57872","28.498439","172.30.1.205","172.30.1.104","TCP","54","41114 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57873","28.500331","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57874","28.500898","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57875","28.500904","172.30.1.205","172.30.1.104","TCP","54","41114 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57876","28.502294","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57877","28.506382","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57878","28.506394","172.30.1.205","172.30.1.104","TCP","54","41114 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57879","28.507460","172.30.1.205","172.30.1.104","TCP","74","48480 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931733 TSecr=0 WS=128" "57880","28.507769","172.30.1.104","172.30.1.205","TCP","66","135 > 48480 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57881","28.507781","172.30.1.205","172.30.1.104","TCP","54","48480 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57882","28.508143","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57883","28.508438","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57884","28.508447","172.30.1.205","172.30.1.104","TCP","54","48480 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57885","28.510734","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57886","28.511132","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57887","28.511139","172.30.1.205","172.30.1.104","TCP","54","48480 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57888","28.513008","172.30.1.205","172.30.1.104","TCP","54","48480 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57889","28.513150","172.30.1.205","172.30.1.104","TCP","74","41118 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931739 TSecr=0 WS=128" "57890","28.513295","172.30.1.104","172.30.1.205","TCP","54","135 > 48480 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57891","28.513369","172.30.1.104","172.30.1.205","TCP","54","135 > 48480 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57892","28.513382","172.30.1.205","172.30.1.104","TCP","54","48480 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57893","28.513523","172.30.1.104","172.30.1.205","TCP","66","49671 > 41118 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57894","28.513538","172.30.1.205","172.30.1.104","TCP","54","41118 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57895","28.513947","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57896","28.514269","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57897","28.514279","172.30.1.205","172.30.1.104","TCP","54","41118 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57898","28.516213","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57899","28.516583","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57900","28.516590","172.30.1.205","172.30.1.104","TCP","54","41118 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57901","28.517983","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57902","28.522160","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57903","28.522171","172.30.1.205","172.30.1.104","TCP","54","41118 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57904","28.523159","172.30.1.205","172.30.1.104","TCP","74","48484 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931749 TSecr=0 WS=128" "57905","28.523486","172.30.1.104","172.30.1.205","TCP","66","135 > 48484 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57906","28.523496","172.30.1.205","172.30.1.104","TCP","54","48484 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57907","28.523848","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57908","28.524145","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57909","28.524154","172.30.1.205","172.30.1.104","TCP","54","48484 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57910","28.526401","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57911","28.526824","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57912","28.526831","172.30.1.205","172.30.1.104","TCP","54","48484 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57913","28.528667","172.30.1.205","172.30.1.104","TCP","54","48484 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57914","28.528811","172.30.1.205","172.30.1.104","TCP","74","41122 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931755 TSecr=0 WS=128" "57915","28.528946","172.30.1.104","172.30.1.205","TCP","54","135 > 48484 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57916","28.528977","172.30.1.104","172.30.1.205","TCP","54","135 > 48484 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57917","28.528985","172.30.1.205","172.30.1.104","TCP","54","48484 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57918","28.529097","172.30.1.104","172.30.1.205","TCP","66","49671 > 41122 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57919","28.529105","172.30.1.205","172.30.1.104","TCP","54","41122 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57920","28.529454","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57921","28.530491","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57922","28.530500","172.30.1.205","172.30.1.104","TCP","54","41122 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57923","28.532389","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57924","28.532790","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57925","28.532800","172.30.1.205","172.30.1.104","TCP","54","41122 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57926","28.534261","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57927","28.538427","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57928","28.538440","172.30.1.205","172.30.1.104","TCP","54","41122 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57929","28.539455","172.30.1.205","172.30.1.104","TCP","74","48488 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931765 TSecr=0 WS=128" "57930","28.539795","172.30.1.104","172.30.1.205","TCP","66","135 > 48488 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57931","28.539807","172.30.1.205","172.30.1.104","TCP","54","48488 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57932","28.540166","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57933","28.540489","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57934","28.540498","172.30.1.205","172.30.1.104","TCP","54","48488 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57935","28.542729","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57936","28.543116","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57937","28.543123","172.30.1.205","172.30.1.104","TCP","54","48488 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57938","28.544985","172.30.1.205","172.30.1.104","TCP","54","48488 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57939","28.545098","172.30.1.205","172.30.1.104","TCP","74","41126 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931771 TSecr=0 WS=128" "57940","28.545287","172.30.1.104","172.30.1.205","TCP","54","135 > 48488 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57941","28.545317","172.30.1.104","172.30.1.205","TCP","54","135 > 48488 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57942","28.545324","172.30.1.205","172.30.1.104","TCP","54","48488 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57943","28.545426","172.30.1.104","172.30.1.205","TCP","66","49671 > 41126 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57944","28.545435","172.30.1.205","172.30.1.104","TCP","54","41126 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57945","28.545785","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57946","28.546193","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57947","28.546202","172.30.1.205","172.30.1.104","TCP","54","41126 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57948","28.548103","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57949","28.548488","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57950","28.548496","172.30.1.205","172.30.1.104","TCP","54","41126 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57951","28.549935","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57952","28.553980","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57953","28.553991","172.30.1.205","172.30.1.104","TCP","54","41126 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57954","28.554957","172.30.1.205","172.30.1.104","TCP","74","48492 > 135 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931781 TSecr=0 WS=128" "57955","28.555222","172.30.1.104","172.30.1.205","TCP","66","135 > 48492 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57956","28.555233","172.30.1.205","172.30.1.104","TCP","54","48492 > 135 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57957","28.555590","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: EPMv4 V3.0 (32bit NDR)" "57958","28.555885","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57959","28.555894","172.30.1.205","172.30.1.104","TCP","54","48492 > 135 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57960","28.558139","172.30.1.205","172.30.1.104","EPM","210","Map request, RPC_NETLOGON, 32bit NDR" "57961","28.558506","172.30.1.104","172.30.1.205","EPM","206","Map response, RPC_NETLOGON, 32bit NDR" "57962","28.558513","172.30.1.205","172.30.1.104","TCP","54","48492 > 135 [ACK] Seq=229 Ack=213 Win=62720 Len=0" "57963","28.560335","172.30.1.205","172.30.1.104","TCP","54","48492 > 135 [FIN, ACK] Seq=229 Ack=213 Win=62720 Len=0" "57964","28.560448","172.30.1.205","172.30.1.104","TCP","74","41130 > 49671 [SYN] Seq=0 Win=62727 Len=0 MSS=8961 SACK_PERM TSval=2499931786 TSecr=0 WS=128" "57965","28.560630","172.30.1.104","172.30.1.205","TCP","54","135 > 48492 [ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57966","28.560641","172.30.1.104","172.30.1.205","TCP","54","135 > 48492 [FIN, ACK] Seq=213 Ack=230 Win=2150400 Len=0" "57967","28.560647","172.30.1.205","172.30.1.104","TCP","54","48492 > 135 [ACK] Seq=230 Ack=214 Win=62720 Len=0" "57968","28.560790","172.30.1.104","172.30.1.205","TCP","66","49671 > 41130 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=8961 WS=256 SACK_PERM" "57969","28.560800","172.30.1.205","172.30.1.104","TCP","54","41130 > 49671 [ACK] Seq=1 Ack=1 Win=62848 Len=0" "57970","28.561171","172.30.1.205","172.30.1.104","DCERPC","126","Bind: call_id: 1, Fragment: Single, 1 context items: RPC_NETLOGON V1.0 (32bit NDR)" "57971","28.561457","172.30.1.104","172.30.1.205","DCERPC","114","Bind_ack: call_id: 1, Fragment: Single, max_xmit: 4280 max_recv: 4280, 1 results: Acceptance" "57972","28.561466","172.30.1.205","172.30.1.104","TCP","54","41130 > 49671 [ACK] Seq=73 Ack=61 Win=62848 Len=0" "57973","28.563355","172.30.1.205","172.30.1.104","RPC_NETLOGON","182","NetrServerReqChallenge request, EC2AMAZ-KQMF97E" "57974","28.563719","172.30.1.104","172.30.1.205","RPC_NETLOGON","90","NetrServerReqChallenge response" "57975","28.563725","172.30.1.205","172.30.1.104","TCP","54","41130 > 49671 [ACK] Seq=201 Ack=97 Win=62848 Len=0" "57976","28.565116","172.30.1.205","172.30.1.104","RPC_NETLOGON","234","NetrServerAuthenticate3 request" "57977","28.569301","172.30.1.104","172.30.1.205","RPC_NETLOGON","98","NetrServerAuthenticate3 response, STATUS_ACCESS_DENIED" "57978","28.569312","172.30.1.205","172.30.1.104","TCP","54","41130 > 49671 [ACK] Seq=381 Ack=141 Win=62848 Len=0" "57979","28.576161","172.30.1.205","172.30.1.104","TCP","54","41110 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57980","28.576213","172.30.1.205","172.30.1.104","TCP","54","41114 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57981","28.576248","172.30.1.205","172.30.1.104","TCP","54","41118 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57982","28.576279","172.30.1.205","172.30.1.104","TCP","54","41122 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57983","28.576316","172.30.1.205","172.30.1.104","TCP","54","41126 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57984","28.576346","172.30.1.205","172.30.1.104","TCP","54","41130 > 49671 [FIN, ACK] Seq=381 Ack=141 Win=62848 Len=0" "57985","28.576570","172.30.1.104","172.30.1.205","TCP","54","49671 > 41110 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57986","28.576583","172.30.1.104","172.30.1.205","TCP","54","49671 > 41114 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57987","28.576611","172.30.1.104","172.30.1.205","TCP","54","49671 > 41118 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57988","28.576633","172.30.1.104","172.30.1.205","TCP","54","49671 > 41122 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57989","28.576702","172.30.1.104","172.30.1.205","TCP","54","49671 > 41126 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57990","28.576725","172.30.1.104","172.30.1.205","TCP","54","49671 > 41130 [ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57991","28.578129","172.30.1.104","172.30.1.205","TCP","54","49671 > 41130 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57992","28.578138","172.30.1.205","172.30.1.104","TCP","54","41130 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57993","28.578176","172.30.1.104","172.30.1.205","TCP","54","49671 > 41126 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57994","28.578180","172.30.1.205","172.30.1.104","TCP","54","41126 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57995","28.578208","172.30.1.104","172.30.1.205","TCP","54","49671 > 41122 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57996","28.578211","172.30.1.205","172.30.1.104","TCP","54","41122 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57997","28.578238","172.30.1.104","172.30.1.205","TCP","54","49671 > 41110 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "57998","28.578242","172.30.1.205","172.30.1.104","TCP","54","41110 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "57999","28.578254","172.30.1.104","172.30.1.205","TCP","54","49671 > 41114 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "58000","28.578258","172.30.1.205","172.30.1.104","TCP","54","41114 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0" "58001","28.578280","172.30.1.104","172.30.1.205","TCP","54","49671 > 41118 [FIN, ACK] Seq=141 Ack=382 Win=2150144 Len=0" "58002","28.578287","172.30.1.205","172.30.1.104","TCP","54","41118 > 49671 [ACK] Seq=382 Ack=142 Win=62848 Len=0"